We've added a new linux malware paper. Yes, they exist.
2024-01-30 - Implementing Remote Persistent Keylogger Executing in User-Space exploiting Utilities in GNU Linux Operating Systems
It is a lengthy paper noscript.
Check it out here: https://vx-underground.org/Papers/Linux/Persistence
2024-01-30 - Implementing Remote Persistent Keylogger Executing in User-Space exploiting Utilities in GNU Linux Operating Systems
It is a lengthy paper noscript.
Check it out here: https://vx-underground.org/Papers/Linux/Persistence
Vx Underground
The largest collection of malware source code, samples, and papers on the internet.
❤44🔥11😱7👍4🫡2🤓1
In the past we've tried to prevent Lockbit ransomware group from attacking healthcare facilities and non-profit institutions. We have never had success.
The reason why derives from either ignorance on their end (intentional, or not, it's up to your interpretation), and ambiguity of their ruleset from affiliates.
Recently Lockbit ransomware group attacked a non-profit healthcare institute in Chicago. The facility is Saint Anthony Hospital. The facility clearly states they're a non-profit and religious institution. Attacking this facility is a blatant violation of the Lockbit ruleset which is defined by their administrative staff.
However, when we approached the Lockbit administration we received a reply with a link to the organizations financial disclosures. Lockbit ransomware group believes that a non-profit institution in the United States means employees are not paid and the organization quite literally has no money.
In other words, they will not ransom a company if they quite literally have no money.
If you attempt to educate and present information to Lockbit administrative staff on non-profit institution laws in the United States they will state the organization is corrupt and they will imply (directly or indirectly) it is a money laundering operation and the facility is dirty and deserves to be ransomed.
In summary: the rules are a facade
The reason why derives from either ignorance on their end (intentional, or not, it's up to your interpretation), and ambiguity of their ruleset from affiliates.
Recently Lockbit ransomware group attacked a non-profit healthcare institute in Chicago. The facility is Saint Anthony Hospital. The facility clearly states they're a non-profit and religious institution. Attacking this facility is a blatant violation of the Lockbit ruleset which is defined by their administrative staff.
However, when we approached the Lockbit administration we received a reply with a link to the organizations financial disclosures. Lockbit ransomware group believes that a non-profit institution in the United States means employees are not paid and the organization quite literally has no money.
In other words, they will not ransom a company if they quite literally have no money.
If you attempt to educate and present information to Lockbit administrative staff on non-profit institution laws in the United States they will state the organization is corrupt and they will imply (directly or indirectly) it is a money laundering operation and the facility is dirty and deserves to be ransomed.
In summary: the rules are a facade
😢85❤25🫡14🤣9😁6🤔6👍3😱3🤯2😍2
vx-underground
In the past we've tried to prevent Lockbit ransomware group from attacking healthcare facilities and non-profit institutions. We have never had success. The reason why derives from either ignorance on their end (intentional, or not, it's up to your interpretation)…
Additionally, it should be stated that this pseudo-ruleset applies to educational institutions as well. We are aware of several instances where affiliates ransomed public education facilities (K-12 schools).
When we bring up the fact these are state-funded educational facilities and have no money, they do not believe us or they assert that they do have money because the facility owns computers.
"If they money for computers, they have money to pay me"
When we bring up the fact these are state-funded educational facilities and have no money, they do not believe us or they assert that they do have money because the facility owns computers.
"If they money for computers, they have money to pay me"
🤯51🫡12❤11🤣8😁3😢3👍1👏1
We met a wonderful man on Telegram yesterday. He currently resides in a level 5 maximum security prison. He is serving 30 years in prison.
His associate smuggled a cell phone into prison, presumably through his anus, so they could do things on the internet.
Very cool 👍
His associate smuggled a cell phone into prison, presumably through his anus, so they could do things on the internet.
Very cool 👍
👍104🤣63❤11🥰5🫡4🤝1
This media is not supported in your browser
VIEW IN TELEGRAM
Free Joey D! He didn't do anything wrong!
*Joey is serving 30 years in a maximum security prison for shooting, and nearly killing, 3 people during a drug deal gone bad
*Joey is serving 30 years in a maximum security prison for shooting, and nearly killing, 3 people during a drug deal gone bad
🤓89🤣40😎36🤯8🤔5😁4👍3🔥3🎉3👏2🫡1
The United States Department of Justice has been arresting and/or indicting individuals involved in cyber criminals left-and-right.
They've indicted 8 individuals within the past 2 weeks.
Individuals arrested and/or indicted:
- "R" a/k/a "R$" a/k/a "ElSwapo1"
- "Em"
- "Carti" a/k/a/ "Punslayer"
- "Snoopy"
- "TheMFNPlug"
- "Joey"
- "Sosa" a/k/a "Elijah" a/k/a "King Bob"
- "The Real Jewt King"
NOTE: Reposted, phrasing improved
They've indicted 8 individuals within the past 2 weeks.
Individuals arrested and/or indicted:
- "R" a/k/a "R$" a/k/a "ElSwapo1"
- "Em"
- "Carti" a/k/a/ "Punslayer"
- "Snoopy"
- "TheMFNPlug"
- "Joey"
- "Sosa" a/k/a "Elijah" a/k/a "King Bob"
- "The Real Jewt King"
NOTE: Reposted, phrasing improved
👍45🔥16😱13🫡12😢8❤7😁3❤🔥2🥰2🤣1
If you're interested in keeping up with ransomware attacks and/or ransomware victims, a group of researchers have ported the vx-underground ransomware news bot over to Telegram
tl;dr monitors ransomware group sites near-in-real-time for latest listings
https://news.1rj.ru/str/RansomwareNewsVX
tl;dr monitors ransomware group sites near-in-real-time for latest listings
https://news.1rj.ru/str/RansomwareNewsVX
Telegram
Ransomware News (VX)
This is NOT the official channel of vx-underground.org /
Another ransom trackers:
https://news.1rj.ru/str/ransomlook
https://news.1rj.ru/str/ransomwarelive
Another ransom trackers:
https://news.1rj.ru/str/ransomlook
https://news.1rj.ru/str/ransomwarelive
❤42👍13🤓6🔥3🤯1
This media is not supported in your browser
VIEW IN TELEGRAM
Hackers looking for their next target
🤣188😁32🫡12❤6🤯3🤓3🙏2😍2
we are trying to sleep.
everytime we check twitter we see more arrests or high profile breaches
everyone just clam down for a second ok
ok ttyl
everytime we check twitter we see more arrests or high profile breaches
everyone just clam down for a second ok
ok ttyl
🫡67👍10😇6😘3😢1🤝1
Today it was announced by authorities in Georgia that a murder suspect was accidentally released from Clayton County Jail following a 'cyber security incident' which resulted in 'widespread system outage'
tl;dr ransomware freed a suspected murderer
https://whee.net/2024/02/01/murder-suspect-mistakenly-released-from-jail-after-cybersecurity-incident/
tl;dr ransomware freed a suspected murderer
https://whee.net/2024/02/01/murder-suspect-mistakenly-released-from-jail-after-cybersecurity-incident/
🤔42🤯16🔥11🤣9😱6🫡6❤3😎3
Today CloudFlare reported that they had been compromised on Thanksgiving, 2023. They state that the Threat Actor got access via Okta, which was compromised in October, 2023
This is the 2nd time CloudFlare was compromised through Okta
No data was stolen
https://blog.cloudflare.com/thanksgiving-2023-security-incident
This is the 2nd time CloudFlare was compromised through Okta
No data was stolen
https://blog.cloudflare.com/thanksgiving-2023-security-incident
The Cloudflare Blog
Thanksgiving 2023 security incident
On Thanksgiving Day, November 23, 2023, Cloudflare detected a threat actor on our self-hosted Atlassian server. Our security team immediately began an investigation, cut off the threat actor’s access, and no Cloudflare customer data or systems were impacted…
🤯57🤣38😱7🔥5🫡2❤1
We've got 21,000+ malware samples in queue, 8 more harddrives to clone, 50+ malware development papers to add, 200+ malware reverse engineering papers to add, and a bunch of cat gifs
❤55🎉7🫡5😎4🤣2
vx-underground
We've got 21,000+ malware samples in queue, 8 more harddrives to clone, 50+ malware development papers to add, 200+ malware reverse engineering papers to add, and a bunch of cat gifs
This media is not supported in your browser
VIEW IN TELEGRAM
🥰65❤20🤣9😁4🫡1
We've updated the VXUG malware families collection
- AkiraRansomware
- BottomLoader
- DLRAT
- GoTitan
- GraphicalProton
- GuLoader
- HazyLoader
- LitterDrifter
- NineRAT
- PlugX
- RedLine
- RhadamanthysLoader
- RhysidaRansomware
- RisePro
- VettaLoader
https://vx-underground.org/Samples/Families
- AkiraRansomware
- BottomLoader
- DLRAT
- GoTitan
- GraphicalProton
- GuLoader
- HazyLoader
- LitterDrifter
- NineRAT
- PlugX
- RedLine
- RhadamanthysLoader
- RhysidaRansomware
- RisePro
- VettaLoader
https://vx-underground.org/Samples/Families
❤🔥33👍6🤣5❤3