United States Department of Justice, Nebraska, indicts over 50 people involved in transnational gang TdA for deploying malware onto ATMs for "ATM Jackpotting"
Wtf that's badass (except the murder, extortion, maiming, etc. just interested in the malware)
https://www.justice.gov/usao-ne/pr/tren-de-aragua-members-and-leaders-indicted-multi-million-dollar-atm-jackpotting-scheme
Wtf that's badass (except the murder, extortion, maiming, etc. just interested in the malware)
https://www.justice.gov/usao-ne/pr/tren-de-aragua-members-and-leaders-indicted-multi-million-dollar-atm-jackpotting-scheme
www.justice.gov
Tren De Aragua Members and Leaders Indicted in Multi-Million Dollar
United States Attorney Lesley A. Woods announced that a federal grand jury in the District of Nebraska has returned two indictments charging 54 individuals for their roles in a large conspiracy to deploy malware and steal millions of dollars from ATMs inβ¦
π₯°28π€―11β€7π₯2π1π’1
vx-underground
United States Department of Justice, Nebraska, indicts over 50 people involved in transnational gang TdA for deploying malware onto ATMs for "ATM Jackpotting" Wtf that's badass (except the murder, extortion, maiming, etc. just interested in the malware) β¦
Yeah, these guys are not the brains behind the operation. I can't imagine someone technically savvy enough to develop ATM malware to then brag on social media about it
π€£77π₯°10β€4π±1π’1
Me wondering if I should try to contact Tren De Aragua, a violent, transnational prison-formed street gang which operates as a cartel, rival to the infamous MS13, who is involved in murder for hire, kidnapping, maiming, drug trafficking, prostitution, money laundering, bribery, and extortion.
... so I can send them cat pictures and ask for their ATM malware
... so I can send them cat pictures and ask for their ATM malware
π₯°76β€14π―14π€£9π±2π«‘2π1π’1
vx-underground
Me wondering if I should try to contact Tren De Aragua, a violent, transnational prison-formed street gang which operates as a cartel, rival to the infamous MS13, who is involved in murder for hire, kidnapping, maiming, drug trafficking, prostitution, moneyβ¦
Would it be the dumbest thing I've done? Maybe
Would it be cool and badass? Yes
Would it be cool and badass? Yes
β€βπ₯72β€13π₯7π«‘7π2π₯°1π’1
> make post about trying to contact Tren De Aragua
> get DMs
> "Uhhh hey, Smelly. TdA is very dangerous. I really don't think you should get involved with them
Bro, you think I'd actually try to contact them? They fucking murder people.
Also, I don't judge a book by it's cover, okay? I don't wanna sound like a hater but these individuals do not look friendly and I have a feeling they won't like my cat pictures
> get DMs
> "Uhhh hey, Smelly. TdA is very dangerous. I really don't think you should get involved with them
Bro, you think I'd actually try to contact them? They fucking murder people.
Also, I don't judge a book by it's cover, okay? I don't wanna sound like a hater but these individuals do not look friendly and I have a feeling they won't like my cat pictures
π58π€£46π19π«‘13π’7π₯°5β€3π2β€βπ₯1π₯1π€1
vx-underground
On Monday someone sent me a URL to a website trying to do click-fix targeting MacOS. I missed the message because the X DM system is a broken piece of shit. The website is 100% malicious, but the final C2 part is dead. Staging payload still works. I MISSEDβ¦
Here is your free MacOS malware delivering using something akin to click fix and masquerading: mac-faster[.]com/app1/
The 'download' script does a CURL on ballfrank-dot-space
It delivers an obfuscated payload.
Deobfuscated: https://pastebin.com/PCz1cxMU
The 'download' script does a CURL on ballfrank-dot-space
It delivers an obfuscated payload.
Deobfuscated: https://pastebin.com/PCz1cxMU
Pastebin
Pastebin.com - Locked Paste
Pastebin.com is the number one paste tool since 2002. Pastebin is a website where you can store text online for a set period of time.
π€―45π₯16π₯°9β€6π€£3π’1
Chat, we've got FREE MACOS malware. Big news for malware nerds
https://malwaresourcecode.com/home/my-projects/write-ups/free-macos-malware-for-everyone-hurry-up-before-google-patches-it
https://malwaresourcecode.com/home/my-projects/write-ups/free-macos-malware-for-everyone-hurry-up-before-google-patches-it
Malwaresourcecode
Free MacOS malware for everyone! Hurry up before Google patches it! | malware source code
π€―44π18π₯9β€3π₯°3
This media is not supported in your browser
VIEW IN TELEGRAM
Wow, wrestling has changed A LOT since I was a kid
β€78π€£23π’16π₯°9π€―6π€6π₯4π4
Media is too big
VIEW IN TELEGRAM
Who is this man and why does he speak in silly voices
π€£90β€12π₯°8π3π₯2π’2
Epstein files were released by the Department of Justice today.
So many people tried to view it at once the DoJ had to implement anti-DDoS measures.
The amount of data they've released is INSANE.
So many people tried to view it at once the DoJ had to implement anti-DDoS measures.
The amount of data they've released is INSANE.
π₯70π€£38β€5π₯°5π1π’1
vx-underground
Epstein files were released by the Department of Justice today. So many people tried to view it at once the DoJ had to implement anti-DDoS measures. The amount of data they've released is INSANE.
I'm uploading them to vx-underground if you don't feel like dealing with the DoJ. It's on vx-underground under /tmp/ and named DataSet1,2,3,4
Crime scene evidence:
Crime scene evidence:
π59β€22π₯°16π₯4π«‘2π’1
Behold my magnum opus. Here is my malware analysis paper collection
Papers:
2006 - 2 papers
2007 - 6 papers
2008 - 4 papers
2009 - 15 papers
2010 - 46 papers
2011 - 60 papers
2012 - 127 papers
2013 - 140 papers
2014 - 170 papers
2015 - 355 papers
2016 - 480 papers
2017 - 793 papers
2018 - 801 papers
2019 - 1056 papers
2020 - 1989 papers
2021 - 2634 papers
2022 - 2607 papers
2023 - 1450 papers
2024 - 1153 papers
2025 - 800 papers
Don't you EVER ask "whAts A GooD pLaCe To LeaRn MaLwaRe aNalYsiS?". I've got 14,869 malware analysis papers curated and organized. Most the papers have the samples with them too.
It's the muthafuckin' library of Alexandria for malware. This shit took half a decade.
Papers:
2006 - 2 papers
2007 - 6 papers
2008 - 4 papers
2009 - 15 papers
2010 - 46 papers
2011 - 60 papers
2012 - 127 papers
2013 - 140 papers
2014 - 170 papers
2015 - 355 papers
2016 - 480 papers
2017 - 793 papers
2018 - 801 papers
2019 - 1056 papers
2020 - 1989 papers
2021 - 2634 papers
2022 - 2607 papers
2023 - 1450 papers
2024 - 1153 papers
2025 - 800 papers
Don't you EVER ask "whAts A GooD pLaCe To LeaRn MaLwaRe aNalYsiS?". I've got 14,869 malware analysis papers curated and organized. Most the papers have the samples with them too.
It's the muthafuckin' library of Alexandria for malware. This shit took half a decade.
β€142π€―21β€βπ₯5π5π₯°2π’2
Hello,
The year is coming to a conclusion. Thank you everyone for another wonderful year.
Once the next round of giveaways finish I'll probably be AFK-ish. I am extremely fatigued from work and life. I'm not sure if it's possible, but I would like to be able to nap somewhere between 240 to 480 hours.
Thank you everyone for the fun times and sticking with me while I deal with a vx-underground and a newborn baby. I wholeheartedly appreciate all the kind words and support all of you have shown me. Many of you are great, caring, and compassionate people.
I have some good news and some neutral news. The good news is that I have completed (within reason) collecting every easily discoverable malware analysis paper on the internet. Yes, of course one or two may be missing here or there, but I feel like 14,000 papers over the time span of 2 decades is pretty good.
The neutral news is that moving forward vx-underground will primarily be keeping up to date on things. This isn't necessarily good or bad, but this means updates to vx-underground will be significantly smaller and fewer.
Truthfully, I'm not sure what to do anymore. I started the website with the goal of collecting malware source code, samples, and papers. I've collected 34TB (if decompressed) over 6.5 years. I feel like it would be a betrayal to my audience to continually make silly posts all day, everyday.
I sort of worked myself out of a job, I don't know.
The year is coming to a conclusion. Thank you everyone for another wonderful year.
Once the next round of giveaways finish I'll probably be AFK-ish. I am extremely fatigued from work and life. I'm not sure if it's possible, but I would like to be able to nap somewhere between 240 to 480 hours.
Thank you everyone for the fun times and sticking with me while I deal with a vx-underground and a newborn baby. I wholeheartedly appreciate all the kind words and support all of you have shown me. Many of you are great, caring, and compassionate people.
I have some good news and some neutral news. The good news is that I have completed (within reason) collecting every easily discoverable malware analysis paper on the internet. Yes, of course one or two may be missing here or there, but I feel like 14,000 papers over the time span of 2 decades is pretty good.
The neutral news is that moving forward vx-underground will primarily be keeping up to date on things. This isn't necessarily good or bad, but this means updates to vx-underground will be significantly smaller and fewer.
Truthfully, I'm not sure what to do anymore. I started the website with the goal of collecting malware source code, samples, and papers. I've collected 34TB (if decompressed) over 6.5 years. I feel like it would be a betrayal to my audience to continually make silly posts all day, everyday.
I sort of worked myself out of a job, I don't know.
β€118π«‘28π’14π₯°10π€3β€βπ₯2π―2
The same day the United States Department of Justice partially released details on the Jeffrey Epstein case, the Department of Justice released a few other interesting press releases.
Three of the press releases fall into our domain of cybersecurity, the remainder are related to narcotics or illegal immigration.
There is some speculation however that the large volume of press releases unveiled at the same time were intended to be a distraction from the Epstein file disclosure. However, this is just speculative.
What is not speculative however is the modifications made to the United States Department of Justice Epstein file releases.
Since the release of the files, several files have been removed from the release. People reviewing the files noted that the files redacted contained images of the current United States President.
Some individuals online asserted these statements are false and the United States Department of Justice has made no changes to the Epstein file release. However, what people seem to forget is that the internet does not forget.
After the release of the Epstein files the Department of Justice website implemented a queueing feature to prevent accidental DoS. During this time I archived the Epstein file releases so people interested did not have to wait in line.
Guess who has the original releases which contains data which is now removed? It's on vx-underground under /tmp/, it's listed as DataSet1, DataSet2, DataSet3, and DataSet4. Feel free to compare these raw datasets to the new ones.
Three of the press releases fall into our domain of cybersecurity, the remainder are related to narcotics or illegal immigration.
There is some speculation however that the large volume of press releases unveiled at the same time were intended to be a distraction from the Epstein file disclosure. However, this is just speculative.
What is not speculative however is the modifications made to the United States Department of Justice Epstein file releases.
Since the release of the files, several files have been removed from the release. People reviewing the files noted that the files redacted contained images of the current United States President.
Some individuals online asserted these statements are false and the United States Department of Justice has made no changes to the Epstein file release. However, what people seem to forget is that the internet does not forget.
After the release of the Epstein files the Department of Justice website implemented a queueing feature to prevent accidental DoS. During this time I archived the Epstein file releases so people interested did not have to wait in line.
Guess who has the original releases which contains data which is now removed? It's on vx-underground under /tmp/, it's listed as DataSet1, DataSet2, DataSet3, and DataSet4. Feel free to compare these raw datasets to the new ones.
β€90π16π₯°13π€£8π2