vx-underground
49.3K subscribers
4.32K photos
469 videos
84 files
1.53K links
The largest collection of malware source, samples, and papers on the internet.

Password: infected

https://vx-underground.org/
Download Telegram
πŸ”₯134😎42🀣33😁9πŸ’―5😒4πŸ‘3❀2
Today (or yesterday depending on where you live) the United States House Leaders called CrowdStrike CEO George Kurtz to testify to congress about the recent botched update. According to Microsoft telemetry, CrowdStrike's botched update boot-looped roughly 8,500,000 computers across the globe – including computer operations regarded as critical infrastructure.

No date has been released yet when George Kurtz will testify.

United States Republicans who lead the United States House Homeland Security commitee stated they 'expect answers soon' from Mr. Kurtz.

Additionally, it is reported that the letter sent to Mr. Kurtz by the United States congress states Mr. Kurtz is 'urged' to schedule a hearing with the subcommitee on Cyber Security and Infrastructure Protection by Wednesday, July 24th, 2024.

Information via Reuters, The Associated Press, and The Washington Post
🀣43πŸ€”29πŸ€“6πŸ‘5
vx-underground
Today (or yesterday depending on where you live) the United States House Leaders called CrowdStrike CEO George Kurtz to testify to congress about the recent botched update. According to Microsoft telemetry, CrowdStrike's botched update boot-looped roughly…
This by far one of the largest oopsies in cybersecurity history. We can't recall a moment where a vendor caused this much damage... ever. We're aware of instances where updates corrupted something, but nothing on this scale.

They'll probably talk about this in history books.
πŸ’―70πŸ‘10😒2🀣1
Remember when Shou Zi Chew, the CEO of TikTok, testified before the United States congress and they grilled him on questions about WiFi or TikTok monitoring IOT devices?

Imagine the CEO of CrowdStrike having to explain an EDR to the United States Congress πŸ˜‚πŸ˜‚πŸ˜‚πŸ˜‚
🀣210😁14❀5😒1πŸ€“1
20 years from now someone is going to write a book about the CrowdStrike disaster. People new to cybersecurity are going to be amazed by it.

The actuality of the situation is most security professionals (and Threat Actors) just shitposted their way through the entire thing
😁89πŸŽ‰11πŸ”₯4🀣4πŸ‘2😒1
When the CEO of CrowdStrike testifies before the United States Congress, do we host a watch party?

(everyone has to bring different snacks, like chips, soda, cheese dip, whatever)
Anonymous Poll
73%
Yes
4%
No
23%
I'm not bringing snacks
❀42πŸŽ‰9πŸ‘3🫑2😎1
This media is not supported in your browser
VIEW IN TELEGRAM
Damn why they cookin us 😭😭😭
🀣234πŸ”₯13πŸ₯°8πŸ‘6😒5😁4πŸ‘3πŸ’―3❀2❀‍πŸ”₯1
Updates to vx-underground:

Papers:
- 2024-02-20 - Earth Preta Campaign Uses DOPLUGS to Target Asia
- 2024-04-09 - Unraveling Not AZORult but Koi Loader- A Precursor to Koi Stealer
- 2024-05-21 - Phobos ransomware launches new leak site and pivots towards double extortion
- 2024-06-05 - European Election Security At Risk- A Detailed Analysis of State-Sponsored, eCrime, and Hacktivist Threats

Malware family updates:
- Poseidon
- ChChes
- SageRansomware
- Shifu
- SnakeKeylogger
- FakeBat
- Mirai
- LummaStealer
- Android.Rootnik
- FinSpy
- Latrodectus
- NeutrinoBot
- KematianStealer
- EyePyramid
- FormBook

Bulk downloads:
- VirusSign.2024.07.20
- VirusSign.2024.07.21
- VirusSign.2024.07.22
- VirusSign.2024.07.23
❀30πŸ‘7❀‍πŸ”₯6πŸ”₯3😒1πŸŽ‰1
Some media outlets are reporting a compromise (and leak) of Leidos – a large IT service provider for the United States Pentagon.

Bloomberg reports the leak is being distributed on 'cybercrime forums' but we haven't personally seen anything about it anywhere.

Β―\_(ツ)_/Β―
🀣72πŸ”₯7πŸ‘4πŸ’―4😎4πŸ€”3😒1
This media is not supported in your browser
VIEW IN TELEGRAM
😁87🀣63πŸ’―15πŸ€“5❀4πŸ‘3πŸ€”2πŸ‘1😒1
Yesterday KnowBe4 disclosed a cyber-security-incident where a North Korean national successfully infiltrated KnowBe4 ... by applying for a job there, interviewing, and getting hired.

Their blog post highlights North Korean identity fraud techniques.

https://blog.knowbe4.com/how-a-north-korean-fake-it-worker-tried-to-infiltrate-us
🀣67πŸ”₯7😱5πŸ€“3❀2😒1
vx-underground
Yesterday KnowBe4 disclosed a cyber-security-incident where a North Korean national successfully infiltrated KnowBe4 ... by applying for a job there, interviewing, and getting hired. Their blog post highlights North Korean identity fraud techniques. htt…
Unironically, in the past vx-underground members have had difficulties passing background checks because of the amount of information required – in-depth job history, birth certificate, other forms of government identification, etc.

Yet North Korea passes it first try 😭😭😭😭
🀣103🀯14πŸ‘11❀4
Yesterday Dragos unveiled 'FrostyGoop' an ICS (Industrial Control System) malware suspected to be developed by Russia's infamous sandworm team.

FrostyGoop successfully shut off the electricity of 600 apartment buildings in the midst of sub-zero temperatures (sub -17C temperatures) in January, 2024. It took Ukrainian officials almost 2 days to restore electricity of individuals impacted by FrostyGoop.

Dragos successfully identified the payload April, 2024.

This is the 9th ICS specific malware in history. This sort of malware is exceptionally rare, exceptionally difficult to develop, exceptionally difficult to test, and exceptionally difficult to deploy.

We do not have any malware samples for this payload. If one of you have this malware sample and would be willing to donate it to us, please do.

Check out the intelligence brief here:
https://vx-underground.org/APTs/2024/2024.07.24%20-%20FrostyGoop%20Intel%20Brief
😒58😱22πŸ”₯12πŸ₯°7😁7❀5🀯5πŸ‘3πŸ€“3πŸŽ‰1🫑1
404media is reporting Reddit is blocking ALL search engine crawls EXCEPT Google – which is currently paying $60,000,000/year for the right to scrape Reddit for AI training data.

More information:
https://www.404media.co/google-is-the-only-search-engine-that-works-on-reddit-now-thanks-to-ai-deal/
🀣120😒17😁8πŸ‘5🀯4πŸ€”2
As many of you (probably) know – the BreachedForum version 1. database was leaked yesterday. This database contains private messages, IP addresses, e-mail addresses, blah blah blah.

We've seen people express concern over this leak, notably some Threat Actors who believe this puts them in a bulls-eye for law enforcement.

Law enforcement agencies have had this data since Pompompurin was arrested in 2023. The only threat Threat Actors face now is the wrath, or retaliation, of other Threat Actors.

Law enforcement agencies are probably laughing right now, legs propped up on the desk, drinking coffee, and enjoying the fact that individuals they want apprehended are fighting others individuals they want apprehended.

tl;dr criminals destroying themselves
😁76🀣29😱11πŸ‘9😒9❀5πŸ’―5πŸ”₯3πŸ‘3
Per TechCrunch / lorenzofb – CrowdStrike is offering a $10 Uber Eats giftcard to individuals impacted by the recent CrowdStrike outage.

$10 USD is €9.21 EURO or Β£7.75.

There is no indication if this is per customer, per company, or per computer. Additionally, some users reportedly received an error message from Uber Eats when trying to use the giftcard with Uber Eats displaying the error message: "[this giftcard] has been canceled by the issuing party and is no longer valid."

More information:
https://techcrunch.com/2024/07/24/crowdstrike-offers-a-10-apology-gift-card-to-say-sorry-for-outage/
🀣257😁8❀6πŸ’―6πŸ‘2😱2😒2
🀣197πŸ”₯15😁9❀‍πŸ”₯6😒4πŸ€“4❀2🫑2
Regarding the recent so-called 'CrowdStrike' breach which was posted on BreachForum: this is not a data breach.

The individual responsible for the information ....disclosure, ...leak (?), operating under the moniker USDoD, openly states the data is scraped. Not sure why it's being labeled as a breach.

We briefly spoke with USDoD regarding it this afternoon. In summary, USDoD was able to programmatically abuse CrowdStrike endpoints to pull IOCs from CrowdStrike. The data pulled is proprietary, however this is the same information which is distributed to consumers.

According to USDoD scraping this data took quite a bit time (roughly a month), and the time the scrape operation completed it just so happened by chance to coincide with the recent CrowdStrike scandel – they've got bad luck it seems.

Photo courtesy of FalconFeedsio
πŸ‘69🀣26❀5❀‍πŸ”₯1😁1