The largest collection of malware source, samples, and papers on the internet. Password: infected Website: https://www.vx-underground.org/ vx-underground Telegram chatroom link: https://t.me/+njfLzUrqos01ZWNh
You nerds are a bunch of degenerates, the memes are already flooding in 😭
Читать полностью…Lockbit ransomware group administration claims that law enforcement agencies compromised them by exploiting CVE-2023-3824
More information: https://nvd.nist.gov/vuln/detail/CVE-2023-3824
When a Lockbit affiliate tries to log into the Lockbit panel this is what they see
Читать полностью…Trying to understand how in 1 single day it is
- I-S00N leaks
- Lockbit ransomware group website seizure
- President's Day in America
"We can confirm that Lockbit's services has been disrupted as a result of International Law Enforcement action - this is an ongoing and developing operation.
Return here for more information at:
11:30 GMT on Tuesday 20th Feb"
Lockbit ransomware groups website has been seized by EUROPOL.
Читать полностью…Thank you, IS00N (allegedly APT41, state-sponsored Chinese government contractor) for the constructive feedback left for readers on GitHub.
We don't know what it means, but we're sure it is a comment thanking the leaker for their valiant efforts.
tl;dr archived stuff, see link below
Earlier today a GitHub titled "I-S00N" leaked supposedly sensitive Chinese government data - specifically related to offensive cyber security.
The initial discovery, and documentation of the documents, derive from AzakaSekai_. We have archived his research and notes on the material.
It should be noted that they *probably have not covered the material in totality and more information can be expected to be released in the following days from either Azaka, or other Cyber Threat Intelligence experts familiar with Chinese state-sponsored activity.
Furthermore, the materials are written in Mandarin. We have made no attempt to translate the material to English and we do not speak Mandarin, hence we cannot provide any opinion or speculation on the material. We will leave that painstaking task to individuals who speak Mandarin, or people who feel like trying to translate the documents accurately.
What an exciting start to the week:)
You can view the archived materials here: https://vx-underground.org/APTs/2024/2024.02.18%20-%20Summary%20of%20I-S00N%20leaks
Today an unknown individual uploaded what appears to be sensitive Chinese government documents... to GitHub. They're labeled "IS00N".
Читать полностью…An individual online reported unusual activity when trying to charge their sex toy.
tl;dr vibrator downloads Lumma stealer?
https://tria.ge/240215-xvx86seb91
We've updated the vx-underground crime section. We have added dozens of court cases, past and present.
We have a lot of work to do:)
https://vx-underground.org/Crime/Legal%20Rulings
The United States government has placed a $10,000,000 bounty on the leaders of ALPHV.
Additionally, any individual conspiring to participate in or attempting to participate with ALPHV has a bounty of $5,000,000.
https://www.state.gov/reward-for-information-alphv-blackcat-ransomware-as-a-service/
Hello, how are you?
Selling merchandise has been an extremely painful task. We profit almost nothing from merchandise, roughly $5 per item sold, because it is all handled by an external manufacturer
When individuals are upset over merchandise, and request a refund, we lose A LOT of money which we already do not have.
We will be closing the merch store soon due to frequent refunds. We are losing money right now.
Today the United Kingdom's National Crime Agency released an advert reminding YOU about the Computer Misuse Act
Ditch the script, it's a crime.
The crime section is now public. It's pretty empty, but it's a work in progress.
Have a nice day
https://vx-underground.org/Crime
Today was a big day for the United States government and United Kingdom government. The Federal Bureau of Investigation and U.K. National Crime Agency’s (NCA) Cyber Division unveiled a massive, multi-year long investigation which has led to a catastrophic blow to Lockbit ransomware group and affiliates.
The Lockbit ransomware group Tor domain name displays a list of posts announcing activity performed by law enforcement agencies. It is written in Lockbit format, illustrating they have full control over Lockbit ransomware groups infrastructure.
Law enforcement has done the following
1. Law enforcement agencies will be unveiling sensitive information on Lockbit cryptocurrency and money operations February 23th, 2024
2. Law enforcement, with SecureWorks, will be revealing information on Lockbit tradecraft February 22nd, 2024
3. Law enforcement will be unveiling Lockbit affiliate infrastructure February 21st, 2024
4. Law enforcement, with TrendMicro, will be releasing a detailed analysis on Lockbit future-iterations February 22nd, 2024
5. Law enforcement will be unveiling information on Lockbit's StealBit data exfiltration tool February 21st, 2024
6. Law enforcement will be unveiling sanctions on Lockbit ransomware group at 15:30UTC today
7. Law enforcement, in conjunction with Japanese partners, has released a Lockbit decryptor tool
8. An individual in Poland has been arrested
9. An individual in Ukraine has been arrested
10. Law enforcement plans on unveiling the identity of the Lockbit ransomware group administration February 23rd, 2024
11. The United States government unveiled the indictement of two individuals associated with Lockbit ransomware group: Artur Sungatov and Ivan Kondratyev
12. The United Kingdom NCA has unveiled sensitive information on the Lockbit backend: the administration panel, the blog backend, and the blog source functionality. This includes the images of the source code.
"We may be in touch with you very soon" - National Crime Agency of the UK, the FBI, Europol, Operation Cronos Law Enforcement Task Force
Them getting in touch:
Lockbit ransomware group has issued a message to individuals on Tox.
"ФБР уебали сервера через PHP, резервные сервера без PHP не тронуты"
"The FBI fucked up servers using PHP, backup servers without PHP are not touched"
Lockbit ransomware group administrative staff has confirmed with us their websites have been seized.
Читать полностью…Every single known Lockbit ransomware group website is either offline or displaying a seized by EUROPOL page.
It appears law enforcement has seized and/or taken down, at minimum, 22 Tor sites, in what is labeled 'Operation Cronos'.
Okay, we'll stop memeing the Chinese APT leaks. We just had a lot to get off our chest, the absurdity of the situation is too great.
Have a nice day.
Researchers have already begun digging in and sharing their key findings and opinions.
That's a Monday type of thing though. It is Sunday.
We'll keep you all updated, tomorrow. Have a nice night.:)
It is Sunday. Today is a day for rest.
See ya tomorrow
Believe it or not, this is not a Unicode error. This is the child of a SQL developer
Читать полностью…Today the United States Department of Justice was busy.
1. Vyacheslav Igorevich Penchukov a/k/a Tank was arrested. He was allegedly involved in the Zeus botnet and IcedId banking trojan
2. Mark Sokolovsky, developer of Raccoon Stealer, is scheduled to be extradited to the United States from the Netherlands
3. The Department of Justice announces the disruption of a botnet operated by the Russian GRU a/k/a APT28
A few notes:
1. The store will come back at a later time. We need to assess our ability to sell merchandise, at a reasonable price, and doesn't financially hurt us.
2. We will still be selling harddrives on the store (when they're back in stock)
tl;dr customer support is dumb
you're all a bunch of god damn criminals and you're going to jail forever and ever and ever
Читать полностью…Mozilla has laid off 60 people and announces they want to incorporate AI into Firefox
It's over
https://arstechnica.com/gadgets/2024/02/mozilla-lays-off-60-people-wants-to-build-ai-into-firefox/