vx-underground
Lockbit ransomware group was responsible on the recent attacks on the Royal Mail (the British multinational postal service). Images discovered via UK_Daniel_Card
Note/Update: Per BleepinComputer Lockbit ransomware group denies conducting the attack. When we reached out to Lockbit, Lockbit stated they were unfamiliar with the Royal Mail
This is technically possible - the Lockbit Black Builder was recently leaked.
This is technically possible - the Lockbit Black Builder was recently leaked.
👍9🤡5❤2😈1
More malware and more archives in queue.
░░╚══╗░╔═╔════╝
╚═╦═╗╠═╩═╩╗╔═╦═╗
░░║▒╠╣▒▒▒▒╠╣▒║▒║
╔═╩═╝╠═╦═╦╝╚═╩═╝
░░╔══╝░╚═╚════╗
░░╚══╗░╔═╔════╝
╚═╦═╗╠═╩═╩╗╔═╦═╗
░░║▒╠╣▒▒▒▒╠╣▒║▒║
╔═╩═╝╠═╦═╦╝╚═╩═╝
░░╔══╝░╚═╚════╗
👍28🔥13🥰6🤓3😈2🤡1👨💻1
Lockbit ransomware group now claims to be responsible for the attack on the Royal Mail - they claim to have identified the affiliate responsible. They state they are busy and do not have the time to monitor the actions of every affiliate
Intel via BrettCallow and AShukuhi
Intel via BrettCallow and AShukuhi
🤣39😈1
We are happy to report we have not had anyone seriously ask for the password to malware archives in over 30 days.
But, this has been replaced with you filthy degenerate nerds spamming us with password memes.
But, this has been replaced with you filthy degenerate nerds spamming us with password memes.
😁32🍾10👍3❤1🥰1👏1🎉1💋1😈1
JustineTunney has created a 116kb WASM build of Blink that allows you run x86_x64 Linux binaries in a web browser. It supports 500 instructions and 130 system calls.
They are successfully resurrected Linux malware from the dead and god bless
More info: https://github.com/jart/blink/issues/8#issuecomment-1381748163
They are successfully resurrected Linux malware from the dead and god bless
More info: https://github.com/jart/blink/issues/8#issuecomment-1381748163
🥰21😈5🔥3👍2🤡1
vx-underground
JustineTunney has created a 116kb WASM build of Blink that allows you run x86_x64 Linux binaries in a web browser. It supports 500 instructions and 130 system calls. They are successfully resurrected Linux malware from the dead and god bless More info: …
Original thread with more information and insights:
https://twitter.com/JustineTunney/status/1613895681038770182
https://twitter.com/JustineTunney/status/1613895681038770182
🔥2😈1
This media is not supported in your browser
VIEW IN TELEGRAM
A brief video explaining how 0days work
👏65😁40❤7👍7🔥3🤡3🐳2🗿2😈1
If you follow GuidedHacking on Twitter you can watch the owner, Rake, slowly descend into lunacy.
👍11😢8🤡4🥴1😈1
We've updated the vx-underground InTheWild collection. We've added volumes 0029, 0030, and 0031. Thsi is 60,000 unique malicious binaries.
Special thanks to petikvx for the hard work and staying on top of sample aggregation for us.
Have a nice day.
https://www.vx-underground.org/malware.html
Special thanks to petikvx for the hard work and staying on top of sample aggregation for us.
Have a nice day.
https://www.vx-underground.org/malware.html
🔥7😈1
Earlier today Jon DiMaggio released an article titled: "Ransomware Diaries: Part 1". This article is one of the most comprehensive papers on Lockbit ransomware group we have ever seen.
Our personal 2-extra-cents on the paper: the article states the Lockbit Black source code was leaked - this is incorrect. Additionally, the author cites John Hammond for releasing a tweet on the Lockbit Black leak - although the truth is John Hammond archived a tweet we deleted. The image posted in the article is directly from us - we typically use HasteBin to display text-images.
For those questioning why we deleted the tweet: Lockbit is notorious for chasing individuals down, and is sometimes bloodthirsty. We will spare the details - but we decided it would be best to not involve ourselves in ransomware conflict which directly impacts their operations.
We spoke with LB0, the individual who we believe is the troll of LockbitSupp. vx-underground staff and LB0 spoke - we came to a mutual agreement to not leak the Lockbit Black builder until someone else did (if it did). We did not want drama. We are a library, not a battlestation.
Finally, and in conclusion, Jon DiMaggio's paper is wonderful and spot on. Thank you, Jon, for detailing the history and evolution of this group.
Link: https://analyst1.com/ransomware-diaries-volume-1/
Our personal 2-extra-cents on the paper: the article states the Lockbit Black source code was leaked - this is incorrect. Additionally, the author cites John Hammond for releasing a tweet on the Lockbit Black leak - although the truth is John Hammond archived a tweet we deleted. The image posted in the article is directly from us - we typically use HasteBin to display text-images.
For those questioning why we deleted the tweet: Lockbit is notorious for chasing individuals down, and is sometimes bloodthirsty. We will spare the details - but we decided it would be best to not involve ourselves in ransomware conflict which directly impacts their operations.
We spoke with LB0, the individual who we believe is the troll of LockbitSupp. vx-underground staff and LB0 spoke - we came to a mutual agreement to not leak the Lockbit Black builder until someone else did (if it did). We did not want drama. We are a library, not a battlestation.
Finally, and in conclusion, Jon DiMaggio's paper is wonderful and spot on. Thank you, Jon, for detailing the history and evolution of this group.
Link: https://analyst1.com/ransomware-diaries-volume-1/
Analyst1
Ransomware Diaries: Volume 1 | Analyst1
Discover the power of behavioral profiling in understanding ransomware attackers. Uncover motivations and beliefs of threat actors for effective defense.
🔥21👍13😈1
We've updated the vx-underground The Old New Thing archive. We have completed archiving years 2012 and 2011.
We have successfully archived over 10 years of blog posts from Raymond Chen. 7 years are remaining!
Check it out here: https://www.vx-underground.org/the_old_new_thing.html
We have successfully archived over 10 years of blog posts from Raymond Chen. 7 years are remaining!
Check it out here: https://www.vx-underground.org/the_old_new_thing.html
👍11❤2🔥1🤡1🥱1😈1
Reminder: vx-underground will never individually message all 14,000 people that follow this Telegram account ... because we could just send a post a message to relay "crucial information" on our "chan-nel".
👏25👍8🥰8🤯3🤡3💩2😁1😈1
As Microsoft tightens loose ends and macro-based malware droppers become more difficult for Threat Actors to leverage - data traffickers are increasingly abusing SEO poisoning and/or malvertising.
Intel via malwrhunterteam & wdormann
Intel via malwrhunterteam & wdormann
👍27🤡6😈2