Today alexocheema from exolabs reported an unknown Threat Actor trying to slipstream a malware payload into their GitHub repo (image 1).
Interestingly, Malcoreio identified the exact same note & code was also slipstreamed (or attempted to be slipstreamed) into other GitHub repos too (image 2).
The GitHub profile which tried to insert the payload into Exolab was "EvilDojo666". The GitHub profile name identified by Malcore was "Darkmage666" (image 3).
One of the targets was yt-dlp. Those bastards.
tl;dr campaign
Interestingly, Malcoreio identified the exact same note & code was also slipstreamed (or attempted to be slipstreamed) into other GitHub repos too (image 2).
The GitHub profile which tried to insert the payload into Exolab was "EvilDojo666". The GitHub profile name identified by Malcore was "Darkmage666" (image 3).
One of the targets was yt-dlp. Those bastards.
tl;dr campaign
❤65🔥15😢10🤣10😱8🙏4👍3
Latest additions to vx-underground.
Read them.
2015-08-12 - Stealth Techniques - Hiding Files in the Registry
2015-08-20 - Manually Enumerating Process Modules
2015-12-05 - Abusing WMI To Build A Persistent Asynchronous And Fileless Backdoor
2019-12-17 - Calling Local Windows RPC Servers from NET
2021-02-27 - Windows object permissions as a backdoor
2021-10-21 - Windows Exploitation Tricks - Relaying DCOM Authentication
2024-01-31 - Abusing the GPU for Malware with OpenCL
2024-04-19 - Detecting Sandboxes Without Syscalls
2024-09-12 - Proof of Concept - Transforming an EXE or DLL to Shellcode
2024-09-13 - ScriptBlock Smuggling
2024-09-16 - Kernel ETW is the best ETW
2024-09-20 - Anti-Anti-Rootkit Techniques - Part II Stomped Drivers and Hidden Threads
2024-09-28 - Notes on unprivileged access to Bitlocker
2024-10-04 - Notes on xWizard.exe and xWizards.dll
2024-10-09 - XBL Live Game Save DCOM for lateral movement
2024-10-22 - Offensive Groovy programming.pdf
2024-10-22 - Reading BitLocker numerical passwords via API
2024-10-24 - EmbedPayloadInPng
2024-10-27 - ExecutePeFromPngViaLNK
2024-10-30 - EV code signing with pfx in 2024
2024-10-31 - SysVEHSyscalls in Rust
2024-11-09 - Structured Storage and Compound Files.pdf
2024-11-09 - Using VBS enclaves for anti-cheat purposes.pdf
Read them.
2015-08-12 - Stealth Techniques - Hiding Files in the Registry
2015-08-20 - Manually Enumerating Process Modules
2015-12-05 - Abusing WMI To Build A Persistent Asynchronous And Fileless Backdoor
2019-12-17 - Calling Local Windows RPC Servers from NET
2021-02-27 - Windows object permissions as a backdoor
2021-10-21 - Windows Exploitation Tricks - Relaying DCOM Authentication
2024-01-31 - Abusing the GPU for Malware with OpenCL
2024-04-19 - Detecting Sandboxes Without Syscalls
2024-09-12 - Proof of Concept - Transforming an EXE or DLL to Shellcode
2024-09-13 - ScriptBlock Smuggling
2024-09-16 - Kernel ETW is the best ETW
2024-09-20 - Anti-Anti-Rootkit Techniques - Part II Stomped Drivers and Hidden Threads
2024-09-28 - Notes on unprivileged access to Bitlocker
2024-10-04 - Notes on xWizard.exe and xWizards.dll
2024-10-09 - XBL Live Game Save DCOM for lateral movement
2024-10-22 - Offensive Groovy programming.pdf
2024-10-22 - Reading BitLocker numerical passwords via API
2024-10-24 - EmbedPayloadInPng
2024-10-27 - ExecutePeFromPngViaLNK
2024-10-30 - EV code signing with pfx in 2024
2024-10-31 - SysVEHSyscalls in Rust
2024-11-09 - Structured Storage and Compound Files.pdf
2024-11-09 - Using VBS enclaves for anti-cheat purposes.pdf
❤🔥35🎉7❤6👍3🫡3😢2🥰1
Some of these Cybersecurity career advice and/or Cybersecurity career influencers should be beaten over the head with an old CRT monitor.
🥰100💯44😁18👍10❤6🤣5🤝4👏3
new.txt
13.9 KB
Updates to our Malware Analysis collection.
It's too big for a Telegram post, so just read the text file.
It's too big for a Telegram post, so just read the text file.
❤50🤓26🤣24❤🔥4🤝4🤔2😢1
boomers in the 90s: ppl will try to take advantage of you, so be careful
boomers now: believes everything on facebook
boomers now: believes everything on facebook
💯141🤓22👏6🤯6🤣6❤3😢2
Jack Teixeira, the United States military intelligence analyst who leaked classified military documents onto a Minecraft Discord, has been sentenced to 15 years in prison.
😢96🫡57🤣32👍13🤯11🎉4❤3😱3
vx-underground
Jack Teixeira, the United States military intelligence analyst who leaked classified military documents onto a Minecraft Discord, has been sentenced to 15 years in prison.
Yes, he was the person who named the Minecraft chatroom "Thug Shaker Central".
😁83🤣35🔥8❤6😢5🤓3🤔2🫡1
Security researcher Cristian Cornea authored a fake ransomware builder dubbed Jinn ransomware builder.
It was a fake Builder — it was actually a payload.
It infected over 100 people on Breached.
https://corneacristian.medium.com/how-i-hacked-100-hackers-5c3c313e8a1a
It was a fake Builder — it was actually a payload.
It infected over 100 people on Breached.
https://corneacristian.medium.com/how-i-hacked-100-hackers-5c3c313e8a1a
Medium
How I hacked 100 hackers
… Or noscript kiddies I could say
🤣213😁20🔥11👏4💯2❤1👍1
vx-underground
Security researcher Cristian Cornea authored a fake ransomware builder dubbed Jinn ransomware builder. It was a fake Builder — it was actually a payload. It infected over 100 people on Breached. https://corneacristian.medium.com/how-i-hacked-100-hackers…
Cristian Cornea was correct in his statement that some Threat Intelligence analysts fell for this ... 'honeypot'. We advise people do their due diligence when discussing anything said on forums (people lie, do honeypots, watch anime)
👏66❤15😁14😱6🤣6😢2
vx-underground
Me: Hey Google, can you tell me some musicians that sound similar to Linkin Park? Google:
Me: Okay, so like, y'know, Google is an IPv4, IPv6, Linux system. It is a 4x4 bilateral system and it can't be split, okay?
🤣91❤🔥9❤4😢2
Show us someone using a "hacker" cheatsheet and we'll show you someone who doesn't watch anime.
😁53🤣41🤔8🔥3❤2👍1😢1
❤35🤣15🔥5👍4🤔2😢2❤🔥1🤝1🫡1
This media is not supported in your browser
VIEW IN TELEGRAM
EDIT: Heather Morgan, an individual found guilty of laundering $4,500,000,000 in Bitcoin cryptocurrency, HAS NOT BEEN SENTENCED yet. Her husband was sentenced to 5 years in prison for his role in the operation.
Regardless, here is her hip-hop alter-ego "razzlekhan".
Regardless, here is her hip-hop alter-ego "razzlekhan".
🤣127❤10🔥8😢5🤯4🫡3👍1🤔1