vx-underground
49.4K subscribers
4.33K photos
469 videos
84 files
1.53K links
The largest collection of malware source, samples, and papers on the internet.

Password: infected

https://vx-underground.org/
Download Telegram
vx-underground
There's a cool and badass cybersecurity conference taking place in Amsterdam, the Netherlands on September 5th. It is called OrangeCon Tickets are cheaper for students. We weren't paid to bring attention to this conference, but we wish we were. https://orangecon.nl/
This was almost a paid advertisement

(we said no because we have no problem giving smaller conferences publicity)

(we aren't financially motivated)
πŸ‘69❀‍πŸ”₯24πŸ’―11❀7🀯6😍3πŸ‘2🀣2πŸ˜‡1🫑1
This media is not supported in your browser
VIEW IN TELEGRAM
Dulgex making fire for x64dbg

(x64dbg is gangsta af fr fr ong)
❀53πŸ”₯38🀣16❀‍πŸ”₯8πŸ€“3😒2πŸ’―2
Currently exploring some COM stuff – found a cute trick to read registry keys.

The COM interface expects a WCHAR string (BSTR). But then... it converts it to a CHAR string to invoke RegQueryValueExA
πŸ”₯37🀣14❀‍πŸ”₯9πŸ€”6❀4πŸ‘1😒1😎1
vx-underground
You can do some goofy stuff and run a executable with it (wraps to ShellExecuteEx) https://pastebin.com/raw/V1jmkp39
The coolest part is the existence IWshShell, IWshShell2, and IWshShell3. All of them the exact same, except each one has an extra method present. IWshShell3 exposes an Exec method which is almost identical to IWshShell::Run
πŸ‘25❀‍πŸ”₯7πŸ‘2🀣1
This media is not supported in your browser
VIEW IN TELEGRAM
Microsoft is being criticized (again) because Administrator-to-Kernel mode execution is not considered a security boundary.

Researchers noted that home users, who often run as administrator, could be a victim of this lack-of security boundary.

Researchers asked Microsoft why?
😁59🀣32❀‍πŸ”₯7πŸ‘3πŸ€”1🀯1😒1
πŸ’» Programmers! πŸ’»

What's stopping you from coding like this? πŸ™
❀69😁18🀣10😒9πŸ”₯3πŸ™2
Today Kaspersky issued a goodbye letter to it's American customers.

We are going to miss Kaspersky.

Kaspersky was always a solid AV product and the research they conducted was always excellent.
😒190🫑71🀣37❀15😁3πŸ‘2
Throwback to when some nerd found a tomato garden on Shodan
πŸ”₯150😁46❀18πŸ€“15πŸ€”6❀‍πŸ”₯5🀣5🀯3😒3
This media is not supported in your browser
VIEW IN TELEGRAM
The x10 software engineer skit by KaiLentit
❀62🀣10πŸ‘7πŸ‘6πŸ€“4πŸ₯°2😒1
> login
> check news
> riteaid breached
> trello api abused to scrape emails
> more new ransomware groups
> more 8k sec filing
> more malware being the malware
> ???
❀‍πŸ”₯58🀣21❀7πŸ€“6😎5πŸ‘2πŸ₯°2😒1
Today it was reported by AT&T (via email to customers) that an individual involved in the recent AT&T data breach has been arrested.
🀣89πŸ€”18😒9πŸŽ‰6πŸ‘3πŸ™3πŸ‘2😁1🀯1🫑1
The only thing keeping vx-underground HQ from metaphorically burning to the ground is grotesque quantities of alprazolam
🫑70😒29❀12😁7😘4🀣2πŸ‘1πŸ€”1
good morning, or good night, to the 345,958 people living in my phone
❀132🫑31πŸ”₯11😎6❀‍πŸ”₯5😁5πŸ‘4πŸŽ‰4🀣3πŸ’―2πŸ€“2
Updates to vx-underground:

- 2024-07-02 - Exposing FakeBat loader: Distribution methods and adversary infrastructure
- 2024-06-30 - Deep Analysis of Snake (404 keylogger)
- 2024-06-27 - Poseidon Stealer malspam campaign targeting Swiss macOS users
- 2024-07-02 - The LandUpdate808 Fake Update Variant
- 2024-06-24 - β€˜Poseidon’ Mac stealer distributed via Google ads
- 2024-07-02 - Kematian Stealer forked from PowerShell Token Grabber
❀27😎7πŸ‘5😁3πŸ”₯2πŸ™2πŸ€”1
Wikipedia has introduced dark mode into their website.
πŸ”₯188🀣30🀩13😎11😱10❀7πŸ‘6🫑5πŸŽ‰3😒2πŸ€“1
vx-underground
GIF
After nearly two weeks of radio silence from Lockbit ransomware group they've returned with a Telegram account, a Briar account, a Signal account, and an XMPP account

They also immediately threw shade at RansomHub by accusing them of being a rebrand of ALPHV.
❀‍πŸ”₯32πŸ”₯8😎8😁2😒1
The real Lockbit ransomware group Telegram channel and their first fancy little message. Interesting times we live in, seeing them pivot to Telegram.
πŸ‘6😁1
We see some nerds getting super hostile to women in tech β€” especially if they're conventionally attractive and/or have a high number of followers on social media

If you're feeling upset: scream at your Mom, heat up some pizza rolls, and put on some anime

It's going to be okay.
πŸ€“133πŸ’―60🀣51❀17😁13🀯8πŸ€”6πŸ₯°5😒5πŸ‘4😎1
This post is going to be controversial. But we believe it is necessary. Threat Intelligence nerds, Blue Team nerds, and Law Enforcement nerds following us on sock accounts – don't have a conniption.

Dear Threat Actor(s) who contact us,

We advise you do NOT use the leaked Babuk builder and source code. Babuk is notorious for failing to decrypt files (especially large files), and corrupting data. If you (or your group) decide to do ransomware ... for the sake of literally everybody involved (you and/or your group, the victim, Threat Intelligence, Digital Forensic & Incident Response firms, Law Enforcement, etc) DO NOT USE BABUK. Don't go anywhere near Babuk. If someone recommends Babuk, slap them around with a large trout.

Thanks,
🀣104❀27πŸ‘11πŸ€“4🀝2πŸ”₯1πŸ€”1😒1