The largest collection of malware source, samples, and papers on the internet. Password: infected Website: https://www.vx-underground.org/ vx-underground Telegram chatroom link: https://t.me/+njfLzUrqos01ZWNh
Yesterday it was unveiled Aubrey Cottle a/k/a Kirtaner had been arrested by United States Federal Bureau of Investigation in conjunction with the Ontario Provincial Police for the 2021 compromise of the United States Texas Republican Party.
Mr. Cottle is best known within the information security sphere as being a 'founding member' of the "Anonymous" political hacktivist movement in the 2000's.
Mr. Cottle is alleged to be involved in the compromise of Hal Turner (2008) and the Church of Scientology (2008).
Federal documents state Mr. Cottle gained unauthorized access to a 3rd party hosting side for the United States Texas Republican Party. Subsequently, he allegedly exfiltrated data, made is downloadable for others, and defaced the website.
If found guilty Mr. Cottle is facing a maximum of 5 years in prison.
Today Microsoft announced Windows 11 will require a Microsoft account to create a local profile on the computer. They will be removing the bypass option available in the installation command prompt.
There will still be workarounds, but they're making it harder
>check internet
>see rust nerds
>rust nerd says: "rust is faster than pure asm"
mfw rust is its own instruction set now and supersedes the entire x64 architecture and the hardware it was designed to operate on
Threat Actors trying to figure out what kind of piece of shit they're targeting (it's using PowerPC architecture, 256kb of RAM, and 12mb of harddrive storage)
Читать полностью…It's fun memeing nerds for hacking websites.
It's funnier because we couldn't hack a website if our lives depended on it because we've spent our entire lives screaming into the void of Windows internals
Today ESET noted the discovery of RoamingMouse, Anel, AnelLdr and FaceXInjector
It is malware and playfully homoerotic
Interestingly, a majority of people who have told us they've paid the 'ransom' are people who we believe to be mentally ill. The people have suggested the government is tracking them, the former (or current) presidential administration is targeting them, or they have some sort of connection to a higher spiritual being.
tl;dr mentally ill people falling for it, sad tbh
How do we politely inform a government contractor they've left their data exposed with the username being 'admin' and the password also being 'admin'?
Читать полностью…> company vulnerable
> researcher tries to do responsible disclosure
> company ignores researchers pleas
> researcher notifies us
> company has contracts with United States government
> researcher releases cool paper
> *crickets*
> influencer with mailing list appears
> shares stolen lame cheat sheet png
> 100000 likes
> 50000 retweets
> noobs in comments foaming out mouth
Last week several high-profile Threat Actors mysteriously disappeared at the exact same time.
What are the odds several people suddenly go on a vacation or die at the same time?
StreamElements web store was compromised. Over 100,000 people impacted.
The Threat Actor responsible was kind enough to notify the impacted customers by sending all of them an email from "Diddy Squad".
Arkana ransomware group claims to have compromised an Internet Service Provider in California.
They were even nice enough to put together a music video montage illustrating the level of access they possess.
Connor Moucka a/k/a Waifu, the Canadian believed to be responsible for the Snowflake compromise, has consented to extradition to the United States.
We can't recall a time a suspected Threat Actor consented to extradition to the United States.
https://cyberscoop.com/connor-moucka-snowflake-hacker-extradition-us/
Honestly, Sliver, NightHawk, Havoc, Cobalt Strike, you need to take notes.
Do your tools even look cool and badass like this?
People online are expressing frustration toward VMware. They are deeply unhappy with the recent licensing changes.
Читать полностью…Had a doctor's appointment today. He asked about some medication I was prescribed from a different physician. He asked how to spell it.
He Googled it and then proceeded to skim the Drugs dot com and Wikipedia article about it
C'mon bro, at least hide it from me or something
Today Elon Musk announced xAI has acquired X
No idea what that means, but here we are
Just learned Costco uses IBM AS/400 (released in 1988)
They're basically bulletproof. Name 1 ransomware variant, or information stealer, designed for systems from 1988 (you can't, it doesn't exist)
Chat, we're Costco guys 🤝
cl0p ransomware claims to have compromised Sam's Club.
For non-Ameriburgers — Sam's Club is a place where Americans pay a fee to get access to a store where you can buy food in bulk for cheaper. You can buy Monster Energy drinks by the pallet (no idea why you'd want to do it, but we do it).
Based on the history of cl0p ransomware, cl0p ransomware (probably) isn't lying. cl0p also historically exfiltrates data, they have not (to the best of our knowledge) actually "locked" machines on a network.
¯\_(ツ)_/¯
Information via AlvieriD
More interestingly (maybe?), we've also witnessed people who are exhibitionists seem excited by the prospect of being extorted and having their genitals exposed to people they know.
The internet is a cool place
We get probably 2 or 3 messages about this scam e-mail a month. We've also been informed by some people they've actually paid the 'ransom'.
Читать полностью…> be me
> get added to top secret us gov signal chat
> yappin about yams or something idfk
> post cat pic
> us secretary of defense agrees
Hello, how are you?
First and foremost: thank you to our friends at TorGuard for the hosting they've been providing us. It's a wonderful gift and it makes our lives WAY easier. Thank you, Mr. TorGuard.
Anyway, we're almost done restoring the virus-dot-exchange. We've successfully uploaded 26,356,958 malwares. We have more to add, but we're almost done. It's truly a Christmas miracle. In an ideal world, the migration will be completed ... next week sometime.
Following the completion of the restoration of the virus exchange, we'll be hammering vx-underground with new APT malware samples and papers. Additionally, we've got tons of new malware we need to add from the InTheWild collection and VirusSign collection. We will also resume malware ingestion.
Sometime during this chaos, we'll be adding more work from Cryakl. We want to review our malware builders collection to ensure it's sterile-ish (no way we can truly confirm a malware builder is safe, use at your own caution, use common sense).
I'll also ensure during the work more kitty cat pictures will be present on social media (it irritates some of our more serious followers, no idea why we find that so humorous, but it is) and continue being cybercrime TMZ.
Have a nice morning, evening, or night.
- smelly smellington
1. StreamElements confirms there was a data breach. However, they assert their web shop is ran be an external entity. They were not compromised, but customer data was still stolen. ¯\_(ツ)_/¯
2. WoW! ISP breach was (probably) the result of information stealer malware (the usual suspect). HudsonRock confirms the names and information displayed in the video from Arkana ransomware were previously found in information stealer logs.
tl;dr employee with actual access to stuff at isp somehow does oopsie, detonates infostealer malware, ransomware nerds get it, chaos ensues
tl;dr tl;dr big hacks always infostealers, phishing, or social engineering
tl;dr x3 ¯\_(ツ)_/¯
Arkana ransomware group claims to have compromised "Wide Open West - WOW!", one of the largest Internet Service Provider's in the United States.
First and foremost: we have never heard of Arkana ransomware group. We've seen some researchers mention them via their onion domain — but this appears to be their first victim. Their first victim is also a giant.
Second: previously we shared a music montage video Arkana put together illustrating the level of access they claim to have on "WOW". However, upon inspection, the compromise Arkana is claiming to have is far more devastating than initially thought.
Interestingly, Arkana has used some sort of AI tool to provide a high-level overview of their compromise on their onion domain. It reads exactly like a ChatGPT message.
tl;dr
1. Arkana opens by threatening WOW by mentioning lawsuits (incorrectly citing GDPR) by shareholders and customners.
2. Arkana mocks the CEO. They published her company shares, address, address history, e-mail addresses, and social security number. They taunt her.
3. Share generic company information which is public, primarily shareholders, company executives, directors, etc.
4. Provide table layouts impacting 403,000 customers including:
- UserId
- UserName, Password
- SecurityQuestion
- SecurityAnswer
- Email
- Full name
- WOW service package information
5. Demonstrate full access to "Symphonica" — and show themselves allegedly pushing malware to customer devices (in Michigan?).
6. Demonstrate full access to "AppianCloud", they suggest (in their AI summary, and also in the video they made), they can potentially alter billing information or alter financial transactions (?).
7. The images (as well as the video) Arkana share show intimate and detailed access to WOW.
This is very, very, very interesting from a random, suddenly appearing, almost no-name ransomware group. We see ransomware groups appear all the time, rarely do they make an explosive impact like this right out the gate. We personally do not know of many groups capable of NOT ONLY compromising an ISP, but also knowing how to navigate the infrastructure AND ALSO (allegedly, based on the footage provided) push malware to customer devices.
🚨BREAKING 🚨Michael Saylor's 'Strategy' now the most targeted organization by sim swappers and North Korea
Читать полностью…Hi,
We've added 497 malware builders (even some old school), including some which target Android devices. Each directory now includes images of the malware builder as a 'preview'.
Some builders have been removed so we can ensure they're legitimate.
Thanks to Cryakl 🤝