We spotted someone in California with the license plate "MALWRE".
We left a sticker on your driver side window
We left a sticker on your driver side window
❤195🤝26🥰17🤯10🤣10👍4👏3🤩2😢1🫡1
vx-underground
Oh. My. God. The possibilities for initial access malware just went through the roof.
Actually, maybe not. Microsoft has upped the ante. It's all over.
We didn't anticipate Microsoft actually caring 😭
We didn't anticipate Microsoft actually caring 😭
❤88😢52😁19🥰6🤔2🤣2👍1😎1
we're gone for 30 minutes and now people are turning walkie talkies into bombs wtf
🤯117🤣69🔥14😢10😇6😎6👍4😱2🎉2❤1
Lockbit ransomware group claims to have ransomed eFile dot com.
eFile dot com IS NOT the IRS eFile system. eFile dot com is an IRS authorized entity approved for submitting financial documents to the IRS.
eFile dot com IS NOT the IRS eFile system. eFile dot com is an IRS authorized entity approved for submitting financial documents to the IRS.
🤣96😱12🤓7🔥6👍3❤🔥2😢1🙏1💯1
we're gone for 2 hours and now people are turning butt plugs into bombs wtf
Just kidding, that didn't happen. That'd be crazy though.
Just kidding, that didn't happen. That'd be crazy though.
😁113🤣76😱11❤5🤔4🤓4🔥2👍1🎉1🤝1
Crazy Thursday.
- Dr. Web, the Russian antivirus company, disclosed a breach. Dr. Web stopped sending antivirus updates September 16th. Subsequently, Dr. Web reportedly disconnected their servers from their internal network while they investigated the suspected compromise. Dr. Web reports to have resolved the issue and has returned to normal day-to-day operations. No Threat Actor has been attributed to the compromise. They believe the compromise occurred on or around September 14th.
- Yesterday, or sometime before, GitHub users were targeted in mass by a large scale phishing and/or malware campaign. An unknown Threat Actor(s) pushed their Lumma Stealer campaign by leaving bogus issues on GitHub projects. When the project owner visited the issue, the issue linked to a domain noscriptd 'GitHub-Scanner'. GitHub-Scanner requested the visitor prove their humanity (e.g. not a robot) by doing Windows + R and CTRL + V + ENTER. When the site is visited, the website copies malicious code to the users clipboard. Windows + R, opening Windows Run, and CTRL + V, pasting the malicious code to the Run window and ENTER would run the code, this would trick the user into executing their malware payload. Once the payload is executed, it downloads a file called 'IE6.exe'. IE6.exe is Lumma information stealer. While it is a clever trick, the Threat Actor(s) (intentionally, or unintentionally) did not account for users who are not running Windows. This caused confusion for non-Windows users, or users on mobile devices.
- Dr. Web, the Russian antivirus company, disclosed a breach. Dr. Web stopped sending antivirus updates September 16th. Subsequently, Dr. Web reportedly disconnected their servers from their internal network while they investigated the suspected compromise. Dr. Web reports to have resolved the issue and has returned to normal day-to-day operations. No Threat Actor has been attributed to the compromise. They believe the compromise occurred on or around September 14th.
- Yesterday, or sometime before, GitHub users were targeted in mass by a large scale phishing and/or malware campaign. An unknown Threat Actor(s) pushed their Lumma Stealer campaign by leaving bogus issues on GitHub projects. When the project owner visited the issue, the issue linked to a domain noscriptd 'GitHub-Scanner'. GitHub-Scanner requested the visitor prove their humanity (e.g. not a robot) by doing Windows + R and CTRL + V + ENTER. When the site is visited, the website copies malicious code to the users clipboard. Windows + R, opening Windows Run, and CTRL + V, pasting the malicious code to the Run window and ENTER would run the code, this would trick the user into executing their malware payload. Once the payload is executed, it downloads a file called 'IE6.exe'. IE6.exe is Lumma information stealer. While it is a clever trick, the Threat Actor(s) (intentionally, or unintentionally) did not account for users who are not running Windows. This caused confusion for non-Windows users, or users on mobile devices.
🤣121🤯20👍17❤4❤🔥3😢1
vx-underground
Crazy Thursday. - Dr. Web, the Russian antivirus company, disclosed a breach. Dr. Web stopped sending antivirus updates September 16th. Subsequently, Dr. Web reportedly disconnected their servers from their internal network while they investigated the suspected…
Oh and pagers and walkie talkies exploding. This does not fall into the realm of malware, or news we would typically discuss, but there is a high volume of people who believe this to be malware.
It's not malware. They snuck explosives into the devices.
Have a nice day.
It's not malware. They snuck explosives into the devices.
Have a nice day.
❤90👍16😁6🤔6👏4❤🔥3🎉2😢1💯1
RansomHub ransomware groups claims to have ransomed Liberty First Credit Union.
Liberty First Credit Union is a small to medium sized credit union (not-for-profit bank) located in Omaha, Nebraska.
Liberty First Credit Union is a small to medium sized credit union (not-for-profit bank) located in Omaha, Nebraska.
🤣45😢14👍6❤3
vx-underground
RansomHub ransomware groups claims to have ransomed Liberty First Credit Union. Liberty First Credit Union is a small to medium sized credit union (not-for-profit bank) located in Omaha, Nebraska.
There is no information on the impact to customers. We don't believe clients money is gone — this isn't an attack against SWIFT. We presume this to be an attack against the institutions internal financial documents and employees.
However, we could also be completely wrong.
However, we could also be completely wrong.
🤔25🤣6❤3👍2😢2
zachxbt.pdf
2.4 MB
ZachXBT continues to prove himself as a world leading expert in crypto analysis. It is remarkable how a single person can make such a profound impact.
He gave law enforcement everything they needed on a silver plate. He got them busted in less than 2 months.
tl;dr speedrun
Attached PDF is from Twitter. It is how he got 2 crypto thieves arrested for stealing $243,000,000.
He gave law enforcement everything they needed on a silver plate. He got them busted in less than 2 months.
tl;dr speedrun
Attached PDF is from Twitter. It is how he got 2 crypto thieves arrested for stealing $243,000,000.
❤92🤣16🤓14👍3😢3😎3😁2❤🔥1🔥1🤯1
vx-underground
zachxbt.pdf
There is an interestingly psychological phenomena whereas some Threat Actors, particularly scammers and fraudsters, falsely believe having money will make them respectable or make people like them.
Money means nothing. Materialism does not impress people — only the shallow.
Money means nothing. Materialism does not impress people — only the shallow.
❤105🤣16💯12👏9🤓7🔥5👍2😎2😢1😇1
This media is not supported in your browser
VIEW IN TELEGRAM
Following the arrest of Malone Iam, for his alleged theft of $243,000,000, the cryptodrainer community has shown support for Malone Iam by having videos produced requesting his freedom.
They got shirts made really fast.
They got shirts made really fast.
🤣146😍9❤3🤯3😢3😁1🤔1😱1🫡1