vx-underground
Today Lockbit ransomware groups 'timer' on the 'Federal Reserve' hit zero. They did not ransom the Federal Reserve as we expected – they ransomed Evolve Bank & Trust. We also assume the data is not critical because the facility is still operational.
As reference: we expressed extremely skepticism with Lockbit ransomware groups claims. We suspected the affiliate (who probably doesn't know English) saw a document that said "United States Federal Reserve" and thought it was that.
https://x.com/vxunderground/status/1805214817625530613
https://x.com/vxunderground/status/1805214817625530613
🤣79💯6😢1
vx-underground
When we find the guy who did the documentation for IActiveScript and IActiveScriptParse64 on MSDN
tl;dr exploring executing vbnoscript and jnoscript in-memory from a binary in c++. modexp did a c project on it, explored possibilities of it. worked with vbnoscript, imploded on jnoscript with hresult 0x80020101
got annoyed
heres the vbnoscript code that works: https://pastebin.com/raw/dW3w97Bx
got annoyed
heres the vbnoscript code that works: https://pastebin.com/raw/dW3w97Bx
❤17🤔2🤓2😢1
This media is not supported in your browser
VIEW IN TELEGRAM
When the Security Team catches a Threat Actor actively trying to compromise a machine
🤣153🫡16😁9🥰3😢2🤔1🤝1😎1
This media is not supported in your browser
VIEW IN TELEGRAM
🔥86🫡27🤣15❤8🤔5👍2😢2
"oTheR cOmpAnieS haVe MorE mAlwArE thAn yOu"
Ted Talk time.
First of all, we're not a company. We're just a bunch of internet nerds wildin' out on a computer.
Secondly, right now vx-underground ingests roughly 120,000 malware samples a month with a budget of a slice of pizza and some weird lookin' lint we found in our pocket.
The reality of the situation is large organizations ingest absurd quantities of malware. Antivirus vendors, (some) Threat Intelligence vendors, and Endpoint Security vendors ingest terabytes of malware a day.
We are aware of some organizations which ingest 500,000 - 1,000,000 malware samples a day. Whereas some AV vendors reportedly ingest over 5,000,000 malware samples a day. These organizations dwarf us.
Part of the reason why is simple: intelligence. Vendors are ingesting malware in large quantities, through various means such as honeypots, sharing between organizations (private exchanges), submissions from VirusTotal, and malware captured from user endpoints.
They use this data to track and monitor malware campaigns, C2 addresses (IPs or domains), look for modification of code bases, and look for any missteps and leaking of PII. They then distribute this data and update security rules, update known-good and known-bad SHA256 collections, and often work with law enforcements agencies to takedown Threat Groups. This is work that happens everyday, around the clock, 24/7 and these organizations work hard monitoring malware nerds.
Our purpose of collecting malware is historical in nature – people can download the malware, reverse the malware, and study the malware. Our malware is often hammy downs (metaphorically speaking) from larger organizations and is rarely cutting edge. It would be difficult to identify a new Threat Group from our malware collection. The advantage of our collection is it is often difficult for people to even get hammy down malware without begging someone (or some organization) OR the malware samples are scattered all over the place. Our collection is in 1 singular location making it easier to get the cool stuff nerds wanna study.
Thanks for coming to our Ted Talk.
Ted Talk time.
First of all, we're not a company. We're just a bunch of internet nerds wildin' out on a computer.
Secondly, right now vx-underground ingests roughly 120,000 malware samples a month with a budget of a slice of pizza and some weird lookin' lint we found in our pocket.
The reality of the situation is large organizations ingest absurd quantities of malware. Antivirus vendors, (some) Threat Intelligence vendors, and Endpoint Security vendors ingest terabytes of malware a day.
We are aware of some organizations which ingest 500,000 - 1,000,000 malware samples a day. Whereas some AV vendors reportedly ingest over 5,000,000 malware samples a day. These organizations dwarf us.
Part of the reason why is simple: intelligence. Vendors are ingesting malware in large quantities, through various means such as honeypots, sharing between organizations (private exchanges), submissions from VirusTotal, and malware captured from user endpoints.
They use this data to track and monitor malware campaigns, C2 addresses (IPs or domains), look for modification of code bases, and look for any missteps and leaking of PII. They then distribute this data and update security rules, update known-good and known-bad SHA256 collections, and often work with law enforcements agencies to takedown Threat Groups. This is work that happens everyday, around the clock, 24/7 and these organizations work hard monitoring malware nerds.
Our purpose of collecting malware is historical in nature – people can download the malware, reverse the malware, and study the malware. Our malware is often hammy downs (metaphorically speaking) from larger organizations and is rarely cutting edge. It would be difficult to identify a new Threat Group from our malware collection. The advantage of our collection is it is often difficult for people to even get hammy down malware without begging someone (or some organization) OR the malware samples are scattered all over the place. Our collection is in 1 singular location making it easier to get the cool stuff nerds wanna study.
Thanks for coming to our Ted Talk.
❤215👍22❤🔥10🤣6🫡6🥰2😘2🤔1😢1💯1
TeamViewer disclosed a security breach today**
https://www.teamviewer.com/en/resources/trust-center/statement/
https://www.teamviewer.com/en/resources/trust-center/statement/
TeamViewer
TV-2024-1005
😱56🤓30🔥13🤣12🥰3😎2❤1
This media is not supported in your browser
VIEW IN TELEGRAM
More ransomware, more arrests, more breaches, more malware – same ol' same ol'
❤🔥60😁25🤣12💯7👍5❤4😢1😎1
Today an unknown individual shared a photo of their new pillow. It is the official Alexandria Sheriff's Office mugshot of ex-Breached administrator Pompompurin
tl;dr don't do crime or you'll end up on a pillow
tl;dr don't do crime or you'll end up on a pillow
🤣160😁9🔥8❤3👏2😢2👍1💯1
Large update to vx-underground:
Samples:
- VirusSign.2024.06.20
- VirusSign.2024.06.21
- VirusSign.2024.06.22
- VirusSign.2024.06.23
- VirusSign.2024.06.24
- VirusSign.2024.06.25
- VirusSign.2024.06.26
- VirusSign.2024.06.27
- VirusSign.2024.06.28
- InTheWild.0127
Papers:
- 2015-01-22 - Malvertising Leading To Flash Zero Day Via Angler Exploit Kit
- 2018-10-22 - Chalubo botnet wants to DDoS from your server or IoT device
- 2022-07-18 - Trident Ursa
- 2023-06-10 - IcedID Brings ScreenConnect and CSharp Streamer to ALPHV Ransomware Deployment
- 2023-06-13 - VMware ESXi Zero-Day Used by Chinese Espionage Actor to Perform Privileged Guest Operations on Compromised Hypervisors
- 2024-01-06 - Understanding Internals of SmokeLoader
- 2024-01-19 - Chinese Espionage Group UNC3886 Found Exploiting CVE-2023-34048 Since Late 2021
- 2024-04-09 - BlueShell: Four Years On, Still A Formidable Threat
- 2024-04-09 - Unpacking the Blackjack Group's Fuxnet Malware
- 2024-04-24 - Analysis of Ongoing FROZENSHADOW Attack Campaign Leveraging SSLoad Malware and RMM Software for Domain Takeover
- 2024-05-06 - HijackLoader Updates
- 2024-05-08 - From OSINT to Disk: Wave Stealer Analysis
- 2024-05-13 - Wavestealer Spotted In The Wild
- 2024-05-23 - Tracking APT SideWinder With DNS Records
- 2024-05-26 - QakBOT v5 Deep Malware Analysis
- 2024-05-28 - BlackSuit Attack Analysis
- 2024-05-30 - The Pumpkin Eclipse
- 2024-06-04 - Muhstik Malware Targets Message Queuing Services Applications
- 2024-06-05 - DarkGate switches up its tactics with new payload, email templates
- 2024-06-05 - ExMatter malware levels up: S-RM observes new variant with simultaneous remote code execution and data targeting
- 2024-06-06 - DarkGate: Make AutoIt Great Again
- 2024-06-06 - EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis
Samples:
- VirusSign.2024.06.20
- VirusSign.2024.06.21
- VirusSign.2024.06.22
- VirusSign.2024.06.23
- VirusSign.2024.06.24
- VirusSign.2024.06.25
- VirusSign.2024.06.26
- VirusSign.2024.06.27
- VirusSign.2024.06.28
- InTheWild.0127
Papers:
- 2015-01-22 - Malvertising Leading To Flash Zero Day Via Angler Exploit Kit
- 2018-10-22 - Chalubo botnet wants to DDoS from your server or IoT device
- 2022-07-18 - Trident Ursa
- 2023-06-10 - IcedID Brings ScreenConnect and CSharp Streamer to ALPHV Ransomware Deployment
- 2023-06-13 - VMware ESXi Zero-Day Used by Chinese Espionage Actor to Perform Privileged Guest Operations on Compromised Hypervisors
- 2024-01-06 - Understanding Internals of SmokeLoader
- 2024-01-19 - Chinese Espionage Group UNC3886 Found Exploiting CVE-2023-34048 Since Late 2021
- 2024-04-09 - BlueShell: Four Years On, Still A Formidable Threat
- 2024-04-09 - Unpacking the Blackjack Group's Fuxnet Malware
- 2024-04-24 - Analysis of Ongoing FROZENSHADOW Attack Campaign Leveraging SSLoad Malware and RMM Software for Domain Takeover
- 2024-05-06 - HijackLoader Updates
- 2024-05-08 - From OSINT to Disk: Wave Stealer Analysis
- 2024-05-13 - Wavestealer Spotted In The Wild
- 2024-05-23 - Tracking APT SideWinder With DNS Records
- 2024-05-26 - QakBOT v5 Deep Malware Analysis
- 2024-05-28 - BlackSuit Attack Analysis
- 2024-05-30 - The Pumpkin Eclipse
- 2024-06-04 - Muhstik Malware Targets Message Queuing Services Applications
- 2024-06-05 - DarkGate switches up its tactics with new payload, email templates
- 2024-06-05 - ExMatter malware levels up: S-RM observes new variant with simultaneous remote code execution and data targeting
- 2024-06-06 - DarkGate: Make AutoIt Great Again
- 2024-06-06 - EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis
🔥32🤓5❤3👍2❤🔥1😢1
Nerds are reporting Lockbit ransomware group's blog now requires a blog access key to visit it.
The blog access key: NDWZ3NXU66EWUFBMJWQOC2FXIIHFZFKZRULHBGAYFYX4HEIDRF5Q
Have a nice day
The blog access key: NDWZ3NXU66EWUFBMJWQOC2FXIIHFZFKZRULHBGAYFYX4HEIDRF5Q
Have a nice day
🤣126👍56❤16💯6🫡4🔥2😁2😢1
Today Linus Tech Tips released a video about the vx-underground harddrive and our collection.
First, thank you for using an image of a shadowy person with odors radiating off of them to describe smelly. 11/10.
Secondly, Linus and his group did an EXCELLENT job discussing the harddrive and the collection. We believe they accurately describe it, its use case, and the basic reasoning why this entire collection exists.
Some portions of the video are very watered down – but this high-level beginner perspective is perfect for people who are unfamiliar with malware. Additionally, in some places the nomenclature is wrong, but the general idea and principles are still 100% correct.
We also enjoy the enthusiasm Mr. Linus shows with the malware, he reminds us of our first time experimenting with a malware builder.
The end review saying we're the darker side of grey is a little disheartening, but ¯\_(ツ)_/¯
https://www.youtube.com/watch?v=7inhRWxQMFk
First, thank you for using an image of a shadowy person with odors radiating off of them to describe smelly. 11/10.
Secondly, Linus and his group did an EXCELLENT job discussing the harddrive and the collection. We believe they accurately describe it, its use case, and the basic reasoning why this entire collection exists.
Some portions of the video are very watered down – but this high-level beginner perspective is perfect for people who are unfamiliar with malware. Additionally, in some places the nomenclature is wrong, but the general idea and principles are still 100% correct.
We also enjoy the enthusiasm Mr. Linus shows with the malware, he reminds us of our first time experimenting with a malware builder.
The end review saying we're the darker side of grey is a little disheartening, but ¯\_(ツ)_/¯
https://www.youtube.com/watch?v=7inhRWxQMFk
YouTube
I Bought 25 Million Computer Viruses - VX Underground Malware HDD
Thank you ThreatLocker for helping with this video. If you want to learn more about Ringfencing and how to protect your network, start a free trial or book a demo: https://lmg.gg/TLock
We bought an external 8TB hard drive filled to the brim with malware…
We bought an external 8TB hard drive filled to the brim with malware…
❤136🤣45🫡18🔥10👍5💯4👏2😢1