40629
The largest collection of malware source, samples, and papers on the internet. Password: infected https://vx-underground.org/
Sinobi ransomware group: GIVE US $10,000,000 OR WE'RE GOING TO LEAK ALL OF YOUR FUCKING DATA
(Halcyon AI is trying to politely inform them they're extorting the wrong company)
> be sinobi ransomware group
> have ransomware "blog"
> use to extort companies
> list halcyon.ai
> "WE RANSOMED THE ANTI RANSOMWARE COMPANY"
> look inside
> not halcyon.ai
> ransomed halcyontek
> mfw they dont know who theyre extorting
Someone get that fucking Nickle guy on the horn, whatever the fuck his name is, and tell him to revert these changes.
Oh, you can change the fucking themes but you can't stop the Chinese state-sponsored propaganda or the 200 OnlyFan's spam messages I get a day?
I've been witnessing a trend whereas non-nerds, or schizo nerds, seem to be under the impression virtually everything is AI generated.
My comment section has been littered with non-core audience people asserting:
- News articles are AI generated (fake in totality, never happened)
- My profile is AI generated (???)
- Images shared are AI generated (memes, video edits, etc). They're edits, but not AI
AI has destroyed the normal person's mind and they appear incapable of differentiating AI from reality.
It is absolutely fascinating. It's like we're watching a science experiment in real time.
I was sitting here and I was like, "I wonder if those nerds have decoded more Epstein attachments".
Today mqudsi decoded legal documents sent between Epstein and his legal representative Alan Dershowitz.
He even got the original metadata back (time, date, computer)
If you want to read more about Paragon, GRAPHITE, and governments (illegally) using Mercenary Spyware, read this paper:
https://citizenlab.ca/research/a-first-look-at-paragons-proliferating-spyware-operations/
I can't even tell you how many times I've explored a malware concept to just:
1. Realize I should have read the documentation
2. Realize Google Project Zero already reversed it
3. Realize some schizo on UnknownCheats reversed it
4. Fail (successfully!)
Hello,
I have received more things from DEFCON. I appreciate the gifts all of you have sent.
Thank you, XINTRA, for the sticker of the anime lady with obnoxiously large breasts. I don't know where I'll place it, but I appreciate it.
Research paper: https://arxiv.org/pdf/2601.09625
Читать полностью…
Nerds have gotten access to the ICE subreddit (???) and archived it publicly.
1. Why is there an ICE subreddit
2. Why are ICE people using Reddit
3. Why was it even accessible
4. ???
I don't understand anything
> see post online
> us military offensive cyber warfare division
> click profile
> they follow me
> wtf?
> theyre following me?
> is the us military using my website to study malware?
> *follow back*
In retrospect, the first three months of my son's life was like the dark ages. All I did was watch anime in complete silence, praying to any God that would answer my prayers, that my wife and I could sleep for just a few hours.
Nonstop anime for 90 days, per the recommendation of my peers and colleagues, was bad. I haven't watched anime ever since. I feel like I was trapped in some kind of CIA MK Ultra experiment. My brain is fried. I have this urge to move to a remote cabin and ... enjoy nature.
Got fixed fast af boi
https://x.com/chen9918b/status/2018726412317085953
Dear Tiny People Living Inside My Computer,
As many of you probably recall, somewhere between 2021 and 2023, it was critical "monkey bonk" was utilized to deter bad actors.
Times have changed. We no longer live in peace. The monkey bonk is back.
dawg, if youre going to be an internationally wanted cybercrime organization involved in extortion, money laundering, aggravated identify theft, CFAA violations, etc AT LEAST extort the right people
how you gonna extort someone you have no data for???
Mildly interesting
In NTDLL there is RtlCheckSandboxedToken.
RtlCheckSandboxedToken is a wrapper for NtQueryInformationToken with the TokenIsAppContainer flag from the TOKEN_INFORMATION_CLASS enum.
returning non-zero means the application is sandboxed, in an app container, or running as a protected process.
Xitter removed the light blue color scheme. The only options are 'dark' theme and 'light' theme.
Both look like shit.
This entire site is going to hell in a hand basket. This has ruined my day, possibly my entire life, I don't know yet.
Oh, and since the Epstein files apparently EVERYTHING is a government psyop. Literally fucking everything. It's like someone dropped a schizo bomb on the internet and now everyone has lost their mind
It's cool and badass
Dawg, these computer forensic nerds do NOT fuck around. They're decoding decades old documents from fucked up e-mail scans so accurately they're getting the original metadata
Читать полностью…
Oh, I'm also really, really, really, sorry to DrWhax. This is his photo he took from LinkedIn and he was the first to note it. I got lost in the sauce and forgot to tag him and give him credit.
I'm sorry, DrWhax. That is 100% my bad. When I saw your post I lost my mind.
Yeah, so pretty much, like, there is this really sketchy company in Israel named "Paragon". Paragon sells a "product" called GRAPHITE.
Let me explain the background and why this is very silly.
GRAPHITE spyware which allows "customers" to remotely access peoples cell phones and monitor their instant messaging applications such as WhatsApp
It is spyware. It is sometimes called Mercenary Spyware because it is primarily used by governments to spy on political enemies, journalists, and activists.
Very little is known about Paragon, GRAPHITE, and their "customers". However, it was publicly noted by the Trump administration in January, 2025, to be purchased by the United States government and to be used to aid ICE.
Furthermore, in September 2025 the Trump administration noted the usage of Graphite to aid the United States against "domestic terrorist organizations" such as "ANTIFA".
ICE acting director Todd Lyons noted using GRAPHITE to monitor anti-ICE protestors to track "ringleaders and professional agitators".
Citizen Lab and other civil rights organizations have documented the usage of GRAPHITE against individuals in Australia, Canada, Cyprus, Denmark, Israel, Singapore and (unsurprisingly) the United States. It is believed the Canadian government actively uses GRAPHITE in Ontario.
Okay, so why does all of this matter? Yeah, it's super fucked up. But today representatives from Paragon accidentally leaked GRAPHITE screenshots ... ON LINKEDIN. Dawg, that image in the background IS GOVERNMENT FUCKING SPYWARE
It shows phone numbers in Czechia, apps, accounts, media on the phone, "interception status", and phone numbers extracted. THEY LEAKED IT BY ACCIDENT ON LINKEDIN WHILE TAKING SELFIES
> be me
> have malware idea
> plug phone into pc
> malware detects phone
> automagically steals data off phone
> spend time working on it
> deal with all sorts of dumb shit c winapi
> fails
> ???
> fails
> look inside
> The phone must be in File Transfer (MTP) mode and authorized for WPD (Windows Portable Device) to work
guess who should have read the documentation before doing a bunch of work? (ill give you a hint, its me)
Hello,
Last year people who attended DEFCON wanted to gift things to me. I have received them. I do not understand this sticker one of you sent me.
What does "Peg A Fed" mean?
Academics nerds published a research paper a few days about LLM malware and their argument for a new classification of malware dubbed "Promptware".
X fucks up links a lot, they don't display properly, so the link to their academic paper will be in the post subsequent to this one.
As is tradition, their academic paper is just a bunch of goobers being all philosophical about shit and including a bunch of fancy pictures and graphs.
I unironically sat here and read most of this paper.
Is there argument valid?
Yes, but some of the examples provided are theoretical and have not existed in-the-wild (yet?). They do however provide real-life examples of LLM payloads which have been successful. I personally have not seen these techniques described, but they provided citations and they are indeed real.
I do malware stuff everyday (collecting, reverse engineering, development) and I have not seen any of the papers they reference. This paper has demonstrated, unironically, there is a gap right now between LLM research and malware research. In essence, we are at the point now where LLM research is now bleeding into malware research and malware nerds may have to pay more attention.
I am now a believer. LLM malware is indeed real and will become a thing. I give these academic nerds two (2) cat pictures for this interesting paper. This is the first academic paper I've read in awhile that I actually think isn't complete dog shit.
My main criticism however is they kind of butcher some malware terminology. For example, they incorrectly refer to some of this LLM malware stuff as Polymorphic, but this is not polymorphic ... unless we get really, really, really flexible with definition of polymorphic malware and we make it more akin to high-level class inheritance polymorphism. It doesn't really matter that much though because I understand what they're trying to convey.
I like to imagine a bunch of military bros at some fuckin base wanting updates on malware and I'm just schizo ranting about my general distrust for the United States government and spamming cat pictures
Читать полностью…
Hello,
More updates being pushed to prod tomorrow. Also have some mildly interesting news to share related to something we sometimes do.
Additionally, my son will be turning 1 years old soon. Feel old yet?
Cheers,
-smelly smellington
The new AI powered Notepad on Windows 11 was found having a Remote Code Execution 0day
Hot take: text editors don't need network functionality
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841
ok sorry if i sound extra critical, it's just weve had this conversation before with other things in the past and nothing really changes, so now i need to be mean.
ily ok? im just grumpy and eepy.