vx-underground – Telegram
vx-underground
45.5K subscribers
3.91K photos
414 videos
83 files
1.42K links
The largest collection of malware source, samples, and papers on the internet.

Password: infected

https://vx-underground.org/
Download Telegram
vx-underground
We understand this may be difficult for our Ameriburger audience to understand, but not everyone who follows vx-underground is located in the United States Not everything we do is Burger-centric and not everything is related to Ameriburger It's going to…
Yes, some of us are Ameriburgers.

Some of our staff members are in Europe, and big chunk of our followers are in Europe, Canada, South America, and Australia. Not everything we say or do may not align with our American audience.
❤‍🔥76🤓2412👍6😢5🤣5💯3🤯1🤩1😇1
Updates:

Archives:
- The Old New Thing, September 2024

Bulk downloads:
- MalwareIngestion2024.10.10
- MalwareIngestion2024.10.11
- MalwareIngestion2024.10.12
- MalwareIngestion2024.10.13
- MalwareIngestion2024.10.14
- VirusSign.2024.10.12
- VirusSign.2024.10.13
- VirusSign.2024.10.14
- Bazaar.2024.09

Malware families:
- AilurophileStealer
- Amadey
- Android.Copybara
- AsyncRAT
- BansheeLoader
- DCRat
- DMALocker
- Emotet
- Fysbis
- Gafgyt
- HzRAT
- KTLVdoor
- Lactrodectus
- LummaStealer
- NeutrinoBot
- PupyRAT
- QuasarRAT
- RedLine
- RhadamanthysLoader
- Sliver
- SmokeLoader
- SnakeKeylogger
- ToneShell
- Vidar
- XenoRAT
- XWorm

Papers:
- 2020-07-16 - Masking Malicious Memory Artifacts Part II - Blending in with False Positives
- 2020-08-04 - Masking Malicious Memory Artifacts Part III - Bypassing Defensive Scanners
- 2022-02-14 - Abusing Exceptions for Code Execution Part 1
- 2022-04-02 - CreateSvcRpc - A custom RPC client to execute programs as the SYSTEM user
- 2022-04-04 - Sharing is Caring - Abusing Shared Sections for Code Injection
- 2022-10-12 - StealthHook - A method for hooking a function without modifying memory protection
- 2023-01-30 - Abusing Exceptions for Code Execution Part 2
- 2023-07-15 - Poch Poch is this thing on - Bypass AMSI with Divide and Conquer
- 2024-10-15 - Introducing Early Cascade Injection from Windows process creation to stealthy injection
28👍9🤓6😱2❤‍🔥1😢1
Unrelated to malware.

This textbook, presumably from Japan because it's written in Japanese, is an excellent illustration of how Turtles' shells work.

Education is important!
🤓112🤣31🤯14🔥10😢7🤔5❤‍🔥3😱31😁1💯1
Foreign nations have published more research on US state-sponsored activity.

Do you believe the US National Security Agency/Central Intelligence Agency are engaged in cyber-espionage and disinformation campaigns? Or are foreign countries lying?
Anonymous Poll
79%
Yes, they're doing stuff
5%
No, the U.S. is innocent
16%
Half truth, half lies
👍35😁26🙏7🔥41😢1
🤣304🫡19❤‍🔥14😎65👍4🤔3😢2😁1😱1😘1
The BBC reports the Internet Archive has been compromised by a Threat Actor operating under the moniker "Have I Been Pwned".

This is unequivocally false.

The BBC has incorrectly attributed the compromise to the the website owned and operated by security researcher @TroyHunt
🤣235😁11🫡10👍6🤯31😢1
vx-underground
The BBC reports the Internet Archive has been compromised by a Threat Actor operating under the moniker "Have I Been Pwned". This is unequivocally false. The BBC has incorrectly attributed the compromise to the the website owned and operated by security…
This media is not supported in your browser
VIEW IN TELEGRAM
Initially it was (incorrectly) assumed we have compromised the Internet Archive based on the wording of our initial post regarding the compromise.

Now it is incorrectly being reported Troy Hunt compromised the Internet Archive
🎉84🤣61🫡11👍5😁5💯4😢2
BianLian ransomware group announced they've ransomed a children's healthcare facility.
😢278🤯33🤣14😱11🎉5🤔4🫡42🔥2🥰1🤓1
Updates:

Papers:
- 2009-05-03 - PE Infection - How to Inject a DLL
- 2017-03-21 - Cloak and Dagger - From Two Permissions to Complete Control of the UI Feedback Loop
- 2020-08-10 - NFCGate - Opening the Door for NFC Security Research with a Smartphone-Based Toolkit
- 2022-01-30 - Retrieving the current EIP in C⁄C++
- 2022-01-30 - SetTcpEntry6 - A custom SetTcpEntry implementation for IPv6
- 2022-02-01 - System-wide anti-debug technique using NtQuerySystemInformation and DuplicateHandle
- 2022-02-02 - Reading and writing remote process data without using ReadProcessMemory ⁄WriteProcessMemory
- 2022-02-04 - CallRemoteAPI - Call functions in remote processes
- 2022-02-04 - CreateSvcRpc - A custom RPC client to execute programs as the SYSTEM user
- 2022-02-04 - EmbedExeLnk - Embedding an EXE inside a LNK with automatic execution
- 2022-02-06 - HijackFileHandle - Hijack a file in a remote process without code injection
- 2022-02-08 - StackScraper - Capturing sensitive data using real-time stack scanning against a remote
- 2022-02-10 - WindowsNoExec - Abusing existing instructions to executing arbitrary code without allocating executable memory
- 2022-09-09 - WriteProcessMemoryAPC - Write memory to a remote process using APC calls
- 2022-10-20 - SharedMemUtils - A simple tool to automatically find vulnerabilities in shared memory objects
- 2022-12-10 - StealthHook - A method for hooking a function without modifying memory protection
- 2023-01-11 - SelfDebug - A useless anti-debug trick by forcing a process to debug itself
- 2024-09-03 - RAMBO - Leaking Secrets from Air-Gap Computers by Spelling Covert Radio Signals from Computer RAM
- 2024-09-07 - PIXHELL Attack - Leaking Sensitive Information from Air-Gap Computers via 'Singing Pixels'
27❤‍🔥10👍6🥰6😱3
if you know assembly, everything is open src
👍200🤓9433🤣20😎19❤‍🔥12💯9😁6🤔2😢2😇1
Earlier today it was reported a 33 year old male was arrested in Brazil by the Polícia Federal in "Operation Data Breach".

The suspect is believed to be USDoD a/k/a EquationCorp.

Although documents do not explicitly state USDoD a/k/a EquationCorp was arrested, the official press release states the individual arrested boasted the compromise of Infragard — a breach which USDoD took responsibility for.

USDoD has been listed in multiple court documents in the United States since atleast 2022. Most notably he was listed throughout the court documents of the arrest of Pompompurin a/k/a Conor Fitzpatrick, naming USDoD as a prolific Threat Actor.

USDoD has taken responsibility for large compromises such as Infragard and the National Public Data breach. The National Public Data breach which exposed information on hundreds of millions of Americans and resulted in the company filing for bankruptcy.

This arrest comes after the 'dox' of USDoD by security company CrowdStrike. USDoD denied the information released and said it was inaccurate.

Press release:
https://www.gov.br/pf/pt-br/assuntos/noticias/2024/10/pf-prende-hacker-suspeito-de-invadir-sistemas-da-pf-e-de-outras-instituicoes-internacionais
🤯29👍10😁4😢31🤣1
Today the United States Department of Justice, in conjunction with industry partners Akamai SIRT, Amazon Web Services, Cloudflare, Crowdstrike, DigitalOcean, Flashpoint, Google, Microsoft, PayPal, and SpyCloud — announced the indictment of 2 brothers believed to be behind Anonymous Sudan via Operation PowerOFF.

Anonymous Sudan is allegedly operated by Ahmed Salah Yousif Omer, 22, and Alaa Salah Yusuuf Omer, 27. Both individuals resided in Sudan, as their group name states.

Previously, some Cyber Threat Intelligence researchers speculated Anonymous Sudan to be state-sponsored by the Russian Federation due to the frequent regurgitation of Russian propaganda. Interesting, they are NOT state sponsored — the information they disclosed regarding themselves was indeed true. They were indeed from Sudan and were not affiliated with any government entity.

The United States Department of Justice has seized and taken down infrastructure of Anonymous Sudan which includes their tooling ("Godzilla", "Skynet", and "InfraShutdown"). They believe Anonymous Sudan to has caused approx. $10,000,000 in damage.

Throughout their brief tenure 2023 and 2024, they are believed to have launched over 35,000 DDoS attacks and targeted nearly 70 companies.

The United States Department of Justice has confirmed the individuals behind Anonymous Sudan are in custody and are being questioned by the United States Federal Bureau of Investigation.

If convicted Ahmed Salah Yousif Omer, 22, is facing life in prison. His brother, Alaa Salah Yusuuf Omer, 27, is facing 5 years in prison.

https://www.justice.gov/usao-cdca/pr/two-sudanese-nationals-indicted-alleged-role-anonymous-sudan-cyberattacks-hospitals
👍30🤯12🥰7🤣65😢3👏2🤓2
Remember that video game 0day we mentioned? The rumors were true.

Read the post for more details. The tl;dr is an exploit can trigger Call of Duty anticheat and get innocent people banned.

It appears the individuals using the exploit have framed popular video game streamers.
🤣72😱31👍7🔥7😁4🤔4😢32
> Anonymous Sudan DDoS us
> Record scratch
> Window breaking noise
> Fast forward 1 year later
> Life in prison
😎155🤣58🎉10💯5😱3🫡31
The individual who compromised the SEC Twitter account has been apprehended by the United States Federal Bureau of Investigation

Additionally, if you've commited a felony, do not use your personal computer to Google if you're being investigated.
🤣211😁7🤓6🤔5😢3😎1
Regarding our previous discussions on the Call of Duty exploit: we have decided to translate the post into verbage we believe Call of Duty players may comprehend better.

Translation:
tbh p much like, a long ass time ago we heard mfers found a way to put known garbage ass cheats into mfers pcs. the cod anticheat ricochet thing was hella janky and somehow some dorky ass losers could sneak shit into ppls shit. they was using that shit to ban streamers they didnt like LMAO then like, when they were dying watching mfers accuse this innocent ppl of cheating. its wild as hell tbh. but like, now some mfers wanna expose that shit publicly because, idk, ig they wanna shame call of duty and get clout and redeem some ppl because some mfers feel bad innocent cuz innocent ppl got cooked. its prolly legit bcuz we know some of these ppl and theyre p cool and legit, idk tho id bet its like, 95% real.
🤣142🤓27😎76🎉4🤯3😢3💯2🔥1🤝1
Happy to announce we now have 31,335,000 unique malwares.

We're slowly creeping our way up to the big 40,000,000. When we hit 40,000,000 malwares we're going to throw a pizza party, but limit 0.00012 slices per person and the only drinks available is tap water.
🎉136🤣43🔥16🤓87😁5🥰4😢3❤‍🔥1
Call of Duty exploit dropped.

tl;dr using the string "Trigger Bot" in Call of Duty gets someone banned. Attached image shows getting someone banned. File attached gives a little more detail.
🔥39🤣17😢2🤓2👍1
🫡37🤣24🎉4🤓4😢2🤯1💯1