A few years ago there was a woman on Twitter who constantly talked about how much she loved her job, her career field, her co-workers, etc. She semi-frequently mentioned her education at a prestigious university (and also made sure to mention it in her Twitter bio).
She was interesting.
What was especially interesting was the fact everything she said was a lie. One of our members was employed at the place she claimed to have worked. No one at this place of work knew her — her entire personality, profile, biography, and posts were a lie. Nothing about it was true. We couldn't verify if the woman in the images was a real person.
One day her profile suddenly disappeared off social media.
We still talk about it sometimes. Who the hell was that person? ¯\_(ツ)_/¯
She was interesting.
What was especially interesting was the fact everything she said was a lie. One of our members was employed at the place she claimed to have worked. No one at this place of work knew her — her entire personality, profile, biography, and posts were a lie. Nothing about it was true. We couldn't verify if the woman in the images was a real person.
One day her profile suddenly disappeared off social media.
We still talk about it sometimes. Who the hell was that person? ¯\_(ツ)_/¯
🤣140🤔42❤10❤🔥4😱4👍3😢1🫡1
vx-underground
A few years ago there was a woman on Twitter who constantly talked about how much she loved her job, her career field, her co-workers, etc. She semi-frequently mentioned her education at a prestigious university (and also made sure to mention it in her Twitter…
It was very strange.
Once we learned it was an entirely fake persona we watched the profile everyday. We watched the profile interact with the public and "influencers". We were always like
Once we learned it was an entirely fake persona we watched the profile everyday. We watched the profile interact with the public and "influencers". We were always like
😁93🤣31🤓8❤🔥4❤3😢1
vx-underground
Schneider Electric after being hit by ransomware for the third time Jun 28, 2023 — cl0p ransomware Feb 20, 2024 — Cactus ransomware November 4, 2024 — Hellcat ransomware
Seriously, what the hell is going on over there? Are the employees just clicking every link in every email and just setting all passwords to 'password'?
🤣129😎6😁5❤2👍2
Hello, how are you?
We've still got a bunch of papers to add. We don't have the time (yet) to get to that stuff, but we managed to (finally) sync all of our malware stuff to our backups and prod. After removing duplication files and syncing our entire collection with VirusTotal (scanning to ensure it's probably malicious) we've come to the conclusion we have a little over 33,000,000 unique malwares.
Very cool.
In other news, we'd like to thank the people who continue to send us photos of their animals (or random pictures of animals they found), they're very cool.
In other other news, running vx-underground is beginning to become more challenging due to changes in our lives. Core administration is mid-30's — we've got families, responsibilities, and as we've aged over the past 5.5 years, a lot of things have changed in our lives. We've got a commitment to vx-underground for another 5 years, but following those 5 years vx-underground may no longer exist. We may decide to throw in the metaphorical towel and hope someone, somewhere else, decides to carry on our collection.
Or not, whatever. We'll see what happens. Life changes and crazy & cool things happens.
- smelly
Families:
- Android.AwSpy
- CerberRansomware
- LatentBot
- MacOS.KeRanger
- MacOS.WireLurker
- PetyaRansomware
- RockLoader
- SamsamRansomware
- TeslaCrypt
- Thanatos
Bulk downloads:
- Malware.2024.10.19
- Malware.2024.10.20
- Malware.2024.10.21
- Malware.2024.10.22
- Malware.2024.10.23
- Malware.2024.10.24
- Malware.2024.10.25
- Malware.2024.10.26
- Malware.2024.10.27
- Malware.2024.10.28
- Malware.2024.10.29
- Malware.2024.10.30
- Malware.2024.10.31
- Malware.2024.11.01
- Malware.2024.11.02
- Malware.2024.11.03
- Malware.2024.11.04
- Bazaar.2024.10
- Virussign.2024.10.26
- Virussign.2024.10.27
- Virussign.2024.10.28
- Virussign.2024.10.29
- Virussign.2024.10.30
- Virussign.2024.10.31
- Virussign.2024.11.01
- Virussign.2024.11.02
- Virussign.2024.11.03
- Virussign.2024.11.04
- VirusShare.00487
We've still got a bunch of papers to add. We don't have the time (yet) to get to that stuff, but we managed to (finally) sync all of our malware stuff to our backups and prod. After removing duplication files and syncing our entire collection with VirusTotal (scanning to ensure it's probably malicious) we've come to the conclusion we have a little over 33,000,000 unique malwares.
Very cool.
In other news, we'd like to thank the people who continue to send us photos of their animals (or random pictures of animals they found), they're very cool.
In other other news, running vx-underground is beginning to become more challenging due to changes in our lives. Core administration is mid-30's — we've got families, responsibilities, and as we've aged over the past 5.5 years, a lot of things have changed in our lives. We've got a commitment to vx-underground for another 5 years, but following those 5 years vx-underground may no longer exist. We may decide to throw in the metaphorical towel and hope someone, somewhere else, decides to carry on our collection.
Or not, whatever. We'll see what happens. Life changes and crazy & cool things happens.
- smelly
Families:
- Android.AwSpy
- CerberRansomware
- LatentBot
- MacOS.KeRanger
- MacOS.WireLurker
- PetyaRansomware
- RockLoader
- SamsamRansomware
- TeslaCrypt
- Thanatos
Bulk downloads:
- Malware.2024.10.19
- Malware.2024.10.20
- Malware.2024.10.21
- Malware.2024.10.22
- Malware.2024.10.23
- Malware.2024.10.24
- Malware.2024.10.25
- Malware.2024.10.26
- Malware.2024.10.27
- Malware.2024.10.28
- Malware.2024.10.29
- Malware.2024.10.30
- Malware.2024.10.31
- Malware.2024.11.01
- Malware.2024.11.02
- Malware.2024.11.03
- Malware.2024.11.04
- Bazaar.2024.10
- Virussign.2024.10.26
- Virussign.2024.10.27
- Virussign.2024.10.28
- Virussign.2024.10.29
- Virussign.2024.10.30
- Virussign.2024.10.31
- Virussign.2024.11.01
- Virussign.2024.11.02
- Virussign.2024.11.03
- Virussign.2024.11.04
- VirusShare.00487
🥰49❤21🫡14😢12🤓11👍8❤🔥3🤔1
Today 404mediaco confirmed the individual believed to be responsible for the Snowflake breach (which resulted in the Ticketmaster breach) has been apprehended by the Royal Canadian Mounted Police (RCMP).
More information: https://www.404media.co/suspected-snowflake-hacker-arrested-in-canada/
More information: https://www.404media.co/suspected-snowflake-hacker-arrested-in-canada/
404 Media
Suspected Snowflake Hacker Arrested in Canada
For more than a week Judische, the hacker linked to the AT&T, Ticketmaster and other breaches, has not been responding to messages. That's because he's been arrested.
🫡66😢21🤣19❤6👍3
Today 404mediaco reported the individual believed to be responsible for the Snowflake breach (including but not limited to: Ticketmaster, Santander Bank, Anheuser-Busch, Allstate, Advance Auto Parts, Mitsubishi, Neiman Marcus, Progressive, AT&T, and State Farm) had a hearing today regarding their extradition to the United States from Canada.
We can't recall a time a suspected a cyber criminal was given the VIP treatment for extradition. Them having a hearing on extradition in just a few days following their apprehension is lightning fast — shockingly fast, like, unimaginably fast.
404media had access to the judicial hearing and listened in via Zoom.
The extradition hearing was so fast, the suspect Alexander ‘Connor’ Moucka a/k/a Waifu a/k/a Judische a/k/a UNC5537, reportedly hadn't been able to secure a lawyer yet to defend themselves in the hearing...
We're going to go out on a limb and guess that compromising such large companies has angered people with deep pockets, people who are capable of making the Federal Bureau of Investigation put the metaphorical foot on the metaphorical gas.
¯\_(ツ)_/¯
We can't recall a time a suspected a cyber criminal was given the VIP treatment for extradition. Them having a hearing on extradition in just a few days following their apprehension is lightning fast — shockingly fast, like, unimaginably fast.
404media had access to the judicial hearing and listened in via Zoom.
The extradition hearing was so fast, the suspect Alexander ‘Connor’ Moucka a/k/a Waifu a/k/a Judische a/k/a UNC5537, reportedly hadn't been able to secure a lawyer yet to defend themselves in the hearing...
We're going to go out on a limb and guess that compromising such large companies has angered people with deep pockets, people who are capable of making the Federal Bureau of Investigation put the metaphorical foot on the metaphorical gas.
¯\_(ツ)_/¯
❤44🤣21😢12🥰10🫡7👍4🤝3🔥2
Media is too big
VIEW IN TELEGRAM
The United States electoral map once we cast our votes
🤣135❤🔥11🤔11😢9❤8🔥4🫡4😱3🤓3
We got called fascists today for making a meme about the electoral vote (???)
Plot twist: half of us aren't even america, haha nerds
Plot twist: half of us aren't even america, haha nerds
🤓172🤣84🎉8🫡7😱4😇4😁3❤1👍1😢1
Congratulations to all Ameriburgers — your Presidential election is near conclusion.
😁125🎉28😢23❤7👍5👏4😱2❤🔥1🫡1
vx-underground
Congratulations to all Ameriburgers — your Presidential election is near conclusion.
We've heard 'too close to call' over 9,000 times. We assume this is related to pizza deliveries. Indeed, it is best to walk.
💯110😁32❤17🤯5🤣2😢1
Nooooooooooooooooooooo
https://www.bleepingcomputer.com/news/microsoft/microsoft-notepad-to-get-ai-powered-rewriting-tool-on-windows-11/
https://www.bleepingcomputer.com/news/microsoft/microsoft-notepad-to-get-ai-powered-rewriting-tool-on-windows-11/
BleepingComputer
Microsoft Notepad to get AI-powered rewriting tool on Windows 11
Microsoft has started testing AI-powered Notepad text rewriting and Paint image generation tools four decades after the two programs were released in the 1980s.
😢99🤣35😱10😁6🤔5🎉5🤯2👍1
vx-underground
Lockbit ransomware group has offered their support to Donald J. Trump They're evening dedicating Lockbit 4.0 to his administration. Very cool
To make this as clear as possible: No, the Trump administration is not involved in Russian-based cybercrime. Rather, Lockbit ransomware group administration is declaring their support and/or admiration for Donald J. Trump
❤67🤣27🤓26🤯11🤝4😢3👍1
"you guys should use your malware code to train an AI model for malware development"
My Brother in Christ, we don't even have the energy to copy-paste PDF files into an S3 bucket. You seriously think we're going to allocate our -1 time & energy to do AI crap?
My Brother in Christ, we don't even have the energy to copy-paste PDF files into an S3 bucket. You seriously think we're going to allocate our -1 time & energy to do AI crap?
❤87🤣60😁13😎8👏4🤔3❤🔥1😢1
vx-underground
To make this as clear as possible: No, the Trump administration is not involved in Russian-based cybercrime. Rather, Lockbit ransomware group administration is declaring their support and/or admiration for Donald J. Trump
You can't just slap an AI sticker onto everything and call it cool and badass. We don't need (or want) AI for malware stuff.
🔥101👍15❤11🤣8❤🔥5👏2😁2😢2🤓1
Gootloader has changed their malware delivery techniques. Historically Gootloader has relied on SEO poisoning. Now Gootloader is creating fake PDF conversion websites.
pdf-online-tools(dot)com
We use sites like this when we're lazy. We're cooked.
https://gootloader.wordpress.com/2024/11/07/gootloaders-pivot-from-seo-poisoning-pdf-converters-become-the-new-infection-vector/
pdf-online-tools(dot)com
We use sites like this when we're lazy. We're cooked.
https://gootloader.wordpress.com/2024/11/07/gootloaders-pivot-from-seo-poisoning-pdf-converters-become-the-new-infection-vector/
⌛☃❀✵Gootloader Details ✵❀☃⌛
Gootloader’s Pivot from SEO Poisoning: PDF Converters Become the New Infection Vector
Three weeks ago, Gootloader samples suddenly dried up. This has happened before, so I switched VPNs and tried new locations—coffee shops, friends’, and family’s Wi-Fi networks—but still couldn’t re…
😱58❤11🔥4😁4👍1💯1