When I was a teenager, I infected my personal computer trying to download "mods" for Windows XP. I couldn't find the malware (I only checked My Documents), so I thought the malware was in my modem. I convinced my parents to buy a new modem. It didn't fix it.
- smelly
- smelly
🤣261😢18❤14😁9🔥8👏8🤓6😇4👍3🎉1🫡1
vx-underground
When I was a teenager, I infected my personal computer trying to download "mods" for Windows XP. I couldn't find the malware (I only checked My Documents), so I thought the malware was in my modem. I convinced my parents to buy a new modem. It didn't fix it.…
Another funny story: I got malware (again) from trying to download "hacks" for Halo 2. I couldn't find the malware (again) so I randomly uninstalled software from the Control Panel. I uninstalled the audio drivers and network drivers. This didn't fix it.
- smelly
- smelly
🤣217👏19🥰12❤8🔥6🤓5🫡4👍3😁2🤔2💯2
regular programmers: int x = 0;
malware programmers: DWORD dwIncrementalExportAddressTableEnumerationIndexer = 0;
malware programmers: DWORD dwIncrementalExportAddressTableEnumerationIndexer = 0;
😁124🤓63🤣19🥰5🤔3❤2👍2😢2👏1🎉1💯1
vx-underground
regular programmers: int x = 0; malware programmers: DWORD dwIncrementalExportAddressTableEnumerationIndexer = 0;
This is such an oddly specific joke, it's not even funny but it had to be shared
👍45😘26🔥7❤4😢4👏1
vx-underground
Photo
unrelated to malware, but need to kitty post (dont feel like pushing to prod)
😁48❤🔥9❤2😢1🤝1
Removed post about Google having to sell Chrome. It was slightly misleading.
tl;dr will be confirmed or denied Summer 2025 by the courts.
tl;dr will be confirmed or denied Summer 2025 by the courts.
😢72👍29😇8🤔5🤣4😱3🤝2❤1
vx-underground
Been spamming F5 all day 🙏
This is not pronounced like "MAGA". It's pronounced like: "Mmmmmm. Aga". The double M's are pronounced like you just ate a delicious slice of pizza. The "Aga" part is pronounced like you're stuck in traffic — a strenuous sigh almost.
It's shrimple.
It's shrimple.
🤓79🤣16😁10👍5❤2😢1🤝1😘1
"my computer harddrive is surrounded by tannerite. if the FBI raids me my harddrive will explode and they'll have no evidence"
Wow. Bravo. You'll be investigated by the FBI and the ATF.
2 birds with 1 stone. Brilliant tactics.
Wow. Bravo. You'll be investigated by the FBI and the ATF.
2 birds with 1 stone. Brilliant tactics.
🤓115😁44❤🔥13🔥10👍6❤4💯2🤣2
Today at CYBERWARCON we watched arguably one of the most interesting talks we've seen in awhile.
Steven Adair gave a nearly 1 hour presentation regarding APT28's "Nearest Neighbor Attack". In summary, because it was a long and wild story, APT28 successfully compromised one of their clients by compromising a company across the street from the client.
APT28, presumably unable to compromise their target, compromised a company across the street from the target. Then, using a combination of attacks including a 0day exploit, moved laterally across the street pivoting from WiFi. Yes, APT28 daisy chained their way to the target by WiFi. Subsequent to the compromise they primarily lived off the land and covered their tracks using CIPHER.exe
Volexity has released the paper on the talk. However, the paper does not truly do justice to the attack and does not truly emphasize the complexity of the attack. If you ever have a chance, watch the video.
Paper: https://www.volexity.com/blog/2024/11/22/the-nearest-neighbor-attack-how-a-russian-apt-weaponized-nearby-wi-fi-networks-for-covert-access/
Steven Adair gave a nearly 1 hour presentation regarding APT28's "Nearest Neighbor Attack". In summary, because it was a long and wild story, APT28 successfully compromised one of their clients by compromising a company across the street from the client.
APT28, presumably unable to compromise their target, compromised a company across the street from the target. Then, using a combination of attacks including a 0day exploit, moved laterally across the street pivoting from WiFi. Yes, APT28 daisy chained their way to the target by WiFi. Subsequent to the compromise they primarily lived off the land and covered their tracks using CIPHER.exe
Volexity has released the paper on the talk. However, the paper does not truly do justice to the attack and does not truly emphasize the complexity of the attack. If you ever have a chance, watch the video.
Paper: https://www.volexity.com/blog/2024/11/22/the-nearest-neighbor-attack-how-a-russian-apt-weaponized-nearby-wi-fi-networks-for-covert-access/
Volexity
The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access
In early February 2022, notably just ahead of the Russian invasion of Ukraine, Volexity made a discovery that led to one of the most fascinating and complex incident investigations Volexity had ever worked. The investigation began when an alert from a custom…
🔥73🤯17❤8👍7❤🔥1🥰1😢1
Update: CYBERWARCON is now holding us hostage. They have done talks back-to-back, no time to get snacks or use the restroom.
We have ripped up the carpet and starting gnawing on the adhesives for nutrients. We have resorted to urinating in our pants.
We have ripped up the carpet and starting gnawing on the adhesives for nutrients. We have resorted to urinating in our pants.
❤58🤣22🫡7👍5🙏5💯3😇3🤔2😢2🔥1🎉1
Listening to James Elliot from MSTC discuss the "Triple Threat" of North Korean IT workers a/k/a Ruby Sleet via CYBERWARCON.
We've learned a lot about their methods of applying for jobs, their templates and portfolios, how they use AI for faking images, etc. Included in this is how North Korea pays United States citizens to receive laptops for them, keeping them plugged in and alive — the "laptop farms".
In August, 2024, the United States Federal Bureau of Investigation took down a North Korean "laptop farm" for their IT workers which housed over 800 proxies.
tl;dr if you're new to information security (or IT in general) and say you can't get a job, you're doing something wrong.
tl;dr tl;dr the north koreans took your job
We've learned a lot about their methods of applying for jobs, their templates and portfolios, how they use AI for faking images, etc. Included in this is how North Korea pays United States citizens to receive laptops for them, keeping them plugged in and alive — the "laptop farms".
In August, 2024, the United States Federal Bureau of Investigation took down a North Korean "laptop farm" for their IT workers which housed over 800 proxies.
tl;dr if you're new to information security (or IT in general) and say you can't get a job, you're doing something wrong.
tl;dr tl;dr the north koreans took your job
🤯64🤣32❤3👍2😁1😢1💯1😎1
Yesterday night (or early morning November 22nd depending on where you reside), it was unveiled an unknown Threat Actor(s) had compromised Andrew Tate's online university, dubbed "The Real World (Hustler's University)".
Note(s):
1. The content was given to non-profit organization DDoSecrets (unable to tag on X due to their account being suspended) and is available for anyone to review
2. Upon compromise (and exfiltration of data, presumably), the individual(s) responsible for the compromise inserted pro-transgender emojis onto the site and uploaded AI photos of Andrew Tate with a transgender flag. The compromise of Andrew Tate's website appears to be ideologically motivated, not financially motivated
3. Upon review of the compromised data we spotted some inconsistencies with reporting from media outlets. Some media outlets have stated the stolen data contains over 325,000 user email addresses. However, upon review we do not see email addresses UNLESS the users actual username on the website was their email address. We only spotted a few thousand (see image 1)
The file in the leaked, "users.json", contains the following:
- Unique UserID
- Username
- External UserID
- Score (reputation)
- Coin balance (forum based currency)
- Server (unsure)
- "User" (unsure)
- Join Date
- Roles
Other fields visible, which appear to be optional entries based on users interaction with the website:
- Profile content
- "Learnv2"
- Avatar
Also present in the compromise is chat logs from both public and private rooms. These rooms include:
- AI Automation
- Business Mastery
- Content Creation & AI Campus
- Copywriting
- Crypto DeFi
- Crypto Trading
- Cryptocurrency Investing
- ECommerce
- Fitness
- Hustler's Campus
- Social Media & Client Acquisition
- The Real World
Each room described has a both public and private variant. We briefly skimmed the contents of these and can confirm they have unfathomable amounts of chat logs and conversations. In the spirit of full disclosure: we are not going to review and/or read these chat logs. They are massive. In summary: the dumped conversations are legit.
As a disclaimer: it may be possible that email addresses and more sensitive information is in the chat logs. We have not reviewed this in totality to confirm that (we don't feel like it).
Note(s):
1. The content was given to non-profit organization DDoSecrets (unable to tag on X due to their account being suspended) and is available for anyone to review
2. Upon compromise (and exfiltration of data, presumably), the individual(s) responsible for the compromise inserted pro-transgender emojis onto the site and uploaded AI photos of Andrew Tate with a transgender flag. The compromise of Andrew Tate's website appears to be ideologically motivated, not financially motivated
3. Upon review of the compromised data we spotted some inconsistencies with reporting from media outlets. Some media outlets have stated the stolen data contains over 325,000 user email addresses. However, upon review we do not see email addresses UNLESS the users actual username on the website was their email address. We only spotted a few thousand (see image 1)
The file in the leaked, "users.json", contains the following:
- Unique UserID
- Username
- External UserID
- Score (reputation)
- Coin balance (forum based currency)
- Server (unsure)
- "User" (unsure)
- Join Date
- Roles
Other fields visible, which appear to be optional entries based on users interaction with the website:
- Profile content
- "Learnv2"
- Avatar
Also present in the compromise is chat logs from both public and private rooms. These rooms include:
- AI Automation
- Business Mastery
- Content Creation & AI Campus
- Copywriting
- Crypto DeFi
- Crypto Trading
- Cryptocurrency Investing
- ECommerce
- Fitness
- Hustler's Campus
- Social Media & Client Acquisition
- The Real World
Each room described has a both public and private variant. We briefly skimmed the contents of these and can confirm they have unfathomable amounts of chat logs and conversations. In the spirit of full disclosure: we are not going to review and/or read these chat logs. They are massive. In summary: the dumped conversations are legit.
As a disclaimer: it may be possible that email addresses and more sensitive information is in the chat logs. We have not reviewed this in totality to confirm that (we don't feel like it).
🤣78❤19😱15👍14🎉7😁6🔥5🥰4👏4😘4😢1
Hi,
We're aware of the stuff that happened today. We see your messages (and cat pictures). Tomorrow we'll review the stuff on the alleged* Ticketmaster hacker and the new information released on him. We'll review the Spotify stuff too.
Love you,
- smelly
We're aware of the stuff that happened today. We see your messages (and cat pictures). Tomorrow we'll review the stuff on the alleged* Ticketmaster hacker and the new information released on him. We'll review the Spotify stuff too.
Love you,
- smelly
❤66🤓9👏5❤🔥4👍3🔥2😢1
vx-underground
Yesterday night (or early morning November 22nd depending on where you reside), it was unveiled an unknown Threat Actor(s) had compromised Andrew Tate's online university, dubbed "The Real World (Hustler's University)". Note(s): 1. The content was given…
Update: 720,845 emails are stored in one of the private chatrooms (???), removing duplicates will probably bring it to the number being reported.
Breach is 100% legit
Breach is 100% legit
🤣95👏9👍6🎉4❤2
Andrew Tate has publicly commented on the compromise of The Real World (Hustlers University).
He asserts the compromise was a result of the Threat Actor(s) paying for membership and simply scraping the site.
His response minimizes the compromise and concludes with him stating he is wealthy.
Based on the data we've seen, he is indeed fairly wealthy if each individual on the website purchased membership. However, his response does not account for the email addresses exfiltrated as a result of the compromise and the database fields visible.
He asserts the compromise was a result of the Threat Actor(s) paying for membership and simply scraping the site.
His response minimizes the compromise and concludes with him stating he is wealthy.
Based on the data we've seen, he is indeed fairly wealthy if each individual on the website purchased membership. However, his response does not account for the email addresses exfiltrated as a result of the compromise and the database fields visible.
🤣184😁24❤8👍6🤔4🤓4🔥1👏1😢1
More information has been released regarding Connor Moucka a/k/a Alexander Moucka a/k/a Judische a/k/a Catist a/k/a Waifu, the person allegedly responsible for the Ticketmaster compromise (among many others)
He has way too many aliases
November 22nd, 2024, unsealed documents (from Canada) state authorities believe him to be dangerous to himself, and the public. They also state he a flight risk.
Documents show Mr. Moucka used racial slurs online, frequently discussed killing black people, mass mailing black people "sodium nitrate pills", acquiring weapons to kill random Canadians, and discussing wanting to commit suicide by cop.
Court documents show Mr. Moucka plotting and scheming the Snowflake compromise, which resulted in the Ticketmaster compromise. Chat logs show the scheme, him and his associates discussing how to use stolen credentials, access to private data (banking information, payroll records, driver license numbers, passports, and social security numbers). The scheme conversation included how they would extort people.
Unsealed documents show images of Mr. Moucka's home and how law enforcement identified him. Mr. Moucka was identified by law enforcement by his Apple iCloud account. The Apple iCloud account was linked to his Discord account. Additionally, the Apple iCloud account was tied to his cryptocurrency wallets.
Court records show Mr. Moucka was charged in November, 2023 at age 25 for harassing a woman online and threatening to kill her.
Mr. Moucka's next court case regarding his extradition to the United States is November 29th, 2024.
He has way too many aliases
November 22nd, 2024, unsealed documents (from Canada) state authorities believe him to be dangerous to himself, and the public. They also state he a flight risk.
Documents show Mr. Moucka used racial slurs online, frequently discussed killing black people, mass mailing black people "sodium nitrate pills", acquiring weapons to kill random Canadians, and discussing wanting to commit suicide by cop.
Court documents show Mr. Moucka plotting and scheming the Snowflake compromise, which resulted in the Ticketmaster compromise. Chat logs show the scheme, him and his associates discussing how to use stolen credentials, access to private data (banking information, payroll records, driver license numbers, passports, and social security numbers). The scheme conversation included how they would extort people.
Unsealed documents show images of Mr. Moucka's home and how law enforcement identified him. Mr. Moucka was identified by law enforcement by his Apple iCloud account. The Apple iCloud account was linked to his Discord account. Additionally, the Apple iCloud account was tied to his cryptocurrency wallets.
Court records show Mr. Moucka was charged in November, 2023 at age 25 for harassing a woman online and threatening to kill her.
Mr. Moucka's next court case regarding his extradition to the United States is November 29th, 2024.
😁47🤣22❤7👍6😱3😢2🤓2