The entire vx-underground collection is available at the DEFCON Data Duplication Village. Bring a harddrive, clone it, get the malware, and show your Mom.
We also included 100GB of cat pictures too as a DEFCON exclusive. No idea why you'd want 100GB of cats, but you'll get it.
We also included 100GB of cat pictures too as a DEFCON exclusive. No idea why you'd want 100GB of cats, but you'll get it.
π€©88β€18π€£12π₯9π―9π€9β€βπ₯3π’2π1π₯°1
DEFCON nerd drama.
Disclaimer: The source of the following information is from various Reddit threads, Discord discussions, and Twitter conversations. We are unable to determine the validity of all of the information shared. Some information can be confirmed because there is physical evidence present.
The drama: earlier today (approx. 5 hours ago) security researcher Dmitry Grinberg was escorted off the stage at DEFCON β making him one of the few individuals in convention history to be physically escorted off stage.
The contents of the badge (code base, etc) was developed by Dmitry Grinberg and Mr. Grinberg states he gave no permission to DEFCON to use his code base on the badge. He states he will be issuing a DMCA notice to DEFCON soon. Mr. Grinberg also stated on Reddit you can enable an easter-egg on the device by doing:
- FN
- MENU
- ABOUT
- SELECT
When doing this the badge will display Dmitry Grinberg's information proving he is the developer. Additionally, Dmitry Grinberg said on Reddit if you'd like a license to use the firmware you can contact him and he will issue it to you. He will also sign badges for individuals and this will count as a license grant. He will be outside the DEFCON entrance at 10am tomorrow morning to sign badges.
Attachment 1. Dmitry Grinberg being escorted off stage
Attachment 2. The easter-egg
Disclaimer: The source of the following information is from various Reddit threads, Discord discussions, and Twitter conversations. We are unable to determine the validity of all of the information shared. Some information can be confirmed because there is physical evidence present.
The drama: earlier today (approx. 5 hours ago) security researcher Dmitry Grinberg was escorted off the stage at DEFCON β making him one of the few individuals in convention history to be physically escorted off stage.
The contents of the badge (code base, etc) was developed by Dmitry Grinberg and Mr. Grinberg states he gave no permission to DEFCON to use his code base on the badge. He states he will be issuing a DMCA notice to DEFCON soon. Mr. Grinberg also stated on Reddit you can enable an easter-egg on the device by doing:
- FN
- MENU
- ABOUT
- SELECT
When doing this the badge will display Dmitry Grinberg's information proving he is the developer. Additionally, Dmitry Grinberg said on Reddit if you'd like a license to use the firmware you can contact him and he will issue it to you. He will also sign badges for individuals and this will count as a license grant. He will be outside the DEFCON entrance at 10am tomorrow morning to sign badges.
Attachment 1. Dmitry Grinberg being escorted off stage
Attachment 2. The easter-egg
π€44π€―17π4π’3β€1
This media is not supported in your browser
VIEW IN TELEGRAM
π€―27π€£5π4β€1π’1
Susan Wojcicki, the former CEO of YouTube, died yesterday from Lung Cancer at 56.
π’162π104π€£33π«‘19π€―9π6β€4π4π₯2π±2π1
Cool Windows 11 easter egg!
> Get file hash: 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e
> Run as admin
> Your file extensions will change
Very cool easter egg!
> Get file hash: 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e
> Run as admin
> Your file extensions will change
Very cool easter egg!
π€£165π₯12π€―8π6π€3π2β€1π«‘1
vx-underground
Cool Windows 11 easter egg! > Get file hash: 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e > Run as admin > Your file extensions will change Very cool easter egg!
This is a joke. This is a REvil ransomware payload. Don't seek out this file hash and intentionally detonate it on your box as admin.
π77π€32π€£20π€―9π8π’6π4π₯°2π€1π€1
Good morning,
It appears there is yet another person attempting to impersonate me. The easiest way to verify an administrator of vx-underground is request an addition of something to vx-underground.org/tmp β all administrators have access to this backend location.
Additionally, anime is cool and badass.
Thanks,
It appears there is yet another person attempting to impersonate me. The easiest way to verify an administrator of vx-underground is request an addition of something to vx-underground.org/tmp β all administrators have access to this backend location.
Additionally, anime is cool and badass.
Thanks,
π45β€βπ₯11π9π±5π€5π€£4β€2π€1π’1
Today Politico announced that Donald J. Trump's political campaign has been 'hacked'.
Earlier this morning representatives from Trump's political campaign confirmed to Politico that their internal documents have been compromised (and exfiltrated).
The tl;dr is that Trump's team was a victim of suspected Iranian state-sponsored Threat Actors with the intent of interfering with the United States 2024 Presidential Election. They successfully compromised Trump campaign staffers by performing a spear phish.
You can read more information on the spear-phish, the geopolitical implications, Microsoft's input, lore, and document details here:
https://www.politico.com/news/2024/08/10/trump-campaign-hack-00173503
Earlier this morning representatives from Trump's political campaign confirmed to Politico that their internal documents have been compromised (and exfiltrated).
The tl;dr is that Trump's team was a victim of suspected Iranian state-sponsored Threat Actors with the intent of interfering with the United States 2024 Presidential Election. They successfully compromised Trump campaign staffers by performing a spear phish.
You can read more information on the spear-phish, the geopolitical implications, Microsoft's input, lore, and document details here:
https://www.politico.com/news/2024/08/10/trump-campaign-hack-00173503
POLITICO
We received internal Trump documents from βRobert.β Then the campaign confirmed it was hacked.
The campaign suggested Iran was to blame. POLITICO has not independently verified the identity of the hacker or their motivation.
π38π₯13π€£10β€6π5π€―4π―2π±1π1
vx-underground
Today Politico announced that Donald J. Trump's political campaign has been 'hacked'. Earlier this morning representatives from Trump's political campaign confirmed to Politico that their internal documents have been compromised (and exfiltrated). The tl;drβ¦
tl;dr tl;dr don't need 0days and 1337 hacks to pop big targets. just need an e-mail address and smooth talking
π€£62π―21π€8π₯4β€2π2
Important notice:
It's time to settle the debate. 'VXUG' is pronounced like [vee-ex-UGH] β the 'UG' portion is pronounced like 'THUG'. If anyone pronounces it like they're spelling it out i.e. [vee-ex-uu-gee] please monkey bonk them.
Thanks,
It's time to settle the debate. 'VXUG' is pronounced like [vee-ex-UGH] β the 'UG' portion is pronounced like 'THUG'. If anyone pronounces it like they're spelling it out i.e. [vee-ex-uu-gee] please monkey bonk them.
Thanks,
π73π«‘31π€19π’8π€―7π€6π€5π€£3π±2π1
vx-underground
Important notice: It's time to settle the debate. 'VXUG' is pronounced like [vee-ex-UGH] β the 'UG' portion is pronounced like 'THUG'. If anyone pronounces it like they're spelling it out i.e. [vee-ex-uu-gee] please monkey bonk them. Thanks,
We made the crappy website so we get to decide to crappy pronunciation of the acronym >:(
π€59β€βπ₯8β€6π’4π€3π«‘3π2π€£2π€―1
Pardon the french β but what the fuck is this shit? We got community noted on our Windows 11 Easter Egg post where the 'easter egg' is detonating a REvil payload.
1. The community note is written in broken English
2. No normie is going to be able to find that specific file hash
1. The community note is written in broken English
2. No normie is going to be able to find that specific file hash
π€£180π11π9β€2π’1
We did a fundraiser to raise money for some additional computer equipment for vx-underground. We raised the money in less than 30 minutes.
Thank you everyone for the love and support.
Thank you everyone for the love and support.
β€176π€15β€βπ₯11π8π±3π€£2π’1
Our malware collection is growing too fast. It is beginning to become expensive β the cost could easily exceed $1,000/month (expensive for us).
We may have to slow down our malware collection operations.
We may have to slow down our malware collection operations.
π’110π±23π«‘21π€£11π€―4π€4π3π€2
Media is too big
VIEW IN TELEGRAM
The COM is (once again) receiving worldwide attention from media outlets, law enforcement agencies, and cyber threat intelligence agencies.
The full segment includes individuals from the FBI and NSA.
Note: this is a CBS 60 Minutes episode that they're re-airing
The full segment includes individuals from the FBI and NSA.
Note: this is a CBS 60 Minutes episode that they're re-airing
π€£49π6π«‘6π3π’1π1π€1
Telegram is offering us $835.01 from ad revenue from our Telegram channel with 37,459 subscribers.
A majority of the advertisements on our channel is from Threat Actors advertising their crypto-drainers or information stealers.
tl;dr crime pays
A majority of the advertisements on our channel is from Threat Actors advertising their crypto-drainers or information stealers.
tl;dr crime pays
π€£241π24π19β€8π€5π€―4π―3π«‘3π’2π1π€1