We've updated the vx-underground Windows malware paper collection
- 2022-03-11 - AV and EDR Evasion Using Direct System Calls
- 2023-04-18 - Process injection in 2023 - evading leading EDRs
- 2023-07-25 - Prefetch - The Little Snitch That Tells on You
https://vx-underground.org/
- 2022-03-11 - AV and EDR Evasion Using Direct System Calls
- 2023-04-18 - Process injection in 2023 - evading leading EDRs
- 2023-07-25 - Prefetch - The Little Snitch That Tells on You
https://vx-underground.org/
🫡35❤🔥8👍4❤2🔥2
Yeah, we got compromised by APT29, but luckily MalwareBytes™ FREE AV stopped the Kremlin in their tracks! To be extra safe, we swung by the local Hilton Hotel and used their WiFi to install it
🤣121😁10❤8🔥2🤓2
Everyone knows Russians can't visit Hilton Hotels. They're too decadent. They instantly explode and turn into sand.
🤣87😁8🤔5❤🔥3💯3👍1😢1🎉1🤓1
The vx-underground podcast - but instead of discussing anything technical or meaningful we mumble incomprehensible nonsense for an hour and express our misanthropy in form of creative dance
👍55😁13❤5🥰3🤝2🔥1
Windows has 3 different types of boolean values.
typedef int BOOL
typedef BYTE BOOLEAN
typedef short VARIANT_BOOL
*BYTE is defined as an unsigned char
When setting VARIANT_BOOL you cannot use TRUE or FALSE. You need to use VARIANT_TRUE or VARIANT_FALSE
Have a nice day.
typedef int BOOL
typedef BYTE BOOLEAN
typedef short VARIANT_BOOL
*BYTE is defined as an unsigned char
When setting VARIANT_BOOL you cannot use TRUE or FALSE. You need to use VARIANT_TRUE or VARIANT_FALSE
Have a nice day.
🤓88🤣25🔥13🤯11❤10👍8🫡8😱6😢5🤔3😁2
Another 116,024 malware samples queued and ready for upload into the VXDB 🫡
*Our VXDB is free for everyone to use
*You can download and search samples
*Bulk download coming (eventually)
https://virus.exchange
*Our VXDB is free for everyone to use
*You can download and search samples
*Bulk download coming (eventually)
https://virus.exchange
👍26❤12🙏3🥰2🫡2
We were just informed that a member of vx-underground lost two family members in Maine yesterday. A cousin and a nephew were the victims of a very sick person.
We will be inactive for the next couple of days.
We will be inactive for the next couple of days.
😢369🫡71❤48🙏30😱7😁5🤣5🎉3🤔2🤯2😇1
Yesterday Lockbit ransomware group listed Boeing on their victims list. Boeing is a multinational American company with an estimated annual revenue of $66,610,000,000. They have over 150,000 employees worldwide. Boeing serves both the public and private sector.
We spoke with Lockbit ransomware group administrative staff yesterday regarding Boeing. They informed us that they have not yet spoke with a representative from Boeing and they will not disclose any information to us about Boeing - more specifically they would not give us insights into how long they had access to Boeing, how much data was exfiltrated, what kind of data was stolen, etc.
Lockbit stated their ransomware affiliate got access using a 0day exploit. However, Lockbit would not elaborate further on this exploit hence we cannot verify the legitimacy of these claims.
It is also probably worth noting that most victims listed by Lockbit are given 10 days (or more) to begin negotiations. Lockbit gave Boeing less than 6 days
We spoke with Lockbit ransomware group administrative staff yesterday regarding Boeing. They informed us that they have not yet spoke with a representative from Boeing and they will not disclose any information to us about Boeing - more specifically they would not give us insights into how long they had access to Boeing, how much data was exfiltrated, what kind of data was stolen, etc.
Lockbit stated their ransomware affiliate got access using a 0day exploit. However, Lockbit would not elaborate further on this exploit hence we cannot verify the legitimacy of these claims.
It is also probably worth noting that most victims listed by Lockbit are given 10 days (or more) to begin negotiations. Lockbit gave Boeing less than 6 days
🔥75😱19🎉9👍7❤2👏1💯1🤣1😎1
This media is not supported in your browser
VIEW IN TELEGRAM
ZachXBT, an independent cryptocurrency investigator who monitors and tracks cryptocurrency scams, received a video from a group of scammers. They got full bottle service last night, somewhere in Canada, and held a sign taunting him with "ZachXBT is watching".
😁81🤣69❤🔥8🤯5❤4🎉4😢2🤔1😱1😇1
This media is not supported in your browser
VIEW IN TELEGRAM
Around July, 2023 an individual operating under the alias "Blue" and "Trout", successfully phished someone and stole $213,000 from the victim.
They subsequently paid a group of men to dance and thank the victim for the money.
They subsequently paid a group of men to dance and thank the victim for the money.
🤣201😁15👍11😢11❤5🔥5