vx-underground
49.3K subscribers
4.32K photos
469 videos
84 files
1.53K links
The largest collection of malware source, samples, and papers on the internet.

Password: infected

https://vx-underground.org/
Download Telegram
We've updated the vx-underground malware collection. We have decided to include the recent faulty CrowdStrike drivers which caused 'boot-loops' for users. We believe it serves some historic and/or educational value to researchers or students. We have titled it "Win32.CrowdStruck". It is in the families directory.

- VirusSign.2024.07.13
- VirusSign.2024.07.14
- VirusSign.2024.07.15
- VirusSign.2024.07.16
- VirusSign.2024.07.17
- VirusSign.2024.07.18
- InTheWild.0129
- Win32.CrowdStruck
- CryptoMixRansomware
- AsyncRAT
- ClipBanker
- ProLock
- ThanosRansomware
- Redline
- Vidar
- Sality
- StealC
- RhadamanthysLoader
- RecordBreaker
- NjRAT
- LummaStealer
- PureLogStealer
- CobaltStrike
🀣63πŸ‘29❀10πŸ”₯7πŸ€“5πŸ‘4❀‍πŸ”₯3😁2🫑2
This media is not supported in your browser
VIEW IN TELEGRAM
POV: you scroll the comment section of literally any Xitter post discussing CrowdStrike (someone is going to make it weirdly political and mention an acronym starting with the letter 'D')
🀣85πŸ’―9❀4πŸ‘3😒1😎1
Hello, how are you?

Today is the day of rest.

We hope all of you can find some time to relax too β€” it's been a chaotic week.

We'll see all of you on Monday.
❀100πŸ˜‡19πŸ‘13🫑9πŸ‘8😒3πŸ™3🀣3🀝3
Good morning,

After we took Sunday off we anticipated things would calm down a little. We were wrong. There has been more arrests, the CrowdStrike fire is still burning, and the arguing about CrowdStrike continues.

😭😭😭
😁80🫑22πŸ”₯14❀2😱2😒2πŸ’―2πŸ‘1πŸŽ‰1
This media is not supported in your browser
VIEW IN TELEGRAM
> open xitter
> see long winded rants about kernel mode drivers
> see long winded rants about crowdstrike
> see long winded rants about malware
πŸ‘45πŸ€“21πŸ’―6πŸ‘1😒1
vx-underground
> open xitter > see long winded rants about kernel mode drivers > see long winded rants about crowdstrike > see long winded rants about malware
More annoyed at the fact CrowdStrike has brought in a surge of 'experts' than the actual computer damage at this point. We're going to hear idiotic schizophrenic rants for months
πŸ‘54😁33🀣11πŸ’―7πŸ₯°2πŸŽ‰2πŸ”₯1😒1
The CrowdStrike C-suite LinkedIn apology post tl;dr
🀣104πŸ”₯10🀝4😒3πŸ‘2
vx-underground
The CrowdStrike C-suite LinkedIn apology post tl;dr
Anyway, unless something profoundly dramatic happens, we are no longer going to actively discuss the current CrowdStrike situation. We're fatigued – and various members are combating the fall out in their own way (organizationally, whatever).

tl;dr moving on
πŸ₯°45πŸ‘16πŸ€“7πŸ”₯4πŸ‘3😒1🫑1
πŸ”₯134😎42🀣33😁9πŸ’―5😒4πŸ‘3❀2
Today (or yesterday depending on where you live) the United States House Leaders called CrowdStrike CEO George Kurtz to testify to congress about the recent botched update. According to Microsoft telemetry, CrowdStrike's botched update boot-looped roughly 8,500,000 computers across the globe – including computer operations regarded as critical infrastructure.

No date has been released yet when George Kurtz will testify.

United States Republicans who lead the United States House Homeland Security commitee stated they 'expect answers soon' from Mr. Kurtz.

Additionally, it is reported that the letter sent to Mr. Kurtz by the United States congress states Mr. Kurtz is 'urged' to schedule a hearing with the subcommitee on Cyber Security and Infrastructure Protection by Wednesday, July 24th, 2024.

Information via Reuters, The Associated Press, and The Washington Post
🀣43πŸ€”29πŸ€“6πŸ‘5
vx-underground
Today (or yesterday depending on where you live) the United States House Leaders called CrowdStrike CEO George Kurtz to testify to congress about the recent botched update. According to Microsoft telemetry, CrowdStrike's botched update boot-looped roughly…
This by far one of the largest oopsies in cybersecurity history. We can't recall a moment where a vendor caused this much damage... ever. We're aware of instances where updates corrupted something, but nothing on this scale.

They'll probably talk about this in history books.
πŸ’―70πŸ‘10😒2🀣1
Remember when Shou Zi Chew, the CEO of TikTok, testified before the United States congress and they grilled him on questions about WiFi or TikTok monitoring IOT devices?

Imagine the CEO of CrowdStrike having to explain an EDR to the United States Congress πŸ˜‚πŸ˜‚πŸ˜‚πŸ˜‚
🀣210😁14❀5😒1πŸ€“1
20 years from now someone is going to write a book about the CrowdStrike disaster. People new to cybersecurity are going to be amazed by it.

The actuality of the situation is most security professionals (and Threat Actors) just shitposted their way through the entire thing
😁89πŸŽ‰11πŸ”₯4🀣4πŸ‘2😒1
When the CEO of CrowdStrike testifies before the United States Congress, do we host a watch party?

(everyone has to bring different snacks, like chips, soda, cheese dip, whatever)
Anonymous Poll
73%
Yes
4%
No
23%
I'm not bringing snacks
❀42πŸŽ‰9πŸ‘3🫑2😎1
This media is not supported in your browser
VIEW IN TELEGRAM
Damn why they cookin us 😭😭😭
🀣234πŸ”₯13πŸ₯°8πŸ‘6😒5😁4πŸ‘3πŸ’―3❀2❀‍πŸ”₯1
Updates to vx-underground:

Papers:
- 2024-02-20 - Earth Preta Campaign Uses DOPLUGS to Target Asia
- 2024-04-09 - Unraveling Not AZORult but Koi Loader- A Precursor to Koi Stealer
- 2024-05-21 - Phobos ransomware launches new leak site and pivots towards double extortion
- 2024-06-05 - European Election Security At Risk- A Detailed Analysis of State-Sponsored, eCrime, and Hacktivist Threats

Malware family updates:
- Poseidon
- ChChes
- SageRansomware
- Shifu
- SnakeKeylogger
- FakeBat
- Mirai
- LummaStealer
- Android.Rootnik
- FinSpy
- Latrodectus
- NeutrinoBot
- KematianStealer
- EyePyramid
- FormBook

Bulk downloads:
- VirusSign.2024.07.20
- VirusSign.2024.07.21
- VirusSign.2024.07.22
- VirusSign.2024.07.23
❀30πŸ‘7❀‍πŸ”₯6πŸ”₯3😒1πŸŽ‰1
Some media outlets are reporting a compromise (and leak) of Leidos – a large IT service provider for the United States Pentagon.

Bloomberg reports the leak is being distributed on 'cybercrime forums' but we haven't personally seen anything about it anywhere.

Β―\_(ツ)_/Β―
🀣72πŸ”₯7πŸ‘4πŸ’―4😎4πŸ€”3😒1
This media is not supported in your browser
VIEW IN TELEGRAM
😁87🀣63πŸ’―15πŸ€“5❀4πŸ‘3πŸ€”2πŸ‘1😒1
Yesterday KnowBe4 disclosed a cyber-security-incident where a North Korean national successfully infiltrated KnowBe4 ... by applying for a job there, interviewing, and getting hired.

Their blog post highlights North Korean identity fraud techniques.

https://blog.knowbe4.com/how-a-north-korean-fake-it-worker-tried-to-infiltrate-us
🀣67πŸ”₯7😱5πŸ€“3❀2😒1