we have 24tb of malware. is it too much?
😁110🤔31🤯23🔥15🫡15🤣12❤10🤝7💯6😱4😘4
RIP to the homie TikTok.
We'll miss all of your brainrot, pseudo celebrities, and hyper-invasive data collection strategies.
We'll miss all of your brainrot, pseudo celebrities, and hyper-invasive data collection strategies.
❤124🤓19🔥17🎉16😁14🫡14😢5🙏4
vx-underground
RIP to the homie TikTok. We'll miss all of your brainrot, pseudo celebrities, and hyper-invasive data collection strategies.
We'll never forget when, upon initial installation, it was infinite scrolling of half naked women twerking, street fights, and educational videos about turtles.
It was surreal. We never understood it. We uninstalled in less than 2 days.
It was surreal. We never understood it. We uninstalled in less than 2 days.
❤121🤣62🔥18🫡9👏7🥰2😢2👍1🤔1🤓1
This is a reminder to everyone that your malware payload does not need to be ultra-1337 for it to be effective or evasive.
In a bit of irony, the more sophisticated you try to make your malware be, more the IOCs you're introducing into your code base.
The goal is to write clean, simplistic, environment specific malware. If you introduce dozens of anti-debug techniques, stack spoofing, sleep obfuscation, VEH system call invocation, server-side or client-side polymorphism, and offensive EDR techniques you're only introducing more things your binary can be identified by from static analysis. If you introduce further methods, like encrypting sections of your binary on disk, you're once again only adding to the pile of shit that makes your binary stick out.
Also, don't let the elitist nerds lie to you — if you handcraft your malware is x86 it WILL be caught lightning fast. Handcrafted assembly looks completely different under the microscope (Ghidra, IDA, whatever) and can make YARA rules easier to make.
In a bit of irony, the more sophisticated you try to make your malware be, more the IOCs you're introducing into your code base.
The goal is to write clean, simplistic, environment specific malware. If you introduce dozens of anti-debug techniques, stack spoofing, sleep obfuscation, VEH system call invocation, server-side or client-side polymorphism, and offensive EDR techniques you're only introducing more things your binary can be identified by from static analysis. If you introduce further methods, like encrypting sections of your binary on disk, you're once again only adding to the pile of shit that makes your binary stick out.
Also, don't let the elitist nerds lie to you — if you handcraft your malware is x86 it WILL be caught lightning fast. Handcrafted assembly looks completely different under the microscope (Ghidra, IDA, whatever) and can make YARA rules easier to make.
❤109🔥18💯15👍7🤔7🤓4🫡4😎4🤝2😢1
Thank you to the people who continue to send us cat photos from compromised government e-mails.
It means a lot to us.
It means a lot to us.
❤170😁42👍5😎4❤🔥1😢1
Hello,
The site is mostly restored. We're finalizing the migration (167GB of VirusShare blocks).
Following this we will begin the migration of 17TB of the virus exchange database.
https://vx-underground.org/
The site is mostly restored. We're finalizing the migration (167GB of VirusShare blocks).
Following this we will begin the migration of 17TB of the virus exchange database.
https://vx-underground.org/
👍39❤21🎉12👏4😢1🤣1
This is a reminder that there is a difference between Pegasus RAT (old, builder and source code archived on VXUG) and Pegasus Spyware produced by NSO Group.
You do not have the source code to Pegasus Spyware from NSO Group. You're not the Mossad.
You do not have the source code to Pegasus Spyware from NSO Group. You're not the Mossad.
😢79🤣41💯12😁9❤6❤🔥4🤓4🔥2
This media is not supported in your browser
VIEW IN TELEGRAM
This is a reminder that there is a difference between Pegasus RAT (old, builder and source code archived on VXUG) and Pegasus Spyware produced by NSO Group.
You do not have the source code to Pegasus Spyware from NSO Group. You're not the Mossad.
Every so often some goober messages us saying they've got the source code to Pegasus Spyware.
WHY WOULD ANDROID AND IOS SPYWARE BE WRITTEN IN C# AND COMPILE INTO A .EXE
You do not have the source code to Pegasus Spyware from NSO Group. You're not the Mossad.
Every so often some goober messages us saying they've got the source code to Pegasus Spyware.
WHY WOULD ANDROID AND IOS SPYWARE BE WRITTEN IN C# AND COMPILE INTO A .EXE
🤣84😁78❤9💯7🤓7🫡6🤔2😢2
United States media outlets are saying Donald Trump intends on, honest to God, pardoning Ross Ulbricht. Initially Trump said he'd do it on day 1 — he didn't. Representatives say he still intends on pardoning him
There's a real world chance Ross Ulbricht could discover brain rot
There's a real world chance Ross Ulbricht could discover brain rot
🤣67😱14❤11🙏4😢1
vx-underground
United States media outlets are saying Donald Trump intends on, honest to God, pardoning Ross Ulbricht. Initially Trump said he'd do it on day 1 — he didn't. Representatives say he still intends on pardoning him There's a real world chance Ross Ulbricht could…
Imagine Ross Ulbricht is freed, discovers TikTok, brain rot, and Discord, and requests to be put back in prison
🤣156🤓12❤8😁4🔥2😢2👍1🤔1😱1
vx-underground
Conor Fitzpatrick a/k/a Pompompurin, the ex-administrator to Breach forums, violated his parole agreements almost immediately after his plea deal. He now faces in excess of 20 years in prison. His next court date in is February.
He had quite literally the easiest sentencing ever. He was charged for possession of child pornography, dozens of wire fraud charges, aggravated identity theft, etc.
All he had to do was get a job or education, go to therapy, agree to electronic supervision, and not do crime
All he had to do was get a job or education, go to therapy, agree to electronic supervision, and not do crime
🤣120😁9😢8😇5😎3🤔2❤1🎉1
Ross Ulbricht, the creator of the infamous Silk Road, has been pardoned by Donald Trump.
🔥265😱48🎉35🤔15❤14😁7🤣7👏5🤯3❤🔥2💯1
We broke the site by testing in prod. We'll fix it tomorrow.
Quality assurance is for cowards
Quality assurance is for cowards
🤣124😎30💯15❤7😁4🔥3👍2🤓2❤🔥1😢1🎉1
Ross Ulbricht's Xitter is being spammed with accounts which appear to be associated with him (image 1). However, the accounts are not. When you try to view the "official" Ross Ulbricht Telegram channel it asks to verify your identity (image 2).
It gives free malware! ♥️♥️♥️
It gives free malware! ♥️♥️♥️
🤣133😢21❤19🤯3👍2🤔2