vx-underground
Satya Nadella is literally the VIP for Threat Actors and Red Teamers. Thanks to new Microsoft Teams technologies, you can now clone your voice ... so you can speak to others in a different language! Ever be North Korean but want to sound American? It's now…
Yeah, we rip on Microsoft a lot. But for each feature they add, they're just expanding the Threat Landscape in corporate environments (and potentially homeusers).
Should we be more optimistic? Maybe.
Are we optimistic? Hell nah
Should we be more optimistic? Maybe.
Are we optimistic? Hell nah
🎉57😁22🤔12🫡9👍4🤣4❤3💯2
This media is not supported in your browser
VIEW IN TELEGRAM
Microsoft CEO Satya Nadella greeting the Red Teamers after Microsoft Ignite 2024 (they can now clone target voices)
🤣124🎉14❤4😁3🤯2👍1
Today the United States Department of Justice unsealed criminal charges brought against 5 people.
- Ahmed Hossam Eldin Elbadawy, 23, a/k/a "AD", of College Station, Texas
- Noah Michael Urban, 20, a/k/a "Sosa" and "Elijah", of Palm Coast, Florida
- Evans Onyeaka Osiebo, 20, of Dallas, Texas
- Joel Martin Evans, 25, a/k/a "joeleoli", of Jacksonville, North Carolina
- Tyler Robert Buchanan, 22, of the United Kingdom
The individuals are accused of performing phishing and/or social engineering attacks which resulted in the theft of millions of dollars.
More information: https://www.justice.gov/usao-cdca/pr/5-defendants-charged-federally-running-scheme-targeted-victim-companies-phishing-text
- Ahmed Hossam Eldin Elbadawy, 23, a/k/a "AD", of College Station, Texas
- Noah Michael Urban, 20, a/k/a "Sosa" and "Elijah", of Palm Coast, Florida
- Evans Onyeaka Osiebo, 20, of Dallas, Texas
- Joel Martin Evans, 25, a/k/a "joeleoli", of Jacksonville, North Carolina
- Tyler Robert Buchanan, 22, of the United Kingdom
The individuals are accused of performing phishing and/or social engineering attacks which resulted in the theft of millions of dollars.
More information: https://www.justice.gov/usao-cdca/pr/5-defendants-charged-federally-running-scheme-targeted-victim-companies-phishing-text
www.justice.gov
5 Defendants Charged Federally with Running Scheme that Targeted
Law enforcement today unsealed criminal charges against five defendants who allegedly targeted employees of companies nationwide with phishing text messages and then used the harvested employee credentials to log in and steal non-public company data and information…
👍25🎉10❤6🔥2😢2🤣2😁1
When I was a teenager, I infected my personal computer trying to download "mods" for Windows XP. I couldn't find the malware (I only checked My Documents), so I thought the malware was in my modem. I convinced my parents to buy a new modem. It didn't fix it.
- smelly
- smelly
🤣261😢18❤14😁9🔥8👏8🤓6😇4👍3🎉1🫡1
vx-underground
When I was a teenager, I infected my personal computer trying to download "mods" for Windows XP. I couldn't find the malware (I only checked My Documents), so I thought the malware was in my modem. I convinced my parents to buy a new modem. It didn't fix it.…
Another funny story: I got malware (again) from trying to download "hacks" for Halo 2. I couldn't find the malware (again) so I randomly uninstalled software from the Control Panel. I uninstalled the audio drivers and network drivers. This didn't fix it.
- smelly
- smelly
🤣217👏19🥰12❤8🔥6🤓5🫡4👍3😁2🤔2💯2
regular programmers: int x = 0;
malware programmers: DWORD dwIncrementalExportAddressTableEnumerationIndexer = 0;
malware programmers: DWORD dwIncrementalExportAddressTableEnumerationIndexer = 0;
😁124🤓63🤣19🥰5🤔3❤2👍2😢2👏1🎉1💯1
vx-underground
regular programmers: int x = 0; malware programmers: DWORD dwIncrementalExportAddressTableEnumerationIndexer = 0;
This is such an oddly specific joke, it's not even funny but it had to be shared
👍45😘26🔥7❤4😢4👏1
vx-underground
Photo
unrelated to malware, but need to kitty post (dont feel like pushing to prod)
😁48❤🔥9❤2😢1🤝1
Removed post about Google having to sell Chrome. It was slightly misleading.
tl;dr will be confirmed or denied Summer 2025 by the courts.
tl;dr will be confirmed or denied Summer 2025 by the courts.
😢72👍29😇8🤔5🤣4😱3🤝2❤1
vx-underground
Been spamming F5 all day 🙏
This is not pronounced like "MAGA". It's pronounced like: "Mmmmmm. Aga". The double M's are pronounced like you just ate a delicious slice of pizza. The "Aga" part is pronounced like you're stuck in traffic — a strenuous sigh almost.
It's shrimple.
It's shrimple.
🤓79🤣16😁10👍5❤2😢1🤝1😘1
"my computer harddrive is surrounded by tannerite. if the FBI raids me my harddrive will explode and they'll have no evidence"
Wow. Bravo. You'll be investigated by the FBI and the ATF.
2 birds with 1 stone. Brilliant tactics.
Wow. Bravo. You'll be investigated by the FBI and the ATF.
2 birds with 1 stone. Brilliant tactics.
🤓115😁44❤🔥13🔥10👍6❤4💯2🤣2
Today at CYBERWARCON we watched arguably one of the most interesting talks we've seen in awhile.
Steven Adair gave a nearly 1 hour presentation regarding APT28's "Nearest Neighbor Attack". In summary, because it was a long and wild story, APT28 successfully compromised one of their clients by compromising a company across the street from the client.
APT28, presumably unable to compromise their target, compromised a company across the street from the target. Then, using a combination of attacks including a 0day exploit, moved laterally across the street pivoting from WiFi. Yes, APT28 daisy chained their way to the target by WiFi. Subsequent to the compromise they primarily lived off the land and covered their tracks using CIPHER.exe
Volexity has released the paper on the talk. However, the paper does not truly do justice to the attack and does not truly emphasize the complexity of the attack. If you ever have a chance, watch the video.
Paper: https://www.volexity.com/blog/2024/11/22/the-nearest-neighbor-attack-how-a-russian-apt-weaponized-nearby-wi-fi-networks-for-covert-access/
Steven Adair gave a nearly 1 hour presentation regarding APT28's "Nearest Neighbor Attack". In summary, because it was a long and wild story, APT28 successfully compromised one of their clients by compromising a company across the street from the client.
APT28, presumably unable to compromise their target, compromised a company across the street from the target. Then, using a combination of attacks including a 0day exploit, moved laterally across the street pivoting from WiFi. Yes, APT28 daisy chained their way to the target by WiFi. Subsequent to the compromise they primarily lived off the land and covered their tracks using CIPHER.exe
Volexity has released the paper on the talk. However, the paper does not truly do justice to the attack and does not truly emphasize the complexity of the attack. If you ever have a chance, watch the video.
Paper: https://www.volexity.com/blog/2024/11/22/the-nearest-neighbor-attack-how-a-russian-apt-weaponized-nearby-wi-fi-networks-for-covert-access/
Volexity
The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access
In early February 2022, notably just ahead of the Russian invasion of Ukraine, Volexity made a discovery that led to one of the most fascinating and complex incident investigations Volexity had ever worked. The investigation began when an alert from a custom…
🔥73🤯17❤8👍7❤🔥1🥰1😢1
Update: CYBERWARCON is now holding us hostage. They have done talks back-to-back, no time to get snacks or use the restroom.
We have ripped up the carpet and starting gnawing on the adhesives for nutrients. We have resorted to urinating in our pants.
We have ripped up the carpet and starting gnawing on the adhesives for nutrients. We have resorted to urinating in our pants.
❤58🤣22🫡7👍5🙏5💯3😇3🤔2😢2🔥1🎉1