40629
The largest collection of malware source, samples, and papers on the internet. Password: infected https://vx-underground.org/
To be fair, it is 100% possible for the Israel government to have a WhatsApp exploit. I tested it from my computer and was disappointed.
Читать полностью…
Today United States Donald J. Trump released the "Cyber Strategy for America" document. It was highlighted by FBI Director Kash Patel.
Let's take a look at it together. I'll translate it from fancy political speak into nerd speak.
Intro:
>america is cool and badass
>were strong af fr
>our hackers are schizo af
>we could be strongerer
>need corpos to work with us fr
>were fuckin shit up so nerds cant hide
>america 250 years old soon
>computers are important
Section Two:
>we made the internet
>we are the best in internet stuff
>mean nerds fuck shit up on the internet
>mean nerds pissing us off
>"im trump and im not a bitch about cyber"
>mean nerds targeting important shit online
>this is a new era of cyberspace
>lots of money online
Section Three:
>mean nerds pissing us off fr
>if we cant internet you, well physically hurt you
>he actually wrote that LOL
>other countries have shitty AI
>we have the best AI
>were gonna work with unis and companies for AI
>wont let people be censored online
>something about people censoring americans
>mean nerds will get sanctioned
>mean nerds will be memed
>mean nerds will get beat up (maybe)
>america remove more regulations on AI
>regulations slow us down
>gotta go fast af boi fr
>cybersecurity so important fr
Donald J. Trump Pillars of Action:
1. Shape Adversary Behavior
>mean nerds attacking americans and companies
>theyre innocent ppl tho
>nsa and cia given thumbs up to hack back extra
>we raising aggression
2. Promote Common Sense Regulation
>reduce cybersecurity regulation
>checklists are for losers
>regulation make companies less agile
>companies and gov need to be fast af
3. Modernize and Secure Federal Government Networks
>government computers are lame
>will make them better
>use best practices
>use "post-quantum cryptography"
>use "zero-trust architecture"
>use "cloud transition"
>will improve stuff to hunt down nerds we dont like
>will use AI for cybersecurity
4. Secure Critical Infrastructure
>critical infra support important
>energy grid important af to defend
>banks important af to defend
>hospitals important af to defend
>water plants important af to defend
>telecoms important af to defend
>datacenters important af to defend
>must defend everything important af
>stop using technology made by countries we dont like
5. Sustain Superiority in Critical and Emerging Technologies
>america will make more tech stuff
>we gonna protect what we make fr
>cryptocurrency must be secured and stuff
>we need quantum stuff
>ai mega important tho
>we need more ai for hacking and for defense
>people we dont like hack dumb and shitty ai
6. Build Talent and Capacity
>we need more nerds
>nerds are unironically super important
>need to invest in nerds
>remove "roadblocks" for nerds (???) across industry
>will invest in more nerd stuff for nerds to learn
In other news, someone published a paper today about how they were able to abuse Perplexity AI to get unlimited Claude tokens.
It turns out the researcher misunderstood Perplexity billing methods and he will be billed accordingly.
Today BleepinComputer published a story on a company named Telus Digital being compromised by a Threat Group operating under the moniker "ShinyHunters', a reference to Pokemon.
GTIG (Google Threat Intelligence Group) has been tracking ShinyHunters under the label UNC6395.
UNC6395 has been targeting enterprise organizations since at least August, 2025 by exploiting compromised OAuth tokens to gain access to company SalesForce instances. Upon successful compromise, UNC6395 attempts vertical or horizontal movement by combing through the compromised SalesForce data.
At a currently unknown time, UNC6395 successfully compromised Telus' SalesForce instance which allowed them to pivot elsewhere within the organization.
The amount of data UNC6395 claims to have compromised is astronomical. They claim to have exfiltrated over ONE PETABYTE of data (compressed as .tar.xz). While Telus has confirmed the compromise, the exfiltration of ONE PETABYTE of data indicates the compromise may have occurred weeks, possibly months, ago. Telus as of this writing has not given additional details on the compromise (more on that later).
I am unable to confirm the validity of the data, primarily because I do have the means to reliably comb through a petabyte of data. However, "snippets" and "samples" have been shared. Based off data seen, the compromised appears authentic. Here is a high-level overview of what was allegedly compromised and successfully exfiltrated.
- Employee Full Legal Name
- Employee National ID Number and/or SSN
- Telus hashed passwords, API keys, OAuth tokens
- Call record details
- Call meta data
- Telecom customer PII (First Name, Last Name, Address)
- HR records
- Agent performance records
- SalesForce accounts, contacts, leads, and records
- Financial records (ACH routing numbers, etc)
- GitHub repository access to an additional 20 organizations adjacent to Telus (20,000 internal source code projects)
- Customer and Agent call records in .wav
- 14,139 customer database instances, all containing customer PII (unspecified)
- GLEAN TELUS background check files. UNC6395 has access to FBI, RCMP, and CISA background checks.
- GLEAN TELUS confidential reports on investigations
- GLEAN TELUS confidential reports on tax filings (?)
- ... just search "GLEAN" on Google
If what UNC6395 states is true, this breach impacts approx. 230M companies across the globe. Based on information seen publicly, ... it looks bad.
However, as of this writing, Telus has not done anything other than confirm the compromise with some journalists. I suspect they're currently performing a DFIR (Digital Forensics and Incident Response) and forming a strategy to combat this technologically, legally, logistically, and PR-wise.
Is UNC6395 telling the truth? Is this compromise as severe as it appears to be? When will TELUS provide more details? Will impacted customers be notified? Is law enforcement mad their background checks are allegedly compromised?
Find out next time on Dragon Ball Z
I'm not joking. I actually have no idea how I learned. It just magically clicked once I learned a bunch of other stuff. It's partially why I suck at reverse engineering, I have huge knowledge gaps due to lack of actually studying
Читать полностью…
Sam Altman is very silly and whimsical.
In a recent interview he proposed the idea of AI usage being metered, similar to electricity usage or water usage.
Can I go a WEEK without one of you NERDS involving me in some sort of international cybersecurity incident?
Someone compromised something owned by NSO Group (Israeli spyware company) and added vx-underground to the development team
I'M TRYING TO BE SEMI-NORMAL. I HAVE A BABY.
Fuck Telegram and them not formatting my messages correctly.
I'll cross post my schizo rant later.
Does your child check the weather?
Well think again, because pedophiles also check the weather. If your child checks the weather they may be a victim of sexual exploitation.
Yesterday Troy Hunt shared this photo online. You have to do age verification to check the weather.
I just used AI to make a hyper dimensional quantum telepathic crystalization machine powered by soy sauce with dog fooding red white black trees
Читать полностью…
If you're curious what a basic position independent polymorphic mutation engine looks like in C (compiled as C++), this is what it looks like.
I'll do a write up later.
https://gist.github.com/vxunderground/75993f13f4e53fe1c551508cf2ddafe1
Ah, it appears he knew it was going to get seized
Читать полностью…
We need to have a talk.
Some of you send me e-mails, or DMs, calling me "a cat". You say, "stinky cat", or "dumb cat", or "I know you're a cat".
What the fuck kind of psyop is this? It's not just one person, it's actually a lot of people.
I'm a human being, goddammit
AceCareer-dot-edu WordPress site has been compromised and is currently being used to host malware.
Ace is a high education institute in Manhattan, NY.
I said, "omg theyre using higher educational institutes to deliver malware".
Then I saw their university campus.
United States government big mad this week as a whistleblower leaks government documents on the internet.
Basically, the Department of Interior documents leaked showed the United States government plans on removing themes from National Parks about African American stuff, LGBT stuff, Climate Change, etc.
A Spokesman from the Department of Interior has stated the documents are edited and are intentionally misleading.
The biggest surprise is these documents were not leaked onto World of Tanks
Today the Israel government dropped flyers over the people of Lebanon.
The Lebanese government warned citizens to not scan the QR codes because they were concerned it could be a way for the Israel government to compromise peoples phones.
I said, "WHAT THE FUCK. FREE MALWARE?" I IMMEDIATELY scanned it. I didn't even hesitate.
All it did was link me to some goofy WhatsApp thingy (I don't have WhatsApp) and it linked me to something called Unit504 on Facebook.
> be uk government
> make web portal for doing taxes
> companieshouse
> click file for different company
> enter company number
> prompt for auth
> hit back button 3 times
> authentication bypassed
> ???
> full information leaked
> can modify company details for uk gov
> ???
I have been informed I misread and used the wrong UNC number. Now people are calling me a doofus and a dumb cat (I'm not a fucking cat wtf)
Читать полностью…
A really really big company was confirmed to have been compromised. They primarily handle work-force outsourcing and call-center stuff.
The amount of data this company possessed was SICKENING and over ONE PETABYTE of data was stolen.
I'll do a write-up on it later. It'll take me 45 minutes to discuss everything that was stolen and how many things it impacts.
Dawg, we have GOT TO STOP giving random companies user data.
"hey smelly how do i learn malware reverse engineering?"
I DONT KNOW.
I never took classes, I barely read any books on it. I learned C, malware dev, then I somehow magically learned asm and reverse engineering
I learned backwards. You figure out a better way
IDF, Netanyahu, don't bomb my house. I DIDN'T DO FUCKING SHIT
Читать полностью…
International Cyber News Digest, or whatever the account was called, got banned from Xitter. It is currently not known why. His ban is mysterious like a mysterious guy in a mysterious thing (I'm good with analogies).
He was banned in the wake of the Threat Actors who compromised the Syrian government social media profiles.
Him and I were banned at roughly the same time. However, I was immediately unbanned. He was not unbanned.
He has filed multiple appeals yet they are denied. Additionally, he is not provided a reason why is banned from the platform.
He has been messaging every day since the ban trying to make sense of his ban. He has formally requested I assist him. He told him me if I can determine why is banned, or help him get unbanned, he will provide me with pizzas. Yes, this is plural. This is more than one pizza.
Hence, I am now using my large platform to state something akin to "Free my boy, International Cyber News Digestion, he's innocent, he didn't do anything wrong!"
I unironically believe his ban was incorrect and the result of a botched AI system. However, my protest is driven by my desire to consume foods high on saturated fat and grease.
FREE MY BOY INTERNATIONAL CYBERSECURITY NEWS DIGESTIVE SYSTEM
HE DIDNT DO ANYTHING WRONG
In you case you missed it: Accenture has purchased Ookla (SpeedTest and DownDetector) for $1.2 Billion
https://newsroom.accenture.com/news/2026/accenture-to-acquire-ookla-to-strengthen-network-intelligence-and-experience-with-data-and-ai-for-enterprises
Yesterday Florida Attorney General James Uthmeier confirmed legislation has passed which explicitly forbids individuals under the age of 14 from being on social media.
However, no information has been produced which states how social media and/or tech companies will reliably ensure people under the age of 14 are not on social media.
The most likely answer is social media and/or tech companies will do age verification using drivers license and/or passport.
If companies do not comply with the new legislation they will be sued and/or criminally prosecuted.
This will inevitably result in social media and/or tech companies in general to advocate for age verification at the Operating System level (as Mark Zuckerberg has already stated multiple times on the record).
This will shift legal liability away from them.
If the social media websites successfully persuade government authorities to move toward OS-based age verification, this will bind your identity to your Operating System in the age of AI.
Also, VirusTotal AI summary thingy was able to piece part of it together
https://www.virustotal.com/gui/file/5164562448d3a5196cb1477f63082d7c9ed73a40c73dff2b46031db1cc83ebbf
It's International Women's Day.
Thank women for raising the age of consent.
One of the biggest activists groups for raising the age of consent was the Women’s Christian Temperance Union.
In the 1800's the age of consent in the United States was 10. In some states, such as Delaware, it was 7.
The WCTU pushed heavily to protect women from sexual exploitation, prostitution, and physical violence.
Obviously the history is more complex than just one group of women did something, but they were a major driving force.
Pic unrelated
Holy shit, Arion Kurtaj, the guy from LAPSUS who did the Rockstar Games compromise, smuggled a phone into prison
(This is all over Rockstar forums, bro burned himself again)
malwrhunterteam discovered this. Someone should probably tell AceCareer-dot-edu they're hosting malware in their wp-includes/certificate directory.
Читать полностью…
War Thunder*, sorry. I made a mistake. I'm not big brain. Please stop bonking me. I'm sorry
Читать полностью…
Okay, I'm tired of writing now. Here are some other topics to schizo rant about later:
- Why mutation engines are less common now
- How mutation engines are effective and also not effective
- How you can make code change
- Different types of mutation engines
- Mutation engines in different programming languages
- Why some things are engines and why some aren't
- Anime