vxunderground | Unsorted

Telegram-канал vxunderground - vx-underground

40630

The largest collection of malware source, samples, and papers on the internet. Password: infected https://vx-underground.org/

Subscribe to a channel

vx-underground

There is a phenomenon called "reduced proprioceptive monitoring".

When humans lock in hardcore and enter the "flow" state, time becomes distorted, weird science stuff occurs, but also the human body does weird stuff too.

The brain says, "body not important, need more focus". This results in peoples body contorting to unusual positions when focused. Most notably, them leaning forward, the shoulders tucked in, the neck "craning".

It happens with basically anything that requires intense focus. It is probably most recognized by people who work in the computer related fields (information technology, cybersecurity, etc). However, it also impacts surgeons, watchmakers, dentists, electrical engineers, jewelers, tattoo artists, animators, air traffic controllers, pilots, paleontologists, ... and more.

tl;dr have u ever locked in so hard ur entire body hurts?

Читать полностью…

vx-underground

> listening to music while work
> new band recommendation
> "vended"
> lol vending machine?
> song plays
> wtf this sounds just like corey taylor
> (lead singer of slipknot)
> google "vended"
> lead singer is griffin taylor, son of corey taylor

corey must be so proud omg

Читать полностью…

vx-underground

wtf just opened my door and found these weird looking bugs. anyone know what these are?

Читать полностью…

vx-underground

Hello, Tiny People Living Inside My Computer,

I have added more malware to malware city. It's a lot. I didn't add it up. It's like, 300,000 malwares, or something, I don't know.

Thanks and enjoy your Tuesday

https://vx-underground.org/Updates

Читать полностью…

vx-underground

I HATE COMPUTER NETWORKING

Читать полностью…

vx-underground

Hello,

I appreciate everyone who offers to buy me a beer, or something, if I ever attend a cybersecurity conference. I understand the gesture and I understand it is in good faith.

Unfortunately, in a past life I had a pretty bad drinking problem (and kind of a gambling problem). I've been sober for 11 years.

Thank you

Pic unrelated

Читать полностью…

vx-underground

For those who don't get it because they're unfamiliar with Europe, or history, or live under a rock like Patrick Star: Yugoslavia hasn't existed since 1992.

Читать полностью…

vx-underground

Okay, I'm done schizo ranting about being a Dad.

Back to your regularly scheduled programming of malware and kitty cats.

I just wanted to share this with someone, even if it means screaming into the void of the internet, because I don't have many friends in real life anymore who I can schizo rant about stuff to (I'm old).

Читать полностью…

vx-underground

This one year old post has been bothering me.

I felt great discomfort someone hasn't been demented enough to do HTTP stuff as close to the metal as possible with the Windows sockets API (in regards to malware stuff).

I'm not done yet, this code is ... sort of(?) ... in a debug state.

This code connects to HTTPBin, performs a TLS handshake, verifies the web certificate, then performs a simple HTTP GET. The way my code is organized the stage is set to perform HTTP POST to demonstrate data exfiltration to a remote HTTP host.

The next step is basically taking a file, reading it to memory, then uploading it to a remote host and ensuring it was received successfully.

Following the completion of the HTTP post, I'll transform the entire code base into being more position independent. In other words, trying to recreate Windows APIs (like QueryContextAttributesW) to avoid unnecessary (not really "unnecessary", but less hooking opportunities, looks unusual) abstractions. I'll also manually recreate GetProcAddress and do string hashing because ???

When I'm done with this low-level Windows socket C HTTP post example, this code base will probably be well over 3,000 lines of code.

tl;dr 3,000 lines of C or 12 lines of Python code (I tested it, it's literally 12 lines of Python code).

The code so far:

https://gist.github.com/vxunderground/f55edb02b0dbda148f9a3b88669b23c8

Читать полностью…

vx-underground

> be Dmitry Yuryevich Khoroshev
> bounty of $10,000,000 by FBI
> believed to possess of $4,000,000,000 as a result of criminal extortion
> linked to botnets, money laundering, the russian government, bullet proof hosting
> tries to contact me
> send weird cat videos

imagine unironically being like, a fucking cyber cartel boss and some fucking retard american just keeps sending you cats

Читать полностью…

vx-underground

Today ALPHV ransomware group (who swears they've never rebranded) informed me they've made a new ransomware group with a new and cool and badass name.

I learned a few things.

1. ALPHV follows me on social media. They pay attention to my posts (including kitty cat pictures).

2. ALPHV informed me that they're no longer going to use TOR for ransomware leaks or negotiations because "the FBI can fuck it". Instead everything they do will be stored on the blockchain.

Using the blockchain for malware, and malware accessories, isn't a new malware concept, however it is a relatively ... rare ... or more exotic TTP. If my memory serves me correctly (which it rarely does), the North Korean government has used cryptocurrency blockchains for malware delivery mechanisms and C2 persistence.

They told me they'll be using ICP (Internet Computer Protocol) blockchain.

I initially thought they meant "Insane Clown Posse" blockchain. For a brief moment in time I thought the Juggalos were getting involved in ransomware.

I'm not a cryptocurrency nerd, but they said they use ICP blockchain because ICP can "run smartcontract on server". I have no idea what this means.

What does all of this mean? I don't know. I've been out of the loop on cybercrime TMZ.

Читать полностью…

vx-underground

> It's the year 2026
> Future_af_boi.exe
> Anyone can make anything, or something
> Can bring ideas to life easily
> Vibe coded app leaks these magical ideas
> Look inside

Читать полностью…

vx-underground

Troy Hunt from HaveIBeenPwned seeing 198 vulnerable apps (and counting) exposing user PII (he's going to be busy for months)

Читать полностью…

vx-underground

It's the slopocalypse.

OSINT nerd Harrris0n has created "Firehound". He (or others, I don't know) have begun the daunting task of hunting AI slop in the Apple app store.

They have identified (as of this writing) 198 iOS apps which leak information on users (in some capacity). Unsurprisingly, the top are all related to AI.

The top currently leaking user data is "Chat & Ask AI by Codeway" which has exposed 18M users information including:
- Name
- Email
- Creation date
- Messages (sent, received, content, etc)
- Voice chats
... anything you've said to this AI agent is exposed. It is 400,000,000+ messages... (Image 1, redacted)

Next up up on the slop-o-meter is "YPT - Study Group" which currently exposes over 2M users information including:
- AI tokens
- User ID
- User Key
- Chats (sent, received, content

This is all AI slop for things under education, entertainment, graphic design, health and fitness, "lifestyle", social networking, and more.

Some of the stuff is present is absurd. Harrris0n notes the presence of people doing CSAM (child pornography) related things with the AI agents. (tl;dr pedophiles identifying information currently leaking online) ... as well as "LooksMaxxing" stuff (???).

It's an infinite blackhole of user personable identifiable information, beside just names, emails, etc, but also their personal conversations with AI agents.

It's the slopocalypse.

See for yourself:

https://firehound.covertlabs.io/

Читать полностью…

vx-underground

More information about Threat Actor Group (TAG) 150:

https://www.recordedfuture.com/research/from-castleloader-to-castlerat-tag-150-advances-operations

Читать полностью…

vx-underground

im so old my favorite musicians have children who are musicians

its all ogre

Читать полностью…

vx-underground

It appears some cryptocurrency nerds have unironically made a vx-underground cryptocurrency coin-thing (I have no idea how this works).

They've performed some sort of nerd analysis and have concluded I am an ideal candidate for something, I don't know (see attached image for their nerd analysis).

What does this mean? Nothing.

I don't trust magic internet money. I'm not going to authenticate my social media profile to cryptocurrency websites. I'm not going to do anything.

Feel free to use the weird cryptocurrency thing, or don't, I don't care

I'm not a financially motivated person, I don't intend to "claim" the cryptocurrency coin. I don't intend on "getting the bag". I am going to resume work on collecting malware, coding, and posting silly pictures of kitty cats.

Enjoy your Wednesday

Читать полностью…

vx-underground

The last thing you see before you leak state secrets to the Kremlin

Читать полностью…

vx-underground

I need to admit something I'm ashamed of.

I have a deep love for silly cat AI slop. I know it's slop. I know RAM sticks cost $156,000 and require a small business loan. I know it's not real.

... it's just so silly. Look at this fuckin thing

Читать полностью…

vx-underground

just received an email from my ISP saying downloading illegally is illegal

Wtf since when???

Читать полностью…

vx-underground

My post about the Russian dude visiting North Korea has escaped my core audience and I've got a bunch of random people being like, "PfffT tHaT dIdNt HaPpEn"

What the fuck?

Do you think I'm some kind of anti-North Korean account and I'm dedicating my free time to anti-North Korean posts?

Why would I (or anyone for the matter) go out of their way to lie about something visually documented on YouTube?

Whenever I didn't IMMEDIATELY respond for requests to a link for the video, people began being like, "sEe? iT dIdNt HaPpEn!". Yeah, bro. Let me drop everything I'm doing with my work, and my family, to argue with you fucking dorks on the internet.

I know I shouldn't be this annoyed... but there has been a few occasions now where when I mention North Korea I've got a bunch of schizos trying to disprove anything remotely critical of North Korea. I can't tell if it's unironically a psyop or deranged basement dwellers.

Here's the video, you jackass:
https://www.youtube.com/watch?v=inebLA3HqPo

Читать полностью…

vx-underground

I was watching this YouTube video of this Russian dude who traveled to North Korea to go sightseeing.

North Korea is notoriously strict on what visitors can and cannot do. Throughout most of the trip he risked his own safety by illegally filming around North Korea on his cell phone.

At one point during the trip he managed to sneak away from his appointed North Korean tour guide. He approached a group of people sitting down, ... just kind of hanging around ..., doing something.

They were very friendly to him.

During the conversation he asked them what they'd like to do in the future. One of the men said, "I hope some day to travel. I really want to see Yugoslavia"

The fuckin' Russian guy looked at him like this when he said "Yugoslavia"

Читать полностью…

vx-underground

My baby boy is the difficult age where he is learning several things simultaneously:

- How to grow teeth
- How to crawl
- Proto-communication

If you've never had a child, around 7 - 9 months (or later, each baby is different, but that's the average-average) babies will begin proto-communication.

They've picked up on people talking, and communicating back and forth, they understand the concept of sentence structure and vocal inflection being indicative of a question. They—understand—you—pausing—between—words, or pausing and waiting for someone to reply back verbally.

My baby boy now tries to join in conversations because he doesn't want to feel left out. He doesn't understand we're having a conversation, he doesn't even understand words, but he understands the "prototype of communication", hence now, seemingly out of nowhere, he inserts himself into our conversations by screaming like a psychopath and babbling incoherent nonsense.

He favorite "word" is blowing raspberries (pressing your lips together and blowing) and "ge-ge-ge" (think of the GE in "geese") or quite literally screaming as loud as he can.

Another interesting thing about proto-communication is he tries to initiate conversations now. Unfortunately, he does not possess manners. Additionally, he does not respect me as a person, place, or thing. This results in him attempting to start conversations with me, while I'm asleep, at 3 in the morning.

It's very interesting watching my baby boy grow. I remember when my wife first got pregnant and we confirmed the pregnancy visually via ultrasound. He was tiny, probably no greater than the size of a pea. His fetus kind of looked like a little sea horse, or something, and under the ultra sound we could see his little heart beating.

Now we look at him. He is much larger than a pea. He no longer looks like a sea horse (thankfully). He is screaming in my face at 3 in the morning because he wants to "talk". If he isn't screaming at my face at 3 in the morning, he's practicing his hand-eye coordination by trying to feed himself ... by putting food all over his face ... or in his pants ... or in his hair ...

As difficult as it can be being a parent, and as much as you "suffer", there is something oddly rejuvenating about the experience and it somehow (in ways I don't understand yet) makes you feel young again.

Читать полностью…

vx-underground

Iran has had a complete internet blackout for 300 hours now (12.5 days).

Imagine not having anime for 12.5 days

Читать полностью…

vx-underground

Yes, Dmitry Yuryevich Khoroshev, the alleged leader of Lockbit ransomware group, FBI Most Wanted, and sanctioned by the United States Department of Treasury, was attempting to contact me online.

For months I believed him to be an imposter.

This is what I kept sending him:

Читать полностью…

vx-underground

I've been receiving messages from both Lockbit ransomware group and ALPHV ransomware group for months.

I've been so preoccupied with my newborn son I thought it was an imposter.

They've been trying to tell me stuff, and I just kept sending cat pictures. They eventually gave up and started replying with pictures of cats too.

¯\_(ツ)_/¯

Читать полностью…

vx-underground

Look at this and tell there is a God

https://gist.github.com/vxunderground/52cd17f363f83792243be814c1e85b30

Читать полностью…

vx-underground

I deleted previous post and decided to do a mini-write-up for people too lazy to explore themselves, provide key insights, and also give Harrris0n credit for his work.

Читать полностью…

vx-underground

Big news coming later today. It'll be the slopocalypse.

I don't feel like writing about it right now, because I'm tired from a teething baby with sleep regression, but basically all these fucking AI vibe coders are using Firebase and like, 22,000,000 records are exposed, or something, an outrageously high number.

Also, a disgustingly high amount of people trying to use AI for CSAM.

It's not my research, it's someone else's, but I want to give them a proper shout out and explanation of their work.

I cannot stress this enough: DO NOT TRUST VIBE CODERS. DO NOT DO IT. AI CODE IS NOT SECURE. DO NOT DO IT. STOP THE SLOP.

Читать полностью…

vx-underground

We've solved the mystery. Who's That Pokemon? It's CastleRAT a/k/a TAG-150!

Okay, here is the drama and scoop, or whatever. I don't know if anyone cares, but this has been a really interesting puzzle with lots of twists and turns.

Previously malwrhunterteam discovered an unusual malicious .MSI file called "TopWebComics". It dropped an obfuscated .JS file.

nullableVoidPtr deobfuscated the malicious .JS, I reverse engineered it and named it "Smokest Stealer". However, Kali3ndo went off my research notes and discovered that Smokest drops an additional malicious .PS1 file when Smokest connects to the C2.

The malicious .PS1 file drops a malicious .PY file, encoded with PyArmor. The Python script extracts a payload from a .JPEG.

After reviewing it, poking it with a stick, and having all sorts of fun, it turns out this payload was first noted by YungBinary in August, 2025. This payload is CastleRAT (and tracked as TAG-150 by RecordedFuture).

CastleRAT payload found January, 18th:
8d2e77912e2e1d9d8cafb76d4562686cfaad556ca1df1919bfba304b31193402

"Smokest Stealer" MSI:
5a1c14335d0a8b007ff2813e6ef738e8836be38257cc82fe03c02b71d71e1b01

"Smokest Stealer" JS:
29e13df9547d4e85e7ca3fc5b95eab90f56a233aabc406638bee2ded368acd3d

Thank you to my peers and colleagues for reversing this with me throughout the day and having fun with it. This was a very silly malware sample.

Читать полностью…
Subscribe to a channel