The unknown person who claims to have compromised zserver dot ru, the bulletproof webhosting provider, has begun sending emails to zserver dot ru clients.
Interestingly, the person who claimed to have compromised zserver dot ru did not tell us this.
One of their customers did.
Interestingly, the person who claimed to have compromised zserver dot ru did not tell us this.
One of their customers did.
π₯78π₯°6π5π’2β€βπ₯1β€1π1
A 0day exploit is going to be dropped soon. We ourselves aren't entirely clear on the details yet, but we know it is going to impact gamers.
It won't impact business operations, unless your end users are unironically playing video games at work.
It won't impact business operations, unless your end users are unironically playing video games at work.
π―106π€30π±16π8π₯6π₯°6β€βπ₯3π€3π’2π2
vx-underground
A 0day exploit is going to be dropped soon. We ourselves aren't entirely clear on the details yet, but we know it is going to impact gamers. It won't impact business operations, unless your end users are unironically playing video games at work.
Note: It's not Steam, it's not Discord
π€120π26π8π’6π€©6β€4π4π±2
This media is not supported in your browser
VIEW IN TELEGRAM
We have appeared in another YouTube documentary. It is always a wonderful feeling knowing we are becoming part of history and making an impact.
Sometimes though it is our silliest quotes that make it into documentaries.
Sometimes though it is our silliest quotes that make it into documentaries.
β€87π31π€£23π6π2π₯2π±2π’1
vx-underground
We have appeared in another YouTube documentary. It is always a wonderful feeling knowing we are becoming part of history and making an impact. Sometimes though it is our silliest quotes that make it into documentaries.
YouTube
How a Hacker Saved the Internet
Visit https://fern.deals/brilliant for 20% off of a premium subscription. Start learning new skills today! It's also a great way to support our channel. (ad)
A group of hackers tried to gain access to millions of servers around the world - a master key toβ¦
A group of hackers tried to gain access to millions of servers around the world - a master key toβ¦
π₯41π€£8β€7π7
Hello, how are you?
tl;dr tl;dr I'm sick, update on ransomware leak, update on video game 0day, stuff
Apologies for so many delayed communications β I have contracted some sort of viral infection. My sinus' have begun draining fluid into my esophagus. tl;dr Sinusitis. As this post is being written, I have consumed enough Robitussin to kill an Elephant.
Anyway, regarding the ransomware leaks, the data is a result of an unknown person(?) compromising ransomware threat actor VPS'. Once the individual compromised the VPS' they decided to forfeit the data over to law enforcement (anonymously) which they believe resulted in the apprehension of individuals and the takedown of several onion domains. Following the takedown and arrests, this person (people?) decided to gift the data to us to study or distribute to others. They believed that, due to the size of our audience, us announcing it and sharing it would disseminate information faster. Because this person(s) compromised a VPS, it has a great deal of victim PII present β it appears they compromised some of their hosts mid-ransomware campaign or attack. In order for us to share it, we need to scrub the victim PII. We still haven't done that (see why in first paragraph).
However, we have decided we will share the data to Threat Intelligence vendors, or anti-virus vendors, or whomever to study, review, blah blah blah. We believe these companies, which typically offer anti-ransomware services, will make good use of this information and data. Truthfully, we ourselves have not reviewed the data in totality. Our domain of study typically revolves around malware development β reviewing VPS data is kind of a Threat Intel / DFIR thing, so there is a lot someone could probably find that we would probably miss. If your organization is interested in the data to do a review, or write-up, or whatever, shoot us an e-mail or a DM or something. You'll need to show us proof you're from a legitimate vendor.
We have no timeline on a public release. I don't feel like scrubbing the PII, maybe someone else in our group feels like it, I don't know, I haven't asked because I've been sick. I could probably ask right now, but I'm not.
About the video game 0day, very few people are aware of its existence and we believe it will cause a mini-shit storm online. It's high severity, but it's impact is limited to a relatively small userbase. I've sworn on the Old Robitussin bottle and the New Robitussin bottle (Game of Thrones reference) to not disclose more information. Regardless, you'll all have a nice chuckle. It's disclosure timeline is roughly 7 - 14 days. The person who found the exploit is doing a writeup. Upon release, the exploit will not be patched.
Finally, we've got lots of updates to vx-underground. I haven't pushed any to prod yet (despite the pile up from petik, Bradley, and GuessThePwd), because I've been sick.
Have a nice day,
- smelly
tl;dr tl;dr I'm sick, update on ransomware leak, update on video game 0day, stuff
Apologies for so many delayed communications β I have contracted some sort of viral infection. My sinus' have begun draining fluid into my esophagus. tl;dr Sinusitis. As this post is being written, I have consumed enough Robitussin to kill an Elephant.
Anyway, regarding the ransomware leaks, the data is a result of an unknown person(?) compromising ransomware threat actor VPS'. Once the individual compromised the VPS' they decided to forfeit the data over to law enforcement (anonymously) which they believe resulted in the apprehension of individuals and the takedown of several onion domains. Following the takedown and arrests, this person (people?) decided to gift the data to us to study or distribute to others. They believed that, due to the size of our audience, us announcing it and sharing it would disseminate information faster. Because this person(s) compromised a VPS, it has a great deal of victim PII present β it appears they compromised some of their hosts mid-ransomware campaign or attack. In order for us to share it, we need to scrub the victim PII. We still haven't done that (see why in first paragraph).
However, we have decided we will share the data to Threat Intelligence vendors, or anti-virus vendors, or whomever to study, review, blah blah blah. We believe these companies, which typically offer anti-ransomware services, will make good use of this information and data. Truthfully, we ourselves have not reviewed the data in totality. Our domain of study typically revolves around malware development β reviewing VPS data is kind of a Threat Intel / DFIR thing, so there is a lot someone could probably find that we would probably miss. If your organization is interested in the data to do a review, or write-up, or whatever, shoot us an e-mail or a DM or something. You'll need to show us proof you're from a legitimate vendor.
We have no timeline on a public release. I don't feel like scrubbing the PII, maybe someone else in our group feels like it, I don't know, I haven't asked because I've been sick. I could probably ask right now, but I'm not.
About the video game 0day, very few people are aware of its existence and we believe it will cause a mini-shit storm online. It's high severity, but it's impact is limited to a relatively small userbase. I've sworn on the Old Robitussin bottle and the New Robitussin bottle (Game of Thrones reference) to not disclose more information. Regardless, you'll all have a nice chuckle. It's disclosure timeline is roughly 7 - 14 days. The person who found the exploit is doing a writeup. Upon release, the exploit will not be patched.
Finally, we've got lots of updates to vx-underground. I haven't pushed any to prod yet (despite the pile up from petik, Bradley, and GuessThePwd), because I've been sick.
Have a nice day,
- smelly
β€118π€£16π8π€8π€6π4π’2
vx-underground
> "smelly can i have {free merch} for {thing}? " > "sure" > "nice try u fuckn fed ur never gettin my dox"
Why even ask us for merchandise, or stickers, if you're going to freak out when we say yes? How are we going to physically mail you something if you can't provide us a physical address?
real world things require real world address, the real world isnt the internet ok
real world things require real world address, the real world isnt the internet ok
π€76π€£51π8β€7π5π5β€βπ₯1π’1
Good evening,
We've got a bunch of malware in queue. Some has already been pushed to prod. It is over 1,000,000 malwares.
Additionally, please give us time to review the over 700 animal pictures we received. We didn't anticipate so many critter pictures.
Thanks,
We've got a bunch of malware in queue. Some has already been pushed to prod. It is over 1,000,000 malwares.
Additionally, please give us time to review the over 700 animal pictures we received. We didn't anticipate so many critter pictures.
Thanks,
π€58β€βπ₯15π₯°7π₯4π’3π1
The AI girlfriend website got compromised.
It's all over for lonely degenerates. Say a prayer π
https://www.404media.co/hacked-ai-girlfriend-data-shows-prompts-describing-child-sexual-abuse-2/
It's all over for lonely degenerates. Say a prayer π
https://www.404media.co/hacked-ai-girlfriend-data-shows-prompts-describing-child-sexual-abuse-2/
404 Media
Hacked βAI Girlfriendβ Data Shows Prompts Describing Child Sexual Abuse
A hacked database from AI companion site Muah.ai exposes peoples' particular kinks and fantasies they've asked their bot to engage in. It also shows many of them are trying to use the platform to generate child abuse material.
π€£90π’28π±20π€―11π8π«‘6β€3π3π€3π1π―1
We are considering implementing a clause where companies with a specific amount of revenue must pay for the right to download malware from us.
It's irritating seeing multi-million or multi-billion dollar companies profit off our work
tl;dr becoming a villain
It's irritating seeing multi-million or multi-billion dollar companies profit off our work
tl;dr becoming a villain
π―243π27π21β€14π€£11π«‘9π₯3β€βπ₯2π’1π1
vx-underground
We are considering implementing a clause where companies with a specific amount of revenue must pay for the right to download malware from us. It's irritating seeing multi-million or multi-billion dollar companies profit off our work tl;dr becoming a villain
We love hearing that students, the morbidly curious, and independent researchers use our website.
We don't like watching your multi-million dollar company scrape our malware collection for their 'AI' training set.
We don't like watching your multi-million dollar company scrape our malware collection for their 'AI' training set.
π138π22π―21β€13π€£7π±3β€βπ₯1π₯1π₯°1π’1π1
Malware Ingestion statistics, August 2024:
2024-08-01: 15,604
2024-08-02: 13,593
2024-08-03: 12,354
2024-08-04: 12,679
2024-08-05: 12,245
2024-08-06: 12,914
2024-08-07: 14,432
2024-08-08: 15,054
2024-08-09: 13,625
2024-08-10: 20,955
2024-08-11: 23,064
2024-08-12: 22,850
2024-08-13: 19,464
2024-08-14: 15,219
2024-08-15: 114,050
2024-08 -16: 70,162
2024-08-17: 93,572
2024-08-18: 138,520
2024-08-19: 178,314
2024-08-20: 87,425
2024-08-21: 146,435
2024-08-22: 306,526
2024-08-23: 208,720
2024-08-24: 133,827
2024-08-25: 7,533
2024-08-26: 19,108
2024-08-27: 18,980
2024-08-28: 21,085
2024-08-29: 16,032
2024-08-30: 17,327
2024-08-31: 17,620
Total: 1,821,596
Size: 230GB (7z Ultra compressed)
2024-08-01: 15,604
2024-08-02: 13,593
2024-08-03: 12,354
2024-08-04: 12,679
2024-08-05: 12,245
2024-08-06: 12,914
2024-08-07: 14,432
2024-08-08: 15,054
2024-08-09: 13,625
2024-08-10: 20,955
2024-08-11: 23,064
2024-08-12: 22,850
2024-08-13: 19,464
2024-08-14: 15,219
2024-08-15: 114,050
2024-08 -16: 70,162
2024-08-17: 93,572
2024-08-18: 138,520
2024-08-19: 178,314
2024-08-20: 87,425
2024-08-21: 146,435
2024-08-22: 306,526
2024-08-23: 208,720
2024-08-24: 133,827
2024-08-25: 7,533
2024-08-26: 19,108
2024-08-27: 18,980
2024-08-28: 21,085
2024-08-29: 16,032
2024-08-30: 17,327
2024-08-31: 17,620
Total: 1,821,596
Size: 230GB (7z Ultra compressed)
π₯50π«‘9π8π5π3β€2π2π―1
Yesterday someone wrote that Lockbit ransomware group is making a training course. Is this true?
tl;dr no
1. LockbitSupp a/k/a Dimitry Yuryevich Khoroshev is a Russian national who has stolen an estimated $400,000,000 via ransomware. Does he need money by producing and selling a training course? Probably not.
2. According to the United States Federal Bureau of Investigation and United Kingdom National Crime Agency, Lockbit ransomware group had affiliates who were members of EvilCorp, an infamous Russian-based malware crime family who the family is estimated to have made hundreds of millions of dollars. EvilCorp is believed to have ties to the Russian FSB. Does he need money by producing and selling a training course? Probably not.
3. LockbitSupp does not speak English well. Why would he write a course in English? (in the photo shared it was written in English, native English with virtually no typos or funky spelling)
4. The photo shared mentioned Breached. LockbitSupp is not associated with Breached. He is a Russian national, does not speak English well, and does not traditionally trust foreigners (or anyone really, except maybe his most esteemed ransomware affiliates). His primary forum platforms for communication and recruitment has been Exploit and RAMP
5. We asked Lockbit if he was making a training course, he said no. Note his native English (sarcasm, a native English speaker would write, "no, why do you ask?")
tl;dr no
1. LockbitSupp a/k/a Dimitry Yuryevich Khoroshev is a Russian national who has stolen an estimated $400,000,000 via ransomware. Does he need money by producing and selling a training course? Probably not.
2. According to the United States Federal Bureau of Investigation and United Kingdom National Crime Agency, Lockbit ransomware group had affiliates who were members of EvilCorp, an infamous Russian-based malware crime family who the family is estimated to have made hundreds of millions of dollars. EvilCorp is believed to have ties to the Russian FSB. Does he need money by producing and selling a training course? Probably not.
3. LockbitSupp does not speak English well. Why would he write a course in English? (in the photo shared it was written in English, native English with virtually no typos or funky spelling)
4. The photo shared mentioned Breached. LockbitSupp is not associated with Breached. He is a Russian national, does not speak English well, and does not traditionally trust foreigners (or anyone really, except maybe his most esteemed ransomware affiliates). His primary forum platforms for communication and recruitment has been Exploit and RAMP
5. We asked Lockbit if he was making a training course, he said no. Note his native English (sarcasm, a native English speaker would write, "no, why do you ask?")
π73π€£37β€6π5π2π€―2π’1
vx-underground
Yesterday someone wrote that Lockbit ransomware group is making a training course. Is this true? tl;dr no 1. LockbitSupp a/k/a Dimitry Yuryevich Khoroshev is a Russian national who has stolen an estimated $400,000,000 via ransomware. Does he need money byβ¦
In summary: the person who claimed Lockbit ransomware group was making a training course was doing it as a publicity stunt (probably) to attract people to their training course (crime focused?).
We give it a 7/10. It fooled some people.
We give it a 7/10. It fooled some people.
π69π€£23π11π5π’4π3