vx-underground
Today on 4chan someone leaked the source code (?) to the New York Times. They leaked 270GB of data They wrote that the New York Times has 5,000+ source code repositories, with less than 30 being encrypted (?). It is 3,600,000 files in total Note: We haven't…
This is the 2nd time this week proprietary information has been leaked onto 4chan. A few days Club Penguin files were stolen from Disney's internal network and leaked onto 4chan.
🤣69👏7❤5👍2
Hello, and good morning, evening, or night.
We've updated the vx-underground APT archive for the month of May, 2024. We've also updated some previous months in 2023 and 2022.
We hope all of you have had a good week.
https://vx-underground.org/APTs
We've updated the vx-underground APT archive for the month of May, 2024. We've also updated some previous months in 2023 and 2022.
We hope all of you have had a good week.
https://vx-underground.org/APTs
🔥24👍5❤4🙏4🤯1😢1
We've updated the vx-underground Malware Analysis paper collection
- 2024-01-24 - Layers of Deception: Analyzing the Complex Stages of XLoader 4.3 Malware Evolution
- 2024-02-19 - Pelmeni Wrapper: New Wrapper of Kazuar (Turla Backdoor)
- 2024-03-26 - Comprehensive Analysis of EMOTET Malware: Part 1
- 2024-04-13 - Analysis of malicious Microsoft office macros
- 2024-04-22 - Analyzing Forest Blizzard’s custom post-compromise tool for exploiting CVE-2022-38028 to obtain credentials
- 2024-04-29 - How to unpack Death Ransomware
- 2024-05-01 - “Dirty stream” attack: Discovering and mitigating a common vulnerability pattern in Android apps
- 2024-05-08 - APT28 campaign targeting Polish government institutions
- 2024-01-24 - Layers of Deception: Analyzing the Complex Stages of XLoader 4.3 Malware Evolution
- 2024-02-19 - Pelmeni Wrapper: New Wrapper of Kazuar (Turla Backdoor)
- 2024-03-26 - Comprehensive Analysis of EMOTET Malware: Part 1
- 2024-04-13 - Analysis of malicious Microsoft office macros
- 2024-04-22 - Analyzing Forest Blizzard’s custom post-compromise tool for exploiting CVE-2022-38028 to obtain credentials
- 2024-04-29 - How to unpack Death Ransomware
- 2024-05-01 - “Dirty stream” attack: Discovering and mitigating a common vulnerability pattern in Android apps
- 2024-05-08 - APT28 campaign targeting Polish government institutions
🫡23👍6🔥5❤4😢1
Today on the Microsoft blog the Vice President of Windows and Devices, Pavan Davuluri, released new information & updates on Microsoft Recall citing that they 'have heard feedback' on Microsoft Recall and have decided to make some changes to how it operates.
- You can now choose whether or not you want Recall active during installation. It is no longer active by default
- "Windows Hello" enrollment is now required to enable Recall. A "proof-of-presence" is required to view and search Recall
- Recall is now implementing additional layers of protection – it is decrypted in-real-time with Windows Hello Enhanced Sign-in Security (ESS). Data is only decrypted when a user authenticates it. Search index is all encrypted.
They've also introduced more management features of administrators of corporate or enterprise environments.
Thanks to CyberCakeX for sharing this with us.
More information: https://blogs.windows.com/windowsexperience/2024/06/07/update-on-the-recall-preview-feature-for-copilot-pcs/
- You can now choose whether or not you want Recall active during installation. It is no longer active by default
- "Windows Hello" enrollment is now required to enable Recall. A "proof-of-presence" is required to view and search Recall
- Recall is now implementing additional layers of protection – it is decrypted in-real-time with Windows Hello Enhanced Sign-in Security (ESS). Data is only decrypted when a user authenticates it. Search index is all encrypted.
They've also introduced more management features of administrators of corporate or enterprise environments.
Thanks to CyberCakeX for sharing this with us.
More information: https://blogs.windows.com/windowsexperience/2024/06/07/update-on-the-recall-preview-feature-for-copilot-pcs/
Windows Experience Blog
Update on the Recall preview feature for Copilot+ PCs
Update: June 13, 2024: Today, we are communicating an additional update on the Recall (preview) feature for Copilot+ PCs. Recall will now shift from a preview experience broadly available for Copilot+ PCs on June 18, 2024, to a preview ava
🤣60👍28🎉7❤4😢1
This media is not supported in your browser
VIEW IN TELEGRAM
Today cloud11665 discovered a CSS injection vulnerability (or super cool customization feature) on GitHub.
* Reposted for issue correction
* Initially attributed discovery to wrong person
Video shared from yacineMTB
* Reposted for issue correction
* Initially attributed discovery to wrong person
Video shared from yacineMTB
🤣92🔥11❤7👍3😁2🤓2😢1
Today following the CSS injection discovered by cloud11665, internet nerds also discovered you can do CSS injection on the issues tab.
The attached link is defanged. Someone did a CSS injection on a raised issue, which resulted in the issue being essentially hijacked. When the link is clicked it quickly flashes in black & white a Discord invitation link.
This could potentially pose an issue to individuals who suffer from epilepsy.
Link if you're curious what it looks like:
hxxps://github.com/tukaani-project/xz/issues/92
The attached link is defanged. Someone did a CSS injection on a raised issue, which resulted in the issue being essentially hijacked. When the link is clicked it quickly flashes in black & white a Discord invitation link.
This could potentially pose an issue to individuals who suffer from epilepsy.
Link if you're curious what it looks like:
hxxps://github.com/tukaani-project/xz/issues/92
🔥37❤5👍3🤔3😢2
Today following the CSS injection discovered by cloud11665, security researcher vmfunc discovered you can also create ReadMe files which force log people out of their GitHub profiles. Oh, and you can make IP grabbers!
GitHub has now become the wild west
GitHub has now become the wild west
🤩69🔥10❤5🫡4😎4🥰1😢1
This media is not supported in your browser
VIEW IN TELEGRAM
GitHub employees chasing down the nerds who turned their website into nothing but anime, IP grabbers, thread hijacks, and goatse spam... on a Friday night 😂😂😂
🤣148🥰5❤4❤🔥2😢2
The GitHub CSS Injection which was patched a few hours ago has already been bypassed.
Internet nerds are returning with wrath as they resume anime backgrounds and anime banners
We were asked not to show the bypass code to 340,000 people so it's not patched instantly ¯\_(ツ)_/¯
Internet nerds are returning with wrath as they resume anime backgrounds and anime banners
We were asked not to show the bypass code to 340,000 people so it's not patched instantly ¯\_(ツ)_/¯
❤🔥73🤣31❤12😁5😢3🤓1
This media is not supported in your browser
VIEW IN TELEGRAM
Leaked footage of Internet Degenerates and GitHub employees at the Battle of Anime Backgrounds (2024, colorized)
🤣152🫡8😁6🥰3👍2😱2😢2❤🔥1
After over 5 years of work, we believe vx-underground is now approaching "maintenance mode" — our work will primarily be keeping content up to date.
tl;dr 1,825 days of work
tl;dr 1,825 days of work
❤117😢31🫡30🤯4😱4👍3🔥2🤓2👏1
Hello, we hope all of you had a good week and weekend
Today is the day of rest. We'll see you Monday
Also, to clear up some confusion, we are still going to work on vx-underground, the post about 5 years of work was regarding older material
tl;dr got lots of stuff, feels good
Today is the day of rest. We'll see you Monday
Also, to clear up some confusion, we are still going to work on vx-underground, the post about 5 years of work was regarding older material
tl;dr got lots of stuff, feels good
❤72🫡15👍5🔥4😱1😢1
We've received a lot of messages today regarding Lockbit ransomware groups Telegram.
We've been in contact with Lockbit ransomware group and several of their affiliates and subgroups since 2019. Lockbit ransomware group does not have a Telegram.
Lockbit is so paranoid he uses his own onion-based file sharing service. He thinks Telegram, Twitter, virtually all social media, is controlled by governments and refuses to use them.
Also, the account some of you send us named FbiSupp is not the real FBI. We have no idea what or who this account is — but the real FBI Telegram accounts are listed on the United States Department of Justice and Justice for Rewards (operated by the United States Department of State) website. These are imposters.
tl;dr being scammed by fake FBI because ??? and scammed by fake Lockbit because ???
We've been in contact with Lockbit ransomware group and several of their affiliates and subgroups since 2019. Lockbit ransomware group does not have a Telegram.
Lockbit is so paranoid he uses his own onion-based file sharing service. He thinks Telegram, Twitter, virtually all social media, is controlled by governments and refuses to use them.
Also, the account some of you send us named FbiSupp is not the real FBI. We have no idea what or who this account is — but the real FBI Telegram accounts are listed on the United States Department of Justice and Justice for Rewards (operated by the United States Department of State) website. These are imposters.
tl;dr being scammed by fake FBI because ??? and scammed by fake Lockbit because ???
🤣103❤7🔥5😎4👍2😁2😢1
ShinyHunters, the group (person?) responsible for administrating Breached has disappeared. Breached is offline on both clearnet and Tor
Additionally, Shiny's Telegram and Telegram Channel have been deleted
People are speculating they've been arrested
¯\_(ツ)_/¯
Additionally, Shiny's Telegram and Telegram Channel have been deleted
People are speculating they've been arrested
¯\_(ツ)_/¯
😢63🔥10🤔10🤣5❤3👍2👏2
vx-underground
ShinyHunters, the group (person?) responsible for administrating Breached has disappeared. Breached is offline on both clearnet and Tor Additionally, Shiny's Telegram and Telegram Channel have been deleted People are speculating they've been arrested ¯\_(ツ)_/¯
The only thing we know for sure is that it's Sunday. We dislike when things happen on Sunday
>:(
>:(
❤57🤣13😁9🔥6😢2👍1