vx-underground
October 30th Okta disclosed a vulnerability whereas individuals could bypass AD/LDAP Delegated Authentication by providing a username greater than 52 characters. It required a cached previous success login attempt. tl;dr employees with long last names areβ¦
Hispanic users with 30 last names (all hypenated) && Eastern Europeans users with ski and/or vich and/or ska in their name
π€£123π«‘13π9π2π€2β€1π₯°1π1π’1π1
Only a few more days of misinformation campaigns in the United States (it'll be back shortly after)
π62π18π―9π€£6π€4π₯°2π’2π1π1π€1
Interesting things that happened lately:
October 31st: safe0x17 released RustVEHSyscalls, a Rust port for LayeredSyscalls β performs indirect syscalls while generating legitimate API call stack frames by abusing VEH
October 30th: FeribHellscream released a paper on forming a shell company and attempting to purchase an EV code sign cert (it's not fun)
October 29th: 404mediaco received a leaked document from the largest New York hospital system β the document encourages physicians to use Artificial Intelligence to summarize clinical evaluations, diagnose medical issues, and parse health records
October 29th: BratvaCorp noted based on the recent United States Department of Justice indictment of Redline information stealer developers β the authors of Redline connected to their platform from their home IP addresses and linked assets to their personal iCloud accounts.
October 27th: MalDevAcademy released a proof-of-concept code illustration of extracting an encrypted and embedded PE file from a PNG file and executing it via a LNK file.
October 23rd: SttyK released a talk on how he discovered North Korean state-sponsored spys on Discord.
October 22nd: 0gtweet released a paper on on how to read BitLocker numerical passwords via the Windows API.
October 22nd: mez0 via TrustedSec released a paper on malware development via the Groovy programming language and it's usage in network enumeration.
October 19th: Hexacorn discovered a new malware persistence technique by abusing the UserInstStubWrapper API in advpacker.dll and IEAdvpacker.dll
October 18th: Hexacorn notes the discovery of 'ClickedOnRAT' windows API function from Windows XP. It's not related to malware, the API name is silly and misleading.
October 18th: Hexacorn unveiled a prankware technique by abusing NdfRunDllDuplicateIPDefendingSystem and NdfRunDllDuplicateIPOffendingSystem
October 31st: safe0x17 released RustVEHSyscalls, a Rust port for LayeredSyscalls β performs indirect syscalls while generating legitimate API call stack frames by abusing VEH
October 30th: FeribHellscream released a paper on forming a shell company and attempting to purchase an EV code sign cert (it's not fun)
October 29th: 404mediaco received a leaked document from the largest New York hospital system β the document encourages physicians to use Artificial Intelligence to summarize clinical evaluations, diagnose medical issues, and parse health records
October 29th: BratvaCorp noted based on the recent United States Department of Justice indictment of Redline information stealer developers β the authors of Redline connected to their platform from their home IP addresses and linked assets to their personal iCloud accounts.
October 27th: MalDevAcademy released a proof-of-concept code illustration of extracting an encrypted and embedded PE file from a PNG file and executing it via a LNK file.
October 23rd: SttyK released a talk on how he discovered North Korean state-sponsored spys on Discord.
October 22nd: 0gtweet released a paper on on how to read BitLocker numerical passwords via the Windows API.
October 22nd: mez0 via TrustedSec released a paper on malware development via the Groovy programming language and it's usage in network enumeration.
October 19th: Hexacorn discovered a new malware persistence technique by abusing the UserInstStubWrapper API in advpacker.dll and IEAdvpacker.dll
October 18th: Hexacorn notes the discovery of 'ClickedOnRAT' windows API function from Windows XP. It's not related to malware, the API name is silly and misleading.
October 18th: Hexacorn unveiled a prankware technique by abusing NdfRunDllDuplicateIPDefendingSystem and NdfRunDllDuplicateIPOffendingSystem
π€53π€13β€5β€βπ₯4π4π’3
vx-underground
Interesting things that happened lately: October 31st: safe0x17 released RustVEHSyscalls, a Rust port for LayeredSyscalls β performs indirect syscalls while generating legitimate API call stack frames by abusing VEH October 30th: FeribHellscream releasedβ¦
These will all eventually be added to the website. We don't have the time at the moment to download them, clean them up, and upload them for archive β but if you're interested you can look for yourself.
Cheers
Cheers
β€39π€7π5π€5π₯2β€βπ₯1π1π€1π’1π1π€©1
A few years ago there was a woman on Twitter who constantly talked about how much she loved her job, her career field, her co-workers, etc. She semi-frequently mentioned her education at a prestigious university (and also made sure to mention it in her Twitter bio).
She was interesting.
What was especially interesting was the fact everything she said was a lie. One of our members was employed at the place she claimed to have worked. No one at this place of work knew her β her entire personality, profile, biography, and posts were a lie. Nothing about it was true. We couldn't verify if the woman in the images was a real person.
One day her profile suddenly disappeared off social media.
We still talk about it sometimes. Who the hell was that person? Β―\_(γ)_/Β―
She was interesting.
What was especially interesting was the fact everything she said was a lie. One of our members was employed at the place she claimed to have worked. No one at this place of work knew her β her entire personality, profile, biography, and posts were a lie. Nothing about it was true. We couldn't verify if the woman in the images was a real person.
One day her profile suddenly disappeared off social media.
We still talk about it sometimes. Who the hell was that person? Β―\_(γ)_/Β―
π€£140π€42β€10β€βπ₯4π±4π3π’1π«‘1
vx-underground
A few years ago there was a woman on Twitter who constantly talked about how much she loved her job, her career field, her co-workers, etc. She semi-frequently mentioned her education at a prestigious university (and also made sure to mention it in her Twitterβ¦
It was very strange.
Once we learned it was an entirely fake persona we watched the profile everyday. We watched the profile interact with the public and "influencers". We were always like
Once we learned it was an entirely fake persona we watched the profile everyday. We watched the profile interact with the public and "influencers". We were always like
π93π€£31π€8β€βπ₯4β€3π’1
vx-underground
Schneider Electric after being hit by ransomware for the third time Jun 28, 2023 β cl0p ransomware Feb 20, 2024 β Cactus ransomware November 4, 2024 β Hellcat ransomware
Seriously, what the hell is going on over there? Are the employees just clicking every link in every email and just setting all passwords to 'password'?
π€£129π6π5β€2π2
Hello, how are you?
We've still got a bunch of papers to add. We don't have the time (yet) to get to that stuff, but we managed to (finally) sync all of our malware stuff to our backups and prod. After removing duplication files and syncing our entire collection with VirusTotal (scanning to ensure it's probably malicious) we've come to the conclusion we have a little over 33,000,000 unique malwares.
Very cool.
In other news, we'd like to thank the people who continue to send us photos of their animals (or random pictures of animals they found), they're very cool.
In other other news, running vx-underground is beginning to become more challenging due to changes in our lives. Core administration is mid-30's β we've got families, responsibilities, and as we've aged over the past 5.5 years, a lot of things have changed in our lives. We've got a commitment to vx-underground for another 5 years, but following those 5 years vx-underground may no longer exist. We may decide to throw in the metaphorical towel and hope someone, somewhere else, decides to carry on our collection.
Or not, whatever. We'll see what happens. Life changes and crazy & cool things happens.
- smelly
Families:
- Android.AwSpy
- CerberRansomware
- LatentBot
- MacOS.KeRanger
- MacOS.WireLurker
- PetyaRansomware
- RockLoader
- SamsamRansomware
- TeslaCrypt
- Thanatos
Bulk downloads:
- Malware.2024.10.19
- Malware.2024.10.20
- Malware.2024.10.21
- Malware.2024.10.22
- Malware.2024.10.23
- Malware.2024.10.24
- Malware.2024.10.25
- Malware.2024.10.26
- Malware.2024.10.27
- Malware.2024.10.28
- Malware.2024.10.29
- Malware.2024.10.30
- Malware.2024.10.31
- Malware.2024.11.01
- Malware.2024.11.02
- Malware.2024.11.03
- Malware.2024.11.04
- Bazaar.2024.10
- Virussign.2024.10.26
- Virussign.2024.10.27
- Virussign.2024.10.28
- Virussign.2024.10.29
- Virussign.2024.10.30
- Virussign.2024.10.31
- Virussign.2024.11.01
- Virussign.2024.11.02
- Virussign.2024.11.03
- Virussign.2024.11.04
- VirusShare.00487
We've still got a bunch of papers to add. We don't have the time (yet) to get to that stuff, but we managed to (finally) sync all of our malware stuff to our backups and prod. After removing duplication files and syncing our entire collection with VirusTotal (scanning to ensure it's probably malicious) we've come to the conclusion we have a little over 33,000,000 unique malwares.
Very cool.
In other news, we'd like to thank the people who continue to send us photos of their animals (or random pictures of animals they found), they're very cool.
In other other news, running vx-underground is beginning to become more challenging due to changes in our lives. Core administration is mid-30's β we've got families, responsibilities, and as we've aged over the past 5.5 years, a lot of things have changed in our lives. We've got a commitment to vx-underground for another 5 years, but following those 5 years vx-underground may no longer exist. We may decide to throw in the metaphorical towel and hope someone, somewhere else, decides to carry on our collection.
Or not, whatever. We'll see what happens. Life changes and crazy & cool things happens.
- smelly
Families:
- Android.AwSpy
- CerberRansomware
- LatentBot
- MacOS.KeRanger
- MacOS.WireLurker
- PetyaRansomware
- RockLoader
- SamsamRansomware
- TeslaCrypt
- Thanatos
Bulk downloads:
- Malware.2024.10.19
- Malware.2024.10.20
- Malware.2024.10.21
- Malware.2024.10.22
- Malware.2024.10.23
- Malware.2024.10.24
- Malware.2024.10.25
- Malware.2024.10.26
- Malware.2024.10.27
- Malware.2024.10.28
- Malware.2024.10.29
- Malware.2024.10.30
- Malware.2024.10.31
- Malware.2024.11.01
- Malware.2024.11.02
- Malware.2024.11.03
- Malware.2024.11.04
- Bazaar.2024.10
- Virussign.2024.10.26
- Virussign.2024.10.27
- Virussign.2024.10.28
- Virussign.2024.10.29
- Virussign.2024.10.30
- Virussign.2024.10.31
- Virussign.2024.11.01
- Virussign.2024.11.02
- Virussign.2024.11.03
- Virussign.2024.11.04
- VirusShare.00487
π₯°49β€21π«‘14π’12π€11π8β€βπ₯3π€1
Today 404mediaco confirmed the individual believed to be responsible for the Snowflake breach (which resulted in the Ticketmaster breach) has been apprehended by the Royal Canadian Mounted Police (RCMP).
More information: https://www.404media.co/suspected-snowflake-hacker-arrested-in-canada/
More information: https://www.404media.co/suspected-snowflake-hacker-arrested-in-canada/
404 Media
Suspected Snowflake Hacker Arrested in Canada
For more than a week Judische, the hacker linked to the AT&T, Ticketmaster and other breaches, has not been responding to messages. That's because he's been arrested.
π«‘66π’21π€£19β€6π3
Today 404mediaco reported the individual believed to be responsible for the Snowflake breach (including but not limited to: Ticketmaster, Santander Bank, Anheuser-Busch, Allstate, Advance Auto Parts, Mitsubishi, Neiman Marcus, Progressive, AT&T, and State Farm) had a hearing today regarding their extradition to the United States from Canada.
We can't recall a time a suspected a cyber criminal was given the VIP treatment for extradition. Them having a hearing on extradition in just a few days following their apprehension is lightning fast β shockingly fast, like, unimaginably fast.
404media had access to the judicial hearing and listened in via Zoom.
The extradition hearing was so fast, the suspect Alexander βConnorβ Moucka a/k/a Waifu a/k/a Judische a/k/a UNC5537, reportedly hadn't been able to secure a lawyer yet to defend themselves in the hearing...
We're going to go out on a limb and guess that compromising such large companies has angered people with deep pockets, people who are capable of making the Federal Bureau of Investigation put the metaphorical foot on the metaphorical gas.
Β―\_(γ)_/Β―
We can't recall a time a suspected a cyber criminal was given the VIP treatment for extradition. Them having a hearing on extradition in just a few days following their apprehension is lightning fast β shockingly fast, like, unimaginably fast.
404media had access to the judicial hearing and listened in via Zoom.
The extradition hearing was so fast, the suspect Alexander βConnorβ Moucka a/k/a Waifu a/k/a Judische a/k/a UNC5537, reportedly hadn't been able to secure a lawyer yet to defend themselves in the hearing...
We're going to go out on a limb and guess that compromising such large companies has angered people with deep pockets, people who are capable of making the Federal Bureau of Investigation put the metaphorical foot on the metaphorical gas.
Β―\_(γ)_/Β―
β€44π€£21π’12π₯°10π«‘7π4π€3π₯2
Media is too big
VIEW IN TELEGRAM
The United States electoral map once we cast our votes
π€£135β€βπ₯11π€11π’9β€8π₯4π«‘4π±3π€3
We got called fascists today for making a meme about the electoral vote (???)
Plot twist: half of us aren't even america, haha nerds
Plot twist: half of us aren't even america, haha nerds
π€172π€£84π8π«‘7π±4π4π3β€1π1π’1
Congratulations to all Ameriburgers β your Presidential election is near conclusion.
π125π28π’23β€7π5π4π±2β€βπ₯1π«‘1
vx-underground
Congratulations to all Ameriburgers β your Presidential election is near conclusion.
We've heard 'too close to call' over 9,000 times. We assume this is related to pizza deliveries. Indeed, it is best to walk.
π―110π32β€17π€―5π€£2π’1
Nooooooooooooooooooooo
https://www.bleepingcomputer.com/news/microsoft/microsoft-notepad-to-get-ai-powered-rewriting-tool-on-windows-11/
https://www.bleepingcomputer.com/news/microsoft/microsoft-notepad-to-get-ai-powered-rewriting-tool-on-windows-11/
BleepingComputer
Microsoft Notepad to get AI-powered rewriting tool on Windows 11
Microsoft has started testing AI-powered Notepad text rewriting and Paint image generation tools four decades after the two programs were released in the 1980s.
π’99π€£35π±10π6π€5π5π€―2π1