vx-underground – Telegram
vx-underground
45.8K subscribers
3.93K photos
419 videos
83 files
1.43K links
The largest collection of malware source, samples, and papers on the internet.

Password: infected

https://vx-underground.org/
Download Telegram
Hello,

It has come to our attention more people have received the recent ransomware leak.

Our advice is to tread carefully. Our primary delaying factor is the presence of victim PII — most notably data from public schools who may or may not have paid the extortionists.

In other words, we aren't making it public until we feel comfortable sharing data we believe people can get value from and learn from, without putting past victims in danger again.

tl;dr not going to distribute hacked schools information and data
86🫡30🤓9👍3😢3😱2💯2
The unknown person who claims to have compromised zserver dot ru, the bulletproof webhosting provider, has begun sending emails to zserver dot ru clients.

Interestingly, the person who claimed to have compromised zserver dot ru did not tell us this.

One of their customers did.
🔥77🥰6🎉5😢2❤‍🔥11👍1
A 0day exploit is going to be dropped soon. We ourselves aren't entirely clear on the details yet, but we know it is going to impact gamers.

It won't impact business operations, unless your end users are unironically playing video games at work.
💯106🤔30😱16👍8🔥6🥰6❤‍🔥3🤓3😢2🎉2
ooga booga malware good
78🤣37👍9🔥6😁4❤‍🔥3🤔3🤓3😢1
This media is not supported in your browser
VIEW IN TELEGRAM
We have appeared in another YouTube documentary. It is always a wonderful feeling knowing we are becoming part of history and making an impact.

Sometimes though it is our silliest quotes that make it into documentaries.
87😁31🤣23😎6👍2🔥2😱2😢1
Hello, how are you?

tl;dr tl;dr I'm sick, update on ransomware leak, update on video game 0day, stuff

Apologies for so many delayed communications — I have contracted some sort of viral infection. My sinus' have begun draining fluid into my esophagus. tl;dr Sinusitis. As this post is being written, I have consumed enough Robitussin to kill an Elephant.

Anyway, regarding the ransomware leaks, the data is a result of an unknown person(?) compromising ransomware threat actor VPS'. Once the individual compromised the VPS' they decided to forfeit the data over to law enforcement (anonymously) which they believe resulted in the apprehension of individuals and the takedown of several onion domains. Following the takedown and arrests, this person (people?) decided to gift the data to us to study or distribute to others. They believed that, due to the size of our audience, us announcing it and sharing it would disseminate information faster. Because this person(s) compromised a VPS, it has a great deal of victim PII present — it appears they compromised some of their hosts mid-ransomware campaign or attack. In order for us to share it, we need to scrub the victim PII. We still haven't done that (see why in first paragraph).

However, we have decided we will share the data to Threat Intelligence vendors, or anti-virus vendors, or whomever to study, review, blah blah blah. We believe these companies, which typically offer anti-ransomware services, will make good use of this information and data. Truthfully, we ourselves have not reviewed the data in totality. Our domain of study typically revolves around malware development — reviewing VPS data is kind of a Threat Intel / DFIR thing, so there is a lot someone could probably find that we would probably miss. If your organization is interested in the data to do a review, or write-up, or whatever, shoot us an e-mail or a DM or something. You'll need to show us proof you're from a legitimate vendor.

We have no timeline on a public release. I don't feel like scrubbing the PII, maybe someone else in our group feels like it, I don't know, I haven't asked because I've been sick. I could probably ask right now, but I'm not.

About the video game 0day, very few people are aware of its existence and we believe it will cause a mini-shit storm online. It's high severity, but it's impact is limited to a relatively small userbase. I've sworn on the Old Robitussin bottle and the New Robitussin bottle (Game of Thrones reference) to not disclose more information. Regardless, you'll all have a nice chuckle. It's disclosure timeline is roughly 7 - 14 days. The person who found the exploit is doing a writeup. Upon release, the exploit will not be patched.

Finally, we've got lots of updates to vx-underground. I haven't pushed any to prod yet (despite the pile up from petik, Bradley, and GuessThePwd), because I've been sick.

Have a nice day,
- smelly
118🤣16👍8🤔8🤓6🙏4😢2
That's crazy. We are indeed interested in The largest collection of malware source code, samples, and papers on the internet.

Password: infected.

How did they know?
🤣174😁14🤯13👍54😱2
Thank you to whoever lives in Milton Keynes, UK and decided to spray paint our website onto a wall.

You kind of messed up the centering, you had to do a weird trail off for .org, but overall we give it a 8/10
🔥149🤣5217🤓8🫡8😁4❤‍🔥3👍1
> "smelly can i have {free merch} for {thing}? "
> "sure"
> "nice try u fuckn fed ur never gettin my dox"
🤣174🤓107😁3🎉3👍2❤‍🔥1🤯1💯1
vx-underground
> "smelly can i have {free merch} for {thing}? " > "sure" > "nice try u fuckn fed ur never gettin my dox"
Why even ask us for merchandise, or stickers, if you're going to freak out when we say yes? How are we going to physically mail you something if you can't provide us a physical address?

real world things require real world address, the real world isnt the internet ok
🤓76🤣51👏87😁5😎5❤‍🔥1😢1
Hello, we are a malware library.

We are not a cult.

Please don't go around tagging buildings with our logo(s) or website URL. 😭😭😭😭
🥰90🤣76😢13🫡8😘43🔥3❤‍🔥2😁2🤓2🤔1
Good evening,

We've got a bunch of malware in queue. Some has already been pushed to prod. It is over 1,000,000 malwares.

Additionally, please give us time to review the over 700 animal pictures we received. We didn't anticipate so many critter pictures.

Thanks,
🤓58❤‍🔥15🥰7🔥4😢3👍1
tbh p much sums up vxug lol
🤣136💯138😁5👍4😢4🤓3
We are considering implementing a clause where companies with a specific amount of revenue must pay for the right to download malware from us.

It's irritating seeing multi-million or multi-billion dollar companies profit off our work

tl;dr becoming a villain
💯243👏27👍2114🤣11🫡9🔥3❤‍🔥2😢1😘1
vx-underground
We are considering implementing a clause where companies with a specific amount of revenue must pay for the right to download malware from us. It's irritating seeing multi-million or multi-billion dollar companies profit off our work tl;dr becoming a villain
We love hearing that students, the morbidly curious, and independent researchers use our website.

We don't like watching your multi-million dollar company scrape our malware collection for their 'AI' training set.
👍138👏22💯2113🤣7😱3❤‍🔥1🔥1🥰1😢1😎1
Malware Ingestion statistics, August 2024:

2024-08-01: 15,604
2024-08-02: 13,593
2024-08-03: 12,354
2024-08-04: 12,679
2024-08-05: 12,245
2024-08-06: 12,914
2024-08-07: 14,432
2024-08-08: 15,054
2024-08-09: 13,625
2024-08-10: 20,955
2024-08-11: 23,064
2024-08-12: 22,850
2024-08-13: 19,464
2024-08-14: 15,219
2024-08-15: 114,050
2024-08 -16: 70,162
2024-08-17: 93,572
2024-08-18: 138,520
2024-08-19: 178,314
2024-08-20: 87,425
2024-08-21: 146,435
2024-08-22: 306,526
2024-08-23: 208,720
2024-08-24: 133,827
2024-08-25: 7,533
2024-08-26: 19,108
2024-08-27: 18,980
2024-08-28: 21,085
2024-08-29: 16,032
2024-08-30: 17,327
2024-08-31: 17,620

Total: 1,821,596
Size: 230GB (7z Ultra compressed)
🔥50🫡9🎉8😁5👍32👏2💯1