vx-underground
47.6K subscribers
4.13K photos
441 videos
84 files
1.49K links
The largest collection of malware source, samples, and papers on the internet.

Password: infected

https://vx-underground.org/
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
June 14th a 22-year-old British man was arrested in Palma de Mallorca, Spain.

Per the official report: the currently unidentified male is alleged to be behind a series of large-enterprise 'hacks' which resulted in the theft of corporate information and allowing an unidentified group to access multi-million-dollar funds.

No information is provided on whether or not this person is involved in ransomware, extortion, information stealers, sim swapping, crypto-draining, etc. The media reports only state he is a 'hacker' who 'stole information' which allowed him and his unidentified group access to access 'funds' ...

¯\_(ツ)_/¯

The suspect was arrested in a joint effort between the United States Federal Bureau of Investigation and the Spanish Police. It was stated he was arrested as he was making an effort to flee Spain to Italy.

A Judge in Los Angeles, California issued a warrant for his arrest.

Media outlets in Spain captured some footage of the arrest. The individuals face is censored. However, and most importantly, at the 0:20 mark a child decides to do a Naruto run in the midst of an international law enforcement take down for the memes.

He also appears to be wearing a Minecraft blanket. 11/10 the kid is a memester.
🤣8310👍8😢7🫡3😁2👏1😍1
Previously on Dragon Ball Z, the Spanish media reported a 'hacker' was arrested via the Spanish Police working in conjunction with the United States Federal Bureau of Investigation.

The individual arrested as a 22-year-old male from the United Kingdom. He was not immediately identified to the media by law enforcement.

Today we received confirmation on this individuals identity and alleged crimes. For the safety and privacy of multiple parties involved (including the accused) we cannot divulge too much information.

The individual arrested operated under the alias 'Tyler'. He is a sim swapper and is allegedly involved with the infamous Scattered Spider group. Most notably he is believed to be a key component of the MGM ransomware attack, and is believed to be associated with several other high profile ransomware attacks performed by Scattered Spider.
🔥49😢7👍2🤣21🥰1
🤣95🥰16💯10👍7😁6😢5🔥32
Good morning,

It's Sunday, the day of rest. We hope all of you had a good week and a good weekend. We'll see all of you Monday morning.
57😎8🫡7👍4
Justin Elze spotted this in the wild. Some fast food drive through menu has a RemotePC client open

Someones gonna pop that 😂😂😂
🤓89😁8👍42😱1😢1
This media is not supported in your browser
VIEW IN TELEGRAM
the zuck and the alt
💯49😁23🤣14🔥5❤‍🔥3😢1
CryptoGrab, a crypto draining service, incorporated as an official company and even attended a conference, gave out merchandise, and advertised. They were present at MAC Affiliate Conference this year in Armnenia

Information via g0njxa
🤣140🤯18👍84🔥3
🤯78🤣31😢11❤‍🔥7🥰7👍5🔥3😁2👏1
Updates to vx-underground

Samples:
- VirusSign.2024.06.10
- VirusSign.2024.06.11
- VirusSign.2024.06.12
- VirusSign.2024.06.13
- VirusSign.2024.06.14
- VirusSign.2024.06.15
- VirusSign.2024.06.16
- VirusSign.2024.06.17

Papers:
- 2024-05-21 - Uncovering an undetected KeyPlug implant attacking industries in Italy
- 2024-05-22 - Deep Dive Into Unfading Sea Haze: A New Threat Actor in the South China Sea
- 2024-05-22 - Novel EDR-Killing 'GhostEngine' Malware Is Built for Stealth
- 2024-05-23 - Chinese Espionage Campaign Expands to Target Africa and The Caribbean
- 2024-05-23 - Operation Diplomatic Specter: An Active Chinese Cyberespionage Campaign Leverages Rare Tool Set to Target Governmental Entities in the Middle East, Africa and Asia
- 2024-05-23 - Sharp Dragon expands towards Africa and The Caribbean
- 2024-05-24 - Stark Industries Solutions: An Iron Hammer in the Cloud
🔥269👍1
🤓70🤣28👍5💯54🫡4🥰1
Today we discovered that vx-underground not only manages the vx-underground domain, but we also manage the United States Postal Service.

tl;dr we're sorry your package was lost, but that's not our fault. Sometimes shipping sucks ¯\_(ツ)_/¯
💯58😢24😁13👍6🥰21
Hello, how are you?

We're currently experimenting with a new harddrive distribution technique.

We currently distribute data in the form of an external harddrive. Moving forward we will deliver it in a plain 'ol SATA drive, and we'll also toss in a SATA to USB converter for people who don't have a drive bay, or want to open their box.

It'll be much faster and easier for us (and you).
46👍5👏4🤓3😢1
Hunters International ransomware group claims to have ransomed Circle K. Atlanta.

In other words, stoners now face difficulties trying to purchase chips and soda. It may even impact their ability to purchase Swisher Sweets.

Say a prayer for the stoner homies 🙏
😢77🙏26🤣95🫡4🎉2😱1🤓1
You may not like it, but this is what writing malware is like
😁96🤔117👍1🔥1
Advanced Auto Parts confirmed a data breach with the SEC last week.

A few weeks earlier an unidentified Threat Actor(s) who compromised TicketMaster also claimed to have compromised Advanced Auto Parts. When the Threat Actor(s) initially reported to have compromised Advanced Auto Parts, no details or data was provided to substantiate their claims other than a sale placed on Breached.

Today we can confirm that Advanced Auto Parts was indeed compromised and data was indeed exfiltrated.

Advanced Auto Parts wrote to the SEC that they believe the compromise took place on or around May 23rd, 2024. Furthermore, their data was stolen via unauthorized access to a 3rd party cloud database environment (asserted to be Snowflake by the Threat Actor(s)).

Advanced Auto Parts confirmed the data stolen contains sensitive information on current and former employees including government identified such as social security numbers. Advanced Auto Parts stated they will offer impacted individuals free credit monitoring and identity restoration services.

Image courtesy of pancak3lullz
31👍7
We are aware of the alleged AMD breach.

We love you all, and we appreciate you nerds notifying us, but we got way too many notifications. We got 50+ notifications about it. 😭

We haven't verified the data. We don't know if it's a legit breach or not. ¯\_(ツ)_/¯
😁438👍4