Hello,
We need to make something very clear: we are not like VirusTotal. We are not a competitor to VirusTotal.
VirusTotal does file detections, allows retrohunting, sandboxing and blah blah blah.
We just collect it
They're enterprise malware tooling. We're a public library
We need to make something very clear: we are not like VirusTotal. We are not a competitor to VirusTotal.
VirusTotal does file detections, allows retrohunting, sandboxing and blah blah blah.
We just collect it
They're enterprise malware tooling. We're a public library
💯171🤓36❤🔥15😁11❤9👍6👏6🤯2🔥1😢1
We'll be aiming to share our malware ingestion feed on Xitter everyday. You can watch numbers go up and listen to a cooling system.
Alternatively, you can do something better with your time while we watch numbers go up.
¯\_(ツ)_/¯
Alternatively, you can do something better with your time while we watch numbers go up.
¯\_(ツ)_/¯
❤55🤣20🤓6😍3😢1
Today ZachXBT noted unusual BTC activity – at 04 UTC August, 19th, $238,000,000 was moved to Avalanche Bridge, ChangeNow, eXch, Kucoin, Railgun, and ThorChain.
Ransomware? Draining? Money laundering? Anime?
https://blockchair.com/bitcoin/transaction/4b277ba298830ea538086114803b9487558bb093b5083e383e94db687fbe9090
Ransomware? Draining? Money laundering? Anime?
https://blockchair.com/bitcoin/transaction/4b277ba298830ea538086114803b9487558bb093b5083e383e94db687fbe9090
Blockchair
Bitcoin transaction 4b277ba298830ea538086114803b9487558bb093b5083e383e94db687fbe9090
Inspect Bitcoin transaction 4b277ba298830ea538086114803b9487558bb093b5083e383e94db687fbe9090: check hash, date, and event details with Blockchair.
😁74😱23🤯12😇5🥰3😍3🤣3😢2🙏2🤓2🔥1
Today journalist Brian Krebs released an article about the recent (sort of) compromise of National Public Data. Previously, National Public Data was (sort of) compromised which resulted in the theft of billions of records on individuals residing in the United States.
The drama update:
National Public Data owns a sub-company named RecordsCheck dot net. A customer of RecordsCheck dot net (later unveiled to be a law enforcement officer) was a victim of Information Stealer malware (e.g. Redline, Formbook, Lumma, etc). The malware stole login credentials to RecordsCheck for the law enforcement officer which allowed Threat Actors access to RecordsCheck with essentially infinite credits for searches. The Threat Actor(s) then subsequently began dumping as much data as possible.
The Brian Krebs plot twist:
Brian Krebs discovered that previously RecordsCheck publicly exposed a file on their website noscriptd: "members dot zip". This zip file contained the username and password for every customer on their platform (and supposedly other entities owned by National Public Data) in a plain text file. Krebs discovered that by default, each customer is assigned a 6-character password. As of a result of this accidental exposure, RecordsCheck instructed customers to change their default 6-character password. It turns out many DID NOT change their default assigned 6-character password.
More information on the file exposure, back story, discovery, etc. Can be found on Brian Kreb's article here: https://krebsonsecurity.com/2024/08/national-public-data-published-its-own-passwords/
The drama update:
National Public Data owns a sub-company named RecordsCheck dot net. A customer of RecordsCheck dot net (later unveiled to be a law enforcement officer) was a victim of Information Stealer malware (e.g. Redline, Formbook, Lumma, etc). The malware stole login credentials to RecordsCheck for the law enforcement officer which allowed Threat Actors access to RecordsCheck with essentially infinite credits for searches. The Threat Actor(s) then subsequently began dumping as much data as possible.
The Brian Krebs plot twist:
Brian Krebs discovered that previously RecordsCheck publicly exposed a file on their website noscriptd: "members dot zip". This zip file contained the username and password for every customer on their platform (and supposedly other entities owned by National Public Data) in a plain text file. Krebs discovered that by default, each customer is assigned a 6-character password. As of a result of this accidental exposure, RecordsCheck instructed customers to change their default 6-character password. It turns out many DID NOT change their default assigned 6-character password.
More information on the file exposure, back story, discovery, etc. Can be found on Brian Kreb's article here: https://krebsonsecurity.com/2024/08/national-public-data-published-its-own-passwords/
Krebs on Security
National Public Data Published Its Own Passwords
New details are emerging about a breach at National Public Data (NPD), a consumer data broker that recently spilled hundreds of millions of Americans' Social Security Numbers, addresses, and phone numbers online. KrebsOnSecurity has learned that another NPD…
🫡50🤣31😱6👍5🤯3❤2😢2🤓2👏1
This media is not supported in your browser
VIEW IN TELEGRAM
Thank you, Chris Hansen, for the kind words.
(we have no idea who paid Chris Hansen to do this)
(we have no idea who paid Chris Hansen to do this)
🤣128🫡24🔥6👏6👍5🥰4❤1🤔1😢1
imagine one day the vx-underground website is compromised and the threat actor tries to deliver malware from it but everyone gets happy because they're just there for the malware anyway
🤣186💯24🔥10🤔7🤓4❤3😁3👍2😢2
vx-underground
Good news: we have malware Bad news: soon our malware collection will no longer be able to fit on an 8TB harddrive. Our entire malware collection 7z ultra compressed is 7.02TB. Papers is 139GB (59,807 papers).
Yes, I'm chillin' with 7TB of malware while running Windows. I like to play video games and I also like doing WINAPI coding. Yes, I could use a VM, but that's a lot of work. It's easier to just carefully not detonate 7TB of malware.
🤣186🫡27😁17🤓14❤9🤯4❤🔥2😢1💯1
This media is not supported in your browser
VIEW IN TELEGRAM
🤣141😱28🫡22😢9❤7🤓3😇3❤🔥2👍2🤔2😁1
We have incredible news.
Yesterday we spoke with Bernardo Quintero – the Founder of VirusTotal. He granted us insane API access to clean our malware collection. Thanks to him, and the VirusTotal team, we can now guarantee we're sharing pure malware with all of you.
Thank you, VirusTotal
Yesterday we spoke with Bernardo Quintero – the Founder of VirusTotal. He granted us insane API access to clean our malware collection. Thanks to him, and the VirusTotal team, we can now guarantee we're sharing pure malware with all of you.
Thank you, VirusTotal
❤342🤣61🔥56🫡26🥰18❤🔥13👍9🎉4😎3😁2🤝1
Hello,
We're aware individuals are having problems accessing some files on vx-underground. Rest assured our finest nerds are on the case.
(two are on Holiday, we're so far up shits creek we can see the shit ocean).
We're aware individuals are having problems accessing some files on vx-underground. Rest assured our finest nerds are on the case.
(two are on Holiday, we're so far up shits creek we can see the shit ocean).
🤣96🫡25😇6🤓5😢4❤2🤯2😁1😱1🤝1😎1
POV: Your grandson downloaded a Fortnite mod from a YouTube comment section and now you're being extorted for $999 (but you get 50% off if you pay in less than 72 hours)
🤣118🤓11👍4🤝4❤2😁1
vx-underground
POV: Your grandson downloaded a Fortnite mod from a YouTube comment section and now you're being extorted for $999 (but you get 50% off if you pay in less than 72 hours)
This image was stolen from a Malwarebytes' post. This was the stock photo they used when discussing the National Public Data drama.
This guy looks so concerned 😭😭😭
This guy looks so concerned 😭😭😭
😁50❤6😢5🫡5💯4😱2🤣2🔥1
This media is not supported in your browser
VIEW IN TELEGRAM
Some software is secretly malicious.
🔥102🤣45🤯30😱11👍4❤3😁3
Administrative updates:
Bad news:
Following our migration we're still having problems with users receiving ACCESS_DENIED when attempting to view or download files
Good news:
We have 100+- papers in queue. We broke a personal record and ingested 450,000+ new malware samples.
Bad news:
Following our migration we're still having problems with users receiving ACCESS_DENIED when attempting to view or download files
Good news:
We have 100+- papers in queue. We broke a personal record and ingested 450,000+ new malware samples.
❤🔥56👍13❤5😁4😢2
Our advice to anyone who is trying to grow a project, or community, or whatever, is to be consistent.
Our first year we barely had 1,000 followers. We celebrated when we broke 100 followers because it was surreal thinking 100 people cared about this crappy little website.
Our first year we barely had 1,000 followers. We celebrated when we broke 100 followers because it was surreal thinking 100 people cared about this crappy little website.
😁81❤45🥰17❤🔥12🔥12🤔2😢2