vx-underground
There's a cool and badass cybersecurity conference taking place in Amsterdam, the Netherlands on September 5th. It is called OrangeCon Tickets are cheaper for students. We weren't paid to bring attention to this conference, but we wish we were. https://orangecon.nl/
This was almost a paid advertisement
(we said no because we have no problem giving smaller conferences publicity)
(we aren't financially motivated)
(we said no because we have no problem giving smaller conferences publicity)
(we aren't financially motivated)
π69β€βπ₯24π―11β€7π€―6π3π2π€£2π1π«‘1
This media is not supported in your browser
VIEW IN TELEGRAM
Dulgex making fire for x64dbg
(x64dbg is gangsta af fr fr ong)
(x64dbg is gangsta af fr fr ong)
β€53π₯38π€£16β€βπ₯8π€3π’2π―2
vx-underground
Currently exploring some COM stuff β found a cute trick to read registry keys. The COM interface expects a WCHAR string (BSTR). But then... it converts it to a CHAR string to invoke RegQueryValueExA
You can do some goofy stuff and run a executable with it (wraps to ShellExecuteEx)
https://pastebin.com/raw/V1jmkp39
https://pastebin.com/raw/V1jmkp39
π24π3π1
vx-underground
You can do some goofy stuff and run a executable with it (wraps to ShellExecuteEx) https://pastebin.com/raw/V1jmkp39
The coolest part is the existence IWshShell, IWshShell2, and IWshShell3. All of them the exact same, except each one has an extra method present. IWshShell3 exposes an Exec method which is almost identical to IWshShell::Run
π25β€βπ₯7π2π€£1
This media is not supported in your browser
VIEW IN TELEGRAM
Microsoft is being criticized (again) because Administrator-to-Kernel mode execution is not considered a security boundary.
Researchers noted that home users, who often run as administrator, could be a victim of this lack-of security boundary.
Researchers asked Microsoft why?
Researchers noted that home users, who often run as administrator, could be a victim of this lack-of security boundary.
Researchers asked Microsoft why?
π59π€£32β€βπ₯7π3π€1π€―1π’1
This media is not supported in your browser
VIEW IN TELEGRAM
The x10 software engineer skit by KaiLentit
β€62π€£10π7π6π€4π₯°2π’1
The only thing keeping vx-underground HQ from metaphorically burning to the ground is grotesque quantities of alprazolam
π«‘70π’29β€12π7π4π€£2π1π€1
good morning, or good night, to the 345,958 people living in my phone
β€132π«‘31π₯11π6β€βπ₯5π5π4π4π€£3π―2π€2
Updates to vx-underground:
- 2024-07-02 - Exposing FakeBat loader: Distribution methods and adversary infrastructure
- 2024-06-30 - Deep Analysis of Snake (404 keylogger)
- 2024-06-27 - Poseidon Stealer malspam campaign targeting Swiss macOS users
- 2024-07-02 - The LandUpdate808 Fake Update Variant
- 2024-06-24 - βPoseidonβ Mac stealer distributed via Google ads
- 2024-07-02 - Kematian Stealer forked from PowerShell Token Grabber
- 2024-07-02 - Exposing FakeBat loader: Distribution methods and adversary infrastructure
- 2024-06-30 - Deep Analysis of Snake (404 keylogger)
- 2024-06-27 - Poseidon Stealer malspam campaign targeting Swiss macOS users
- 2024-07-02 - The LandUpdate808 Fake Update Variant
- 2024-06-24 - βPoseidonβ Mac stealer distributed via Google ads
- 2024-07-02 - Kematian Stealer forked from PowerShell Token Grabber
β€27π7π5π3π₯2π2π€1
vx-underground
GIF
After nearly two weeks of radio silence from Lockbit ransomware group they've returned with a Telegram account, a Briar account, a Signal account, and an XMPP account
They also immediately threw shade at RansomHub by accusing them of being a rebrand of ALPHV.
They also immediately threw shade at RansomHub by accusing them of being a rebrand of ALPHV.
β€βπ₯32π₯8π8π2π’1
The real Lockbit ransomware group Telegram channel and their first fancy little message. Interesting times we live in, seeing them pivot to Telegram.
π6π1
We see some nerds getting super hostile to women in tech β especially if they're conventionally attractive and/or have a high number of followers on social media
If you're feeling upset: scream at your Mom, heat up some pizza rolls, and put on some anime
It's going to be okay.
If you're feeling upset: scream at your Mom, heat up some pizza rolls, and put on some anime
It's going to be okay.
π€133π―60π€£51β€17π13π€―8π€6π₯°5π’5π4π1
This post is going to be controversial. But we believe it is necessary. Threat Intelligence nerds, Blue Team nerds, and Law Enforcement nerds following us on sock accounts β don't have a conniption.
Dear Threat Actor(s) who contact us,
We advise you do NOT use the leaked Babuk builder and source code. Babuk is notorious for failing to decrypt files (especially large files), and corrupting data. If you (or your group) decide to do ransomware ... for the sake of literally everybody involved (you and/or your group, the victim, Threat Intelligence, Digital Forensic & Incident Response firms, Law Enforcement, etc) DO NOT USE BABUK. Don't go anywhere near Babuk. If someone recommends Babuk, slap them around with a large trout.
Thanks,
Dear Threat Actor(s) who contact us,
We advise you do NOT use the leaked Babuk builder and source code. Babuk is notorious for failing to decrypt files (especially large files), and corrupting data. If you (or your group) decide to do ransomware ... for the sake of literally everybody involved (you and/or your group, the victim, Threat Intelligence, Digital Forensic & Incident Response firms, Law Enforcement, etc) DO NOT USE BABUK. Don't go anywhere near Babuk. If someone recommends Babuk, slap them around with a large trout.
Thanks,
π€£104β€27π11π€4π€2π₯1π€1π’1