vx-underground
46.1K subscribers
3.96K photos
421 videos
83 files
1.45K links
The largest collection of malware source, samples, and papers on the internet.

Password: infected

https://vx-underground.org/
Download Telegram
October 20th security researcher rivitna2 noted the return of HIVE ransomware rebranded as Hunters International. Additionally, BushidoToken noted a 60% code overlap between Hunters International and HIVE.

Hunters International denies the allegations ¯\_(ツ)_/¯
😁38👏3😱1
tl;dr "we are not HIVE, but we have their code"
😁60🫡6🤓5👍2❤‍🔥1
We've updated the vx-underground Windows malware paper collection

- 2022-03-11 - AV and EDR Evasion Using Direct System Calls
- 2023-04-18 - Process injection in 2023 - evading leading EDRs
- 2023-07-25 - Prefetch - The Little Snitch That Tells on You

https://vx-underground.org/
🫡35❤‍🔥8👍42🔥2
Yeah, we got compromised by APT29, but luckily MalwareBytes FREE AV stopped the Kremlin in their tracks! To be extra safe, we swung by the local Hilton Hotel and used their WiFi to install it
🤣121😁108🔥2🤓2
Everyone knows Russians can't visit Hilton Hotels. They're too decadent. They instantly explode and turn into sand.
🤣87😁8🤔5❤‍🔥3💯3👍1😢1🎉1🤓1
🤣120🔥38😱107🫡6❤‍🔥5🤓4😇4😎4👍1😢1
The vx-underground podcast - but instead of discussing anything technical or meaningful we mumble incomprehensible nonsense for an hour and express our misanthropy in form of creative dance
👍55😁135🥰3🤝2🔥1
Media is too big
VIEW IN TELEGRAM
vx-underground staff for the entire podcast:
🔥34🤣205👍2
Windows has 3 different types of boolean values.

typedef int BOOL
typedef BYTE BOOLEAN
typedef short VARIANT_BOOL

*BYTE is defined as an unsigned char

When setting VARIANT_BOOL you cannot use TRUE or FALSE. You need to use VARIANT_TRUE or VARIANT_FALSE

Have a nice day.
🤓88🤣25🔥13🤯1110👍8🫡8😱6😢5🤔3😁2
We are actively working on a guide for enterprise environments. It is titled: Prevention, Extortion, 'n' Information Security.

Here is a preview:
🤣49😁14🔥10❤‍🔥5🫡32👍2🤯1😱1😢1
It's 2023. What the hell is going on over there in Australia?
🤣121😱8👍4😁4🤯43🤔3
Ccleaner was compromised and (limited) user data was exfiltrated. Luckily they're offering BreachGuard for 6 months! That's good, right?

... right?

Image via troyhunt
🤣89😱8🎉5👍3
July 19th, 2010: Siemens PCS forum discussing Stuxnet
🎉53🤓23🔥5😱4👍2👏2
Another 116,024 malware samples queued and ready for upload into the VXDB 🫡

*Our VXDB is free for everyone to use
*You can download and search samples
*Bulk download coming (eventually)

https://virus.exchange
👍2612🙏3🥰2🫡2
Sometime in 2021 we were contacted by an incredibly angry person. He was upset we did not 'defang' our malware samples.

He informed us he executed ransomware on his host machine and all of his data was locked.
🤣241😁37😢13🫡11🔥7👍5👏5🤯42🤔2
We were just informed that a member of vx-underground lost two family members in Maine yesterday. A cousin and a nephew were the victims of a very sick person.

We will be inactive for the next couple of days.
😢369🫡7148🙏30😱7😁5🤣5🎉3🤔2🤯2😇1
Yesterday Lockbit ransomware group listed Boeing on their victims list. Boeing is a multinational American company with an estimated annual revenue of $66,610,000,000. They have over 150,000 employees worldwide. Boeing serves both the public and private sector.

We spoke with Lockbit ransomware group administrative staff yesterday regarding Boeing. They informed us that they have not yet spoke with a representative from Boeing and they will not disclose any information to us about Boeing - more specifically they would not give us insights into how long they had access to Boeing, how much data was exfiltrated, what kind of data was stolen, etc.

Lockbit stated their ransomware affiliate got access using a 0day exploit. However, Lockbit would not elaborate further on this exploit hence we cannot verify the legitimacy of these claims.

It is also probably worth noting that most victims listed by Lockbit are given 10 days (or more) to begin negotiations. Lockbit gave Boeing less than 6 days
🔥75😱19🎉9👍72👏1💯1🤣1😎1
We received our latest paycheck from Twitter. It is a mind boggling $39.36.

We do not believe this is sufficient enough to donate to a non-profit. Instead we will use this to giveaway 3 copies of Black Mass Volume II.

We will share information on this giveaway later.
80🔥16👍6😱4🤓4😎4🤝3
This media is not supported in your browser
VIEW IN TELEGRAM
ZachXBT, an independent cryptocurrency investigator who monitors and tracks cryptocurrency scams, received a video from a group of scammers. They got full bottle service last night, somewhere in Canada, and held a sign taunting him with "ZachXBT is watching".
😁81🤣69❤‍🔥8🤯54🎉4😢2🤔1😱1😇1
🤣127🔥27😁15🤓7👍6🤯3😇3😎3🤔2💯2😘2
This media is not supported in your browser
VIEW IN TELEGRAM
Around July, 2023 an individual operating under the alias "Blue" and "Trout", successfully phished someone and stole $213,000 from the victim.

They subsequently paid a group of men to dance and thank the victim for the money.
🤣201😁15👍11😢115🔥5