The largest collection of malware source, samples, and papers on the internet. Password: infected Website: https://www.vx-underground.org/ vx-underground Telegram chatroom link: https://t.me/+njfLzUrqos01ZWNh
Today we learned RecordedFuture's Insikt group is pronounced 'In-sikt' and NOT 'in sync'. No idea where we got the 'N' from – but we did. For several years we thought the organization was named after Justin Timberlake's hit 90's boy band
Читать полностью…Discord has announced they will begin displaying ads to boost revenue
Читать полностью…PandaBuy has been breached by Threat Actors operating under the names "Sanggiero" and "IntelBroker". Exfiltrated data includes:
- UserId
- First name
- Last name
- Phone number
- Email
- Login Ip
- Full address
- Order information
Breach patrons are relatively excited
Most difficult things to do:
- Climbing Mt. Everest
- Mastering a second language
- Overcoming addiction
- Syncing Outlook
JiaT75 on GitHub pretending to be an OSS enthusiast and 100% NOT a state-sponsored Threat Actor
Читать полностью…The xz backdoor was initially caught by a software engineer at Microsoft. He noticed 500ms lag and thought something was suspicious.
This is the Silver Back Gorilla of nerds. The internet final boss.
meemaw shows nerds how to use ffmpeg, uses a 2 character password, uses neofetch, and complains about bloat on her 4gb linux box
based and linux pilled
https://www.youtube.com/watch?v=YVI6SCtVu4c
The more we read about the xz supply chain attack the more we realize that everyone needs to move to Windows XP.
This wouldn't have happened on Windows XP
Checked in with Lockbit ransomware group administrative staff yesterday. We haven't spoken with them in a few weeks. They're now looking to expand operations into Violence-as-a-Service.
Very cool – malware, extortion, money laundering, and now violence 👍
In case you missed our first ever VXUG trivia night, first place won $500 & last place won custom made hoodies (sponsored by Malcoreio)
The hoodies include their team name and a silly quote from them.
Congratulations to Bandrel's team for the swag.
Unpopular opinion: cheating in video games is cool and badass
You should have nothing but the utmost respect for nerds who spent their time reverse engineering a game and developing ways to cheat. It isn't easy work especially with the advancement of anti-cheats.
It should be noted that some of these accounts are also not cheaters. Some users impacted utilized gaming software for latency improvement (?), VPNs, and Controller Boosting software
(we don't know what this means)
Anyway, we weren't going to make a video about this... because we don't make videos and we don't profit from our tweets (okay, maybe a few pennies, we're so sorry).
But let it be known!! They are correct – we watched VineSauce and RedLyne! Please forgive us 😭🙏
We've uploaded 85,000+ malware samples to vx-underground.
Download it.
We have no April Fool's day joke planned this year. Please accept this image of a cat instead.
Читать полностью…Hello, how are you?
It is Sunday. Today is a day to rest. We hope everyone had a good week. We hope all of you have a good weekend.
We made a post congratulating and praising Andres Freund for his discovery of the xz backdoor
Dorks immediately started freaking out
>i WouLd hAvE cAuGhT ThiS
>i dO bEnChMarkS liKe tHiS tOO
How about you be happy for someone? Not everything is an attack on your ego 😤😤
Microsoft engineer: 500ms lag in liblzma? Something's up.
Also Microsoft engineer: 45 minute lag in Microsoft Teams? Perfect.
Times like this we need a reminder that only one person can protect us from OSS supply chain attacks
meemaw. She would know immediately
The xz situation is absolutely insane and almost certainly state sponsored.
This is an excellent example of a widely used software being maintained by basically one person.
Read this web article and then frown and become sad.
https://boehs.org/node/everything-i-know-about-the-xz-backdoor
Lockbit has clarified this is not to intimidate potential victims of ransomware. Lockbit administrative staff claim they were recently robbed and need to get their money back.
Читать полностью…Happy Supply Chain Attack Friday!
tldr if you updated Kali Linux recently you're pwned with malware
https://twitter.com/kalilinux/status/1773786266074513523
FTX founder Sam Bankman-Fried has been sentenced to 25 years in prison.
Читать полностью…DarkGate loader has the most sophisticated loader we've ever seen. It's over for the anti-virus industry. How would anyone defeat or detect this?!
Читать полностью…Over the past couple of days we have become aware of malware targeting gamers! More specifically, a currently unidentified Threat Actor is utilizing an infostealer to target individuals who cheat (Pay-to-Cheat) in video games.
A Call of Duty cheat provider (PhantomOverlay) was alerted of fraudulent activity when user accounts began making unauthorized purchases. The cheat provider was the first to notice the fraudulent activity and reached out to the suspected victim. Since the initial victim was identified, more and more victims have been identified.
The scope of the impact is so large, and in a bizarre twist of fate, Activision Blizzard is coordinating with cheat providers to aid users impacted by the massive infostealer campaign.
Currently there is a presumed impact of:
- 3,662,627 Battlenet accounts compromised
- 561,183 Activision accounts compromised
- 117,366 Elite PVPers accounts compromised
- 572,831 UnknownCheats accounts compromised
- 1,365 PhantomOverlay accounts compromised
When Elite PVPers was approached by PhantomOverlay administrative staff about the compromised accounts, Elite PVPers confirmed they have identified 40,000+ valid user accounts compromised. These are seemingly freshly stolen credentials and are not present from previous publicly available credential dumps. However, due to the size of the data we have not been able to thoroughly review the data for duplicates.
Additionally, impacted users have begun reporting being victims of crypto-draining – their Electrum BTC wallets have been drained. We do not have any information on the amount of money stolen.
We've updated the vx-underground malware collection. We've added approx. 24,000 malware samples. All are synced with the VXDB.
- XWorm
- Remcos
- zLoader
- PikaBot
- QakBot
- Konni
- LummaStealer
- PureLogStealer
- Android.Anatsa
- Gh0stRAT
- IcedId
- BackMyDataRansomware
- AresLoader
- Android.Teabot
- Turla
- AgentTesla
- VirusSign.2024.03.18
- VirusSign.2024.03.19
- VirusSign.2024.03.20
- VirusSign.2024.03.21
- VirusSign.2024.03.22
- VirusSign.2024.03.23
- VirusSign.2024.03.24
Woke up to internet dorks angrily proclaiming, screaming at the top of their lungs, we are forbidden from discovering something already discovered.
Unironically we get more negative feedback about video games than we do talking to internationally wanted criminals