The newest @nico_n_art swag is absolutely disgusting
*not vx-underground merchandise
*purchases of this merchandise DOES NOT support us
*purchases of this merchandise DOES support our friend
https://transi.store/
*not vx-underground merchandise
*purchases of this merchandise DOES NOT support us
*purchases of this merchandise DOES support our friend
https://transi.store/
π€‘20π8π₯8π€£4π3π2π1
Due to the absurd volume of people DMing me - we have re-opened the chatroom. We are in search of moderators who will actively monitor chatroom and nuke nerds who disobey the rules.
Here, have your dumb chatroom back, please stop asking us about it: https://t.iss.one/+80U_oTH2thk3ZDYx
Here, have your dumb chatroom back, please stop asking us about it: https://t.iss.one/+80U_oTH2thk3ZDYx
π28π6π€‘5π3π1
APT groups do not need to commit espionage to monitor foreign military threats. All that is required is making a WarThunder forum account
π28β€4π1π€‘1π1π1
Yesterday someone claimed to have successfully breached vx-underground.
They sent us footage of the attack. We have no idea what is going on in this footage.
Video link: https://streamable.com/6nnhd3
They sent us footage of the attack. We have no idea what is going on in this footage.
Video link: https://streamable.com/6nnhd3
π€‘56π₯±6π€£6π€ͺ4π1π1π±1π³1π1
Google malvertising campaigns are becoming an increasingly widespread (and seemingly effective) method of initial access.
Researchers 1ZRR4H and malwrhunterteam have identified malware campaigns for Ursnif, Redline, Cobalt Strike, and Rhadamanthy in Google ads.
Researchers 1ZRR4H and malwrhunterteam have identified malware campaigns for Ursnif, Redline, Cobalt Strike, and Rhadamanthy in Google ads.
π9π4
As we mentioned a few days ago, corg_e and Nico_n_art would result in some weird mixture of traditional vx-underground dark art with kawaii, or something weird, whatever
*Images via Nico_n_art inspired by corg_e
*Images via Nico_n_art inspired by corg_e
π₯32β€12π€‘7π5π©5π₯°3π€―2π2π₯±1π1
This media is not supported in your browser
VIEW IN TELEGRAM
As more and more people discuss malicious Google ads we have decided to produce a small video illustrating how malvertising campaigns deploy malware to steal user data
π€£32π5π3π€‘3π1
We've updated the vx-underground "InTheWild" collection. We have added volumes 0030 - 0034. It is 100,000 new and unique malicious binaries.
Special thanks to petikvx and our mystery donor for the samples.
Check it out here: https://samples.vx-underground.org/samples/Blocks/
Special thanks to petikvx and our mystery donor for the samples.
Check it out here: https://samples.vx-underground.org/samples/Blocks/
β€15π1
"someone is going to hack vx-underground and upload malware onto it"
lol sweet free malware
lol sweet free malware
π€£77π₯°13π7π€‘3π2π₯2π2π2π€©1π1
Several days ago Riot Games announced they were victim to a "social engineering attack". They stated they were being extorted for $10,000,000. Riot Games refused to pay the ransom
The source code to League of Legends is now up for sale online
The source code to League of Legends is now up for sale online
π€ͺ50π5π3π2
The individual responsible for the Riot Games breach has given us more information
- Social engineered an employee via SMS
- Initial goal was stealing Vanguard
- They pivoted through the network, was unable to get Domain Controller
- SOC detected them in approx. 36 hours
- Social engineered an employee via SMS
- Initial goal was stealing Vanguard
- They pivoted through the network, was unable to get Domain Controller
- SOC detected them in approx. 36 hours
π
37π9π6
vx-underground
The individual responsible for the Riot Games breach has given us more information - Social engineered an employee via SMS - Initial goal was stealing Vanguard - They pivoted through the network, was unable to get Domain Controller - SOC detected them inβ¦
- They did not deploy any malware to the network
- Managed to escalate privileges by social engineering a company director
- They stated they would not give us more information at this time, more information will be shared in the following days
There is your free DFIR report
- Managed to escalate privileges by social engineering a company director
- They stated they would not give us more information at this time, more information will be shared in the following days
There is your free DFIR report
β€41π6π4π2β‘1π1
This media is not supported in your browser
VIEW IN TELEGRAM
Threat Intelligence the second a significant breach occurs
π€£65π€‘8π3π2π1
