Administrative updates:
- August 21st, new hardware arrives.
- We'll occasionally livestream malware ingestion. The streams will take place on Xitter. You can watch numbers go up.
- New papers will be pushed once new hardware arrives
Enjoy your weekend. Love you
- August 21st, new hardware arrives.
- We'll occasionally livestream malware ingestion. The streams will take place on Xitter. You can watch numbers go up.
- New papers will be pushed once new hardware arrives
Enjoy your weekend. Love you
🔥50❤12❤🔥6🤓6🎉5😢2
This media is not supported in your browser
VIEW IN TELEGRAM
Malware ASMR: Extracting, compressing, and uploading malware while a cooling system works in the background
🥰103❤🔥23🤓15🔥6🤣4👍2😁1😢1
vx-underground
Malware ASMR: Extracting, compressing, and uploading malware while a cooling system works in the background
It will actually put you to sleep — it's super cold, dark, and magic numbers just keep being magical. You will pass out in your chain
❤61😁17🥰10❤🔥4🤩3🔥2😍2🤓2🫡2👍1😢1
If you like to watch numbers go up: we're currently livestreaming our malware ingestion.
https://www.twitch.tv/vxunderground_live
https://www.twitch.tv/vxunderground_live
Twitch
vxunderground_live - Twitch
The largest collection of malware source code, samples, and papers on the internet.
🔥40🤓12👍7❤6🤣2😢1
vx-underground in 2019:
- simple and free shared hosting
- 20gb in total
- 1 old crappy pc
vx-underground 2024:
- home lab setup with 4 pc's (soon 5)
- fiber
- ingesting 20gb - 60gb per day
- 10 people team
- 8 servers, custom software suite for vxug
- 7.15tb in total
- anime
- simple and free shared hosting
- 20gb in total
- 1 old crappy pc
vx-underground 2024:
- home lab setup with 4 pc's (soon 5)
- fiber
- ingesting 20gb - 60gb per day
- 10 people team
- 8 servers, custom software suite for vxug
- 7.15tb in total
- anime
🔥173❤26🤣21🎉10👍8🫡6🤓4🤔1😢1
vx-underground
vx-underground in 2019: - simple and free shared hosting - 20gb in total - 1 old crappy pc vx-underground 2024: - home lab setup with 4 pc's (soon 5) - fiber - ingesting 20gb - 60gb per day - 10 people team - 8 servers, custom software suite for vxug - 7.15tb…
This started off as a side-project created to collect and share cool malware stuff that I liked – I hoped maybe other people would find it useful and think it's cool too.
Now it's gotten wildly out of control.
Now it's gotten wildly out of control.
❤🔥117🔥22🙏13❤9👍3😢1🤓1
Hello,
We need to make something very clear: we are not like VirusTotal. We are not a competitor to VirusTotal.
VirusTotal does file detections, allows retrohunting, sandboxing and blah blah blah.
We just collect it
They're enterprise malware tooling. We're a public library
We need to make something very clear: we are not like VirusTotal. We are not a competitor to VirusTotal.
VirusTotal does file detections, allows retrohunting, sandboxing and blah blah blah.
We just collect it
They're enterprise malware tooling. We're a public library
💯171🤓36❤🔥15😁11❤9👍6👏6🤯2🔥1😢1
We'll be aiming to share our malware ingestion feed on Xitter everyday. You can watch numbers go up and listen to a cooling system.
Alternatively, you can do something better with your time while we watch numbers go up.
¯\_(ツ)_/¯
Alternatively, you can do something better with your time while we watch numbers go up.
¯\_(ツ)_/¯
❤55🤣20🤓6😍3😢1
Today ZachXBT noted unusual BTC activity – at 04 UTC August, 19th, $238,000,000 was moved to Avalanche Bridge, ChangeNow, eXch, Kucoin, Railgun, and ThorChain.
Ransomware? Draining? Money laundering? Anime?
https://blockchair.com/bitcoin/transaction/4b277ba298830ea538086114803b9487558bb093b5083e383e94db687fbe9090
Ransomware? Draining? Money laundering? Anime?
https://blockchair.com/bitcoin/transaction/4b277ba298830ea538086114803b9487558bb093b5083e383e94db687fbe9090
Blockchair
Bitcoin transaction 4b277ba298830ea538086114803b9487558bb093b5083e383e94db687fbe9090
Inspect Bitcoin transaction 4b277ba298830ea538086114803b9487558bb093b5083e383e94db687fbe9090: check hash, date, and event details with Blockchair.
😁74😱23🤯12😇5🥰3😍3🤣3😢2🙏2🤓2🔥1
Today journalist Brian Krebs released an article about the recent (sort of) compromise of National Public Data. Previously, National Public Data was (sort of) compromised which resulted in the theft of billions of records on individuals residing in the United States.
The drama update:
National Public Data owns a sub-company named RecordsCheck dot net. A customer of RecordsCheck dot net (later unveiled to be a law enforcement officer) was a victim of Information Stealer malware (e.g. Redline, Formbook, Lumma, etc). The malware stole login credentials to RecordsCheck for the law enforcement officer which allowed Threat Actors access to RecordsCheck with essentially infinite credits for searches. The Threat Actor(s) then subsequently began dumping as much data as possible.
The Brian Krebs plot twist:
Brian Krebs discovered that previously RecordsCheck publicly exposed a file on their website noscriptd: "members dot zip". This zip file contained the username and password for every customer on their platform (and supposedly other entities owned by National Public Data) in a plain text file. Krebs discovered that by default, each customer is assigned a 6-character password. As of a result of this accidental exposure, RecordsCheck instructed customers to change their default 6-character password. It turns out many DID NOT change their default assigned 6-character password.
More information on the file exposure, back story, discovery, etc. Can be found on Brian Kreb's article here: https://krebsonsecurity.com/2024/08/national-public-data-published-its-own-passwords/
The drama update:
National Public Data owns a sub-company named RecordsCheck dot net. A customer of RecordsCheck dot net (later unveiled to be a law enforcement officer) was a victim of Information Stealer malware (e.g. Redline, Formbook, Lumma, etc). The malware stole login credentials to RecordsCheck for the law enforcement officer which allowed Threat Actors access to RecordsCheck with essentially infinite credits for searches. The Threat Actor(s) then subsequently began dumping as much data as possible.
The Brian Krebs plot twist:
Brian Krebs discovered that previously RecordsCheck publicly exposed a file on their website noscriptd: "members dot zip". This zip file contained the username and password for every customer on their platform (and supposedly other entities owned by National Public Data) in a plain text file. Krebs discovered that by default, each customer is assigned a 6-character password. As of a result of this accidental exposure, RecordsCheck instructed customers to change their default 6-character password. It turns out many DID NOT change their default assigned 6-character password.
More information on the file exposure, back story, discovery, etc. Can be found on Brian Kreb's article here: https://krebsonsecurity.com/2024/08/national-public-data-published-its-own-passwords/
Krebs on Security
National Public Data Published Its Own Passwords
New details are emerging about a breach at National Public Data (NPD), a consumer data broker that recently spilled hundreds of millions of Americans' Social Security Numbers, addresses, and phone numbers online. KrebsOnSecurity has learned that another NPD…
🫡50🤣31😱6👍5🤯3❤2😢2🤓2👏1
This media is not supported in your browser
VIEW IN TELEGRAM
Thank you, Chris Hansen, for the kind words.
(we have no idea who paid Chris Hansen to do this)
(we have no idea who paid Chris Hansen to do this)
🤣128🫡24🔥6👏6👍5🥰4❤1🤔1😢1
imagine one day the vx-underground website is compromised and the threat actor tries to deliver malware from it but everyone gets happy because they're just there for the malware anyway
🤣186💯24🔥10🤔7🤓4❤3😁3👍2😢2
vx-underground
Good news: we have malware Bad news: soon our malware collection will no longer be able to fit on an 8TB harddrive. Our entire malware collection 7z ultra compressed is 7.02TB. Papers is 139GB (59,807 papers).
Yes, I'm chillin' with 7TB of malware while running Windows. I like to play video games and I also like doing WINAPI coding. Yes, I could use a VM, but that's a lot of work. It's easier to just carefully not detonate 7TB of malware.
🤣186🫡27😁17🤓14❤9🤯4❤🔥2😢1💯1
This media is not supported in your browser
VIEW IN TELEGRAM
🤣141😱28🫡22😢9❤7🤓3😇3❤🔥2👍2🤔2😁1
We have incredible news.
Yesterday we spoke with Bernardo Quintero – the Founder of VirusTotal. He granted us insane API access to clean our malware collection. Thanks to him, and the VirusTotal team, we can now guarantee we're sharing pure malware with all of you.
Thank you, VirusTotal
Yesterday we spoke with Bernardo Quintero – the Founder of VirusTotal. He granted us insane API access to clean our malware collection. Thanks to him, and the VirusTotal team, we can now guarantee we're sharing pure malware with all of you.
Thank you, VirusTotal
❤342🤣61🔥56🫡26🥰18❤🔥13👍9🎉4😎3😁2🤝1
Hello,
We're aware individuals are having problems accessing some files on vx-underground. Rest assured our finest nerds are on the case.
(two are on Holiday, we're so far up shits creek we can see the shit ocean).
We're aware individuals are having problems accessing some files on vx-underground. Rest assured our finest nerds are on the case.
(two are on Holiday, we're so far up shits creek we can see the shit ocean).
🤣96🫡25😇6🤓5😢4❤2🤯2😁1😱1🤝1😎1
POV: Your grandson downloaded a Fortnite mod from a YouTube comment section and now you're being extorted for $999 (but you get 50% off if you pay in less than 72 hours)
🤣118🤓11👍4🤝4❤2😁1