We're seeing people on Xitter discuss being approached by brands and companies β offering them thousands of dollars for a single tweet.
This is absolutely disgusting. Why aren't we being approached?
The only people offering us large sums of money are criminals πππ
This is absolutely disgusting. Why aren't we being approached?
The only people offering us large sums of money are criminals πππ
π€£122π«‘17π6π4π’3π1
vx-underground
We're seeing people on Xitter discuss being approached by brands and companies β offering them thousands of dollars for a single tweet. This is absolutely disgusting. Why aren't we being approached? The only people offering us large sums of money are criminalsβ¦
This media is not supported in your browser
VIEW IN TELEGRAM
"Can I advertise our drainer?"
"Can I advertise my new Breached-like forum?"
"Can I advertise my Infostealer?"
Bro, we're probably on every watchlist on the planet. The very nanosecond we took dirty money we'd hear helicopters and the "COPS" theme song.
"Can I advertise my new Breached-like forum?"
"Can I advertise my Infostealer?"
Bro, we're probably on every watchlist on the planet. The very nanosecond we took dirty money we'd hear helicopters and the "COPS" theme song.
π€£133π«‘14π8π―7β€2π1π1π’1
This media is not supported in your browser
VIEW IN TELEGRAM
dulge πππ
β€57π€£37π₯15π’3π€3π€3π«‘2β€βπ₯1π€1
There's a cool and badass cybersecurity conference taking place in Amsterdam, the Netherlands on September 5th. It is called OrangeCon
Tickets are cheaper for students.
We weren't paid to bring attention to this conference, but we wish we were.
https://orangecon.nl/
Tickets are cheaper for students.
We weren't paid to bring attention to this conference, but we wish we were.
https://orangecon.nl/
π€49π13π€£8β€βπ₯7π―6π3
vx-underground
There's a cool and badass cybersecurity conference taking place in Amsterdam, the Netherlands on September 5th. It is called OrangeCon Tickets are cheaper for students. We weren't paid to bring attention to this conference, but we wish we were. https://orangecon.nl/
This was almost a paid advertisement
(we said no because we have no problem giving smaller conferences publicity)
(we aren't financially motivated)
(we said no because we have no problem giving smaller conferences publicity)
(we aren't financially motivated)
π69β€βπ₯24π―11β€7π€―6π3π2π€£2π1π«‘1
This media is not supported in your browser
VIEW IN TELEGRAM
Dulgex making fire for x64dbg
(x64dbg is gangsta af fr fr ong)
(x64dbg is gangsta af fr fr ong)
β€53π₯38π€£16β€βπ₯8π€3π’2π―2
vx-underground
Currently exploring some COM stuff β found a cute trick to read registry keys. The COM interface expects a WCHAR string (BSTR). But then... it converts it to a CHAR string to invoke RegQueryValueExA
You can do some goofy stuff and run a executable with it (wraps to ShellExecuteEx)
https://pastebin.com/raw/V1jmkp39
https://pastebin.com/raw/V1jmkp39
π24π3π1
vx-underground
You can do some goofy stuff and run a executable with it (wraps to ShellExecuteEx) https://pastebin.com/raw/V1jmkp39
The coolest part is the existence IWshShell, IWshShell2, and IWshShell3. All of them the exact same, except each one has an extra method present. IWshShell3 exposes an Exec method which is almost identical to IWshShell::Run
π25β€βπ₯7π2π€£1
This media is not supported in your browser
VIEW IN TELEGRAM
Microsoft is being criticized (again) because Administrator-to-Kernel mode execution is not considered a security boundary.
Researchers noted that home users, who often run as administrator, could be a victim of this lack-of security boundary.
Researchers asked Microsoft why?
Researchers noted that home users, who often run as administrator, could be a victim of this lack-of security boundary.
Researchers asked Microsoft why?
π59π€£32β€βπ₯7π3π€1π€―1π’1
This media is not supported in your browser
VIEW IN TELEGRAM
The x10 software engineer skit by KaiLentit
β€62π€£10π7π6π€4π₯°2π’1
The only thing keeping vx-underground HQ from metaphorically burning to the ground is grotesque quantities of alprazolam
π«‘70π’29β€12π7π4π€£2π1π€1
good morning, or good night, to the 345,958 people living in my phone
β€132π«‘31π₯11π6β€βπ₯5π5π4π4π€£3π―2π€2
Updates to vx-underground:
- 2024-07-02 - Exposing FakeBat loader: Distribution methods and adversary infrastructure
- 2024-06-30 - Deep Analysis of Snake (404 keylogger)
- 2024-06-27 - Poseidon Stealer malspam campaign targeting Swiss macOS users
- 2024-07-02 - The LandUpdate808 Fake Update Variant
- 2024-06-24 - βPoseidonβ Mac stealer distributed via Google ads
- 2024-07-02 - Kematian Stealer forked from PowerShell Token Grabber
- 2024-07-02 - Exposing FakeBat loader: Distribution methods and adversary infrastructure
- 2024-06-30 - Deep Analysis of Snake (404 keylogger)
- 2024-06-27 - Poseidon Stealer malspam campaign targeting Swiss macOS users
- 2024-07-02 - The LandUpdate808 Fake Update Variant
- 2024-06-24 - βPoseidonβ Mac stealer distributed via Google ads
- 2024-07-02 - Kematian Stealer forked from PowerShell Token Grabber
β€27π7π5π3π₯2π2π€1