Windows has 3 different types of boolean values.
typedef int BOOL
typedef BYTE BOOLEAN
typedef short VARIANT_BOOL
*BYTE is defined as an unsigned char
When setting VARIANT_BOOL you cannot use TRUE or FALSE. You need to use VARIANT_TRUE or VARIANT_FALSE
Have a nice day.
typedef int BOOL
typedef BYTE BOOLEAN
typedef short VARIANT_BOOL
*BYTE is defined as an unsigned char
When setting VARIANT_BOOL you cannot use TRUE or FALSE. You need to use VARIANT_TRUE or VARIANT_FALSE
Have a nice day.
🤓88🤣25🔥13🤯11❤10👍8🫡8😱6😢5🤔3😁2
Another 116,024 malware samples queued and ready for upload into the VXDB 🫡
*Our VXDB is free for everyone to use
*You can download and search samples
*Bulk download coming (eventually)
https://virus.exchange
*Our VXDB is free for everyone to use
*You can download and search samples
*Bulk download coming (eventually)
https://virus.exchange
👍26❤12🙏3🥰2🫡2
We were just informed that a member of vx-underground lost two family members in Maine yesterday. A cousin and a nephew were the victims of a very sick person.
We will be inactive for the next couple of days.
We will be inactive for the next couple of days.
😢369🫡71❤48🙏30😱7😁5🤣5🎉3🤔2🤯2😇1
Yesterday Lockbit ransomware group listed Boeing on their victims list. Boeing is a multinational American company with an estimated annual revenue of $66,610,000,000. They have over 150,000 employees worldwide. Boeing serves both the public and private sector.
We spoke with Lockbit ransomware group administrative staff yesterday regarding Boeing. They informed us that they have not yet spoke with a representative from Boeing and they will not disclose any information to us about Boeing - more specifically they would not give us insights into how long they had access to Boeing, how much data was exfiltrated, what kind of data was stolen, etc.
Lockbit stated their ransomware affiliate got access using a 0day exploit. However, Lockbit would not elaborate further on this exploit hence we cannot verify the legitimacy of these claims.
It is also probably worth noting that most victims listed by Lockbit are given 10 days (or more) to begin negotiations. Lockbit gave Boeing less than 6 days
We spoke with Lockbit ransomware group administrative staff yesterday regarding Boeing. They informed us that they have not yet spoke with a representative from Boeing and they will not disclose any information to us about Boeing - more specifically they would not give us insights into how long they had access to Boeing, how much data was exfiltrated, what kind of data was stolen, etc.
Lockbit stated their ransomware affiliate got access using a 0day exploit. However, Lockbit would not elaborate further on this exploit hence we cannot verify the legitimacy of these claims.
It is also probably worth noting that most victims listed by Lockbit are given 10 days (or more) to begin negotiations. Lockbit gave Boeing less than 6 days
🔥75😱19🎉9👍7❤2👏1💯1🤣1😎1
This media is not supported in your browser
VIEW IN TELEGRAM
ZachXBT, an independent cryptocurrency investigator who monitors and tracks cryptocurrency scams, received a video from a group of scammers. They got full bottle service last night, somewhere in Canada, and held a sign taunting him with "ZachXBT is watching".
😁81🤣69❤🔥8🤯5❤4🎉4😢2🤔1😱1😇1
This media is not supported in your browser
VIEW IN TELEGRAM
Around July, 2023 an individual operating under the alias "Blue" and "Trout", successfully phished someone and stole $213,000 from the victim.
They subsequently paid a group of men to dance and thank the victim for the money.
They subsequently paid a group of men to dance and thank the victim for the money.
🤣201😁15👍11😢11❤5🔥5
This media is not supported in your browser
VIEW IN TELEGRAM
Sim swappers and crypto drainers seem to dislike ZachXBT. We received an anonymous message today with this video.
🤣133💯23❤6👍4🤔4🤓2😁1
We've updated the vx-underground malware source code collection on GitHub.
Yesterday the source code to banking trojans Android.Hook and Android.Ermac were leaked online.
*Hook is the successor to Ermac
*Thanks to 3xp0rtblog for the code
https://github.com/vxunderground/MalwareSourceCode
Yesterday the source code to banking trojans Android.Hook and Android.Ermac were leaked online.
*Hook is the successor to Ermac
*Thanks to 3xp0rtblog for the code
https://github.com/vxunderground/MalwareSourceCode
GitHub
GitHub - vxunderground/MalwareSourceCode: Collection of malware source code for a variety of platforms in an array of different…
Collection of malware source code for a variety of platforms in an array of different programming languages. - vxunderground/MalwareSourceCode
👍20🥰9🔥8❤3
This media is not supported in your browser
VIEW IN TELEGRAM
ZachXBT, an independent cryptocurrency investigator who monitors and tracks cryptocurrency scams, shared ANOTHER video of cryptocurrency thieves taunting him.
The sign says "Fuck ZachXBT. Chards"
That's 3 videos now 😭
The sign says "Fuck ZachXBT. Chards"
That's 3 videos now 😭
😁79🤣42❤24👍10😢8😱3💯3🤔2