This media is not supported in your browser
VIEW IN TELEGRAM
❤90🥰28😍10😇5🤣2🤯1😢1
Reports surfacing the United States government, working with allies from the United Kingdom, programmatically terminated electrical power to parts of Venezuela's capitol prior to United States military arrival.
tl;dr compromised Industrial Control System, turned off power
tl;dr compromised Industrial Control System, turned off power
😢48😎18❤11🥰5🔥1
vx-underground
Reports surfacing the United States government, working with allies from the United Kingdom, programmatically terminated electrical power to parts of Venezuela's capitol prior to United States military arrival. tl;dr compromised Industrial Control System…
It should be noted that this is not unheard of. The Russian government, Chinese government, and (historically) the United States government have performed similar actions in the past. It is ICS/SCADA malware. Most notably, Stuxnet and BlackEnergy
🔥41❤10👍6😱2😎2😢1
vx-underground
Reports surfacing the United States government, working with allies from the United Kingdom, programmatically terminated electrical power to parts of Venezuela's capitol prior to United States military arrival. tl;dr compromised Industrial Control System…
Note:
Initially when it was reported the United States government utilized offensive cyber security operations to terminate power in the Venezuela capitol it was reported online the United Kingdom government was involved.
However, Sir Keir Starmer has denied these accusations. Starmer asserts the United Kingdom has no knowledge prior of what was happening in Venezuela and "the situation is unfolding rapidly".
In Starmer's defense, it is plausible it was SPECULATED the United Kingdom was involved (because they have been historically) and the speculation was misreported and/or regurgitated as fact (classic misinformation).
Politicians in the United Kingdom have called on Starmer to condemn the United States government, as well as President Donald Trump, for the operations which occurred in Venezuela.
Opinion:
It appears it was misinformation online, hence Starmer had to go on the record and deny involvement. However, it would not surprise me if the United Kingdom was actually secretly involved (in a currently unknown capacity). The United States government and United Kingdom government have referred to each other as "their strongest ally(ies)" and have for decades been strong partners in offensive cybersecurity operations.
This partnership was solidified in or around 2014 (via Snowden Leaks) the United Kingdom GCHQ, in collaboration with the United States NSA, developed "Regin", which was (unironically) an incredibly sophisticated malware payload designed for telecommunication espionage. Additionally, the United Kingdom GCHQ was tied to Operation Socialist, TEMPORA, and still classified ISIS-related offensive cyber operations (confirmed by the United States government).
This information is nearly a decade old.
Do I think the United Kingdom has stopped partnering with the United States government for state-sponsored offensive cybersecurity operations (hacking)? No.
Would it be surprisingly the United Kingdom was involved in operations against Venezuela? No.
Do I believe the United Kingdom would deny involvement? Yes
Initially when it was reported the United States government utilized offensive cyber security operations to terminate power in the Venezuela capitol it was reported online the United Kingdom government was involved.
However, Sir Keir Starmer has denied these accusations. Starmer asserts the United Kingdom has no knowledge prior of what was happening in Venezuela and "the situation is unfolding rapidly".
In Starmer's defense, it is plausible it was SPECULATED the United Kingdom was involved (because they have been historically) and the speculation was misreported and/or regurgitated as fact (classic misinformation).
Politicians in the United Kingdom have called on Starmer to condemn the United States government, as well as President Donald Trump, for the operations which occurred in Venezuela.
Opinion:
It appears it was misinformation online, hence Starmer had to go on the record and deny involvement. However, it would not surprise me if the United Kingdom was actually secretly involved (in a currently unknown capacity). The United States government and United Kingdom government have referred to each other as "their strongest ally(ies)" and have for decades been strong partners in offensive cybersecurity operations.
This partnership was solidified in or around 2014 (via Snowden Leaks) the United Kingdom GCHQ, in collaboration with the United States NSA, developed "Regin", which was (unironically) an incredibly sophisticated malware payload designed for telecommunication espionage. Additionally, the United Kingdom GCHQ was tied to Operation Socialist, TEMPORA, and still classified ISIS-related offensive cyber operations (confirmed by the United States government).
This information is nearly a decade old.
Do I think the United Kingdom has stopped partnering with the United States government for state-sponsored offensive cybersecurity operations (hacking)? No.
Would it be surprisingly the United Kingdom was involved in operations against Venezuela? No.
Do I believe the United Kingdom would deny involvement? Yes
❤42👍14😢1
vx-underground
Note: Initially when it was reported the United States government utilized offensive cyber security operations to terminate power in the Venezuela capitol it was reported online the United Kingdom government was involved. However, Sir Keir Starmer has denied…
tl;dr misinformation online, uk says not involved, wouldnt be surprised if uk involved, us and uk are best frens and always doing something sketchy together
🤓43👍15❤2😢2💯2
Hello,
I've pushed some updates to the malware store. Please look at the malware and/or download the malware. I pushed more after Christmas, but I forgot I did, but whatever.
pic: unrelated
https://vx-underground.org/Updates
I've pushed some updates to the malware store. Please look at the malware and/or download the malware. I pushed more after Christmas, but I forgot I did, but whatever.
pic: unrelated
https://vx-underground.org/Updates
🥰41🫡12❤7😎3😢1
This media is not supported in your browser
VIEW IN TELEGRAM
I can't post this on Twitter because the nerds on Twitter wouldn't get it. Telegram gets it though.
🔥150❤26😁13🥰9🤣6😎4😢1💯1🤓1
The internet is cool and badass. You can just do things.
I found a man on YouTube who has repeatedly recorded himself knocking himself unconscious by performing WWE-like stunts onto things such as microwaves.
I'm not entirely sure of his motivations, but this person is so unusual I went WAY out of my way to acquire their autograph.
I subsequently framed it and placed it on my wall.
I found a man on YouTube who has repeatedly recorded himself knocking himself unconscious by performing WWE-like stunts onto things such as microwaves.
I'm not entirely sure of his motivations, but this person is so unusual I went WAY out of my way to acquire their autograph.
I subsequently framed it and placed it on my wall.
🤣80❤19😢8🔥2🥰2🫡2
vx-underground
The internet is cool and badass. You can just do things. I found a man on YouTube who has repeatedly recorded himself knocking himself unconscious by performing WWE-like stunts onto things such as microwaves. I'm not entirely sure of his motivations, but…
Link for education: https://www.youtube.com/shorts/plM7CMmlwlg
YouTube
Flying elbow drop onto microwave ( WWE CM PUNK STYLE )
Enjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube.
🤣47🥰7❤5🤝5🫡3🔥1
In 2025 there was approx. 996 malware defense and/or detection research papers released.
🤓59🥰11❤8👍3😢1
vx-underground
In 2025 there was approx. 996 malware defense and/or detection research papers released.
AND YALL MFERS ASKING "OHHH HOW DO I GET INTO MALWARE REVERSE ENGINEERING" READ LITERALLY ZERO
wAK=E UP BRO, LOCK IN
wAK=E UP BRO, LOCK IN
🥰64💯35🤓13🤣7🤔3❤2🫡2🔥1😢1🤩1
Earlier today I made a post about over 900 malware research papers being released in 2025. Some people expressed confusion about this. Let's talk about malware research, what it entails, blah blah blah.
Malware research can be broken down into two distinct categories and from there it can be broken down further into more unique categories. Let's keep it shrimple.
- Offensive malware research
- Defensive malware research
Offensive malware research is trying to find new malware techniques. This is pretty broad. I won't go too much into detail on this. This isn't the thingie we're discussing here.
Defensive malware research is documenting new malware campaigns, tracking existing malware campaigns, reverse engineering malware and correlating it and/or tying it to other malware campaigns, techniques on malware detection, etc. This can be pretty broad too because malware detection, malware campaigns, anti-malware research, etc. will be vastly different on Windows, Linux, MacOS, mobile-devices, etc.
When I write that there was 996 malware research papers released what it means is (approx.) "996 vendors released papers sharing information on malware campaigns, reverse engineering malware, sharing malware detection techniques, malware family lineage discoveries (shared code across malware campaigns), etc".
Every single day I see vendors release paper documenting malware campaigns, what they're seeing on their side, and methods to detect the malware payloads. How they're discovered is also a different discussion for a different day.
Places where malware research is released:
- Basically every government on the planet
- Hundreds of independent researchers
- Google
- SentinelOne
- ESET
- Microsoft
- Kaspersky
- CrowdStrike
- RecordedFuture
- Cisco Talos
- VMWare
- CloudFlare
- Akamai
- HuntressLabs
- BitDefender (also Huntress?)
- Fortinet
- AVAST / AVG
- TrendMicro
- Sophos
- F-secure
- Panda
- Comodo
- Qihoo
- Dr. Web
- NVIDIA
- Norton
- MalwareBytes
- Secureworks
- ZScaler
- Okta
- Chainalysis
- Trustwave
- Nextron Systems
- GDATA
- AT&T
- Walmart
- StealthMole
- Censys
- AhnLab
- PtSecurity
- OxSecurity
- Securonix
- Koi-AI
- Palo Alto Networks
- CheckPoint
- Huorong
- Oligo
- Cyderes
- DarkTrace
- K7Computing
- CyberArmor
- ... more ....
Malware research can be broken down into two distinct categories and from there it can be broken down further into more unique categories. Let's keep it shrimple.
- Offensive malware research
- Defensive malware research
Offensive malware research is trying to find new malware techniques. This is pretty broad. I won't go too much into detail on this. This isn't the thingie we're discussing here.
Defensive malware research is documenting new malware campaigns, tracking existing malware campaigns, reverse engineering malware and correlating it and/or tying it to other malware campaigns, techniques on malware detection, etc. This can be pretty broad too because malware detection, malware campaigns, anti-malware research, etc. will be vastly different on Windows, Linux, MacOS, mobile-devices, etc.
When I write that there was 996 malware research papers released what it means is (approx.) "996 vendors released papers sharing information on malware campaigns, reverse engineering malware, sharing malware detection techniques, malware family lineage discoveries (shared code across malware campaigns), etc".
Every single day I see vendors release paper documenting malware campaigns, what they're seeing on their side, and methods to detect the malware payloads. How they're discovered is also a different discussion for a different day.
Places where malware research is released:
- Basically every government on the planet
- Hundreds of independent researchers
- SentinelOne
- ESET
- Microsoft
- Kaspersky
- CrowdStrike
- RecordedFuture
- Cisco Talos
- VMWare
- CloudFlare
- Akamai
- HuntressLabs
- BitDefender (also Huntress?)
- Fortinet
- AVAST / AVG
- TrendMicro
- Sophos
- F-secure
- Panda
- Comodo
- Qihoo
- Dr. Web
- NVIDIA
- Norton
- MalwareBytes
- Secureworks
- ZScaler
- Okta
- Chainalysis
- Trustwave
- Nextron Systems
- GDATA
- AT&T
- Walmart
- StealthMole
- Censys
- AhnLab
- PtSecurity
- OxSecurity
- Securonix
- Koi-AI
- Palo Alto Networks
- CheckPoint
- Huorong
- Oligo
- Cyderes
- DarkTrace
- K7Computing
- CyberArmor
- ... more ....
🥰47👏21❤9😢1
vx-underground
Earlier today I made a post about over 900 malware research papers being released in 2025. Some people expressed confusion about this. Let's talk about malware research, what it entails, blah blah blah. Malware research can be broken down into two distinct…
It should be noted that each vendor, or government, releases research which is tailored to them or their audience.
As you could probably assume, Microsoft rarely discusses MacOS malware.
Another interesting quirk is each vendor tailors research to their region. Vendors in China or Russia will discuss threats to the country they reside in. Hence, you can get unique insight into what is targeting countries outside the United States or NATO.
Believe it or not, while the United States says Russia and China launch offensive cybersecurity operations, China and Russia also accuse the United States (and allies) of targeting them as well! Strange stuff!
As you could probably assume, Microsoft rarely discusses MacOS malware.
Another interesting quirk is each vendor tailors research to their region. Vendors in China or Russia will discuss threats to the country they reside in. Hence, you can get unique insight into what is targeting countries outside the United States or NATO.
Believe it or not, while the United States says Russia and China launch offensive cybersecurity operations, China and Russia also accuse the United States (and allies) of targeting them as well! Strange stuff!
🥰46❤14😱7😢1
No, Ubisoft was not compromised from their "anti-cheat".
No, Ubisoft was not compromised by a rogue agent.
No, Ubisoft was not compromised as a result of a Threat Actor infecting an employee with information stealer malware.
Ubisoft technically* wasn't "compromised" (hacked) in the traditional usage of the word. I can't go into too much detail, because I don't want my knee caps broken with a baseball bat, but the event we all witnessed was the result of API abuse
In simpler terms, nerds discovered an exposed API endpoint (computer where instructions are sent to) and abused the poop out of it. This endpoint received commands for all sorts of stuff (bans, credits, etc). Normally another program sends instructions to this endpoint.
Under normal conditions, this endpoint requires authentication with a "key" (instead of using a username and password), but nerds ... sort of ... found a way to bypass the API key requirement. I'm using the word bypass here extremely liberally. What happened was extremely silly.
Ubisoft is aware of what happened. They're not dumb. The fix for the issue they're encountering is kind of a pain in the ass to fix, it'll take some time, I'm not surprised nerds managed to metaphorically kick in the door (abuse the API endpoint) again.
Ubisoft itself was not compromised. No employee data was stolen. No customer data was stolen. Nerds basically beat Siege servers with a stick until it did stuff.
No, Ubisoft was not compromised by a rogue agent.
No, Ubisoft was not compromised as a result of a Threat Actor infecting an employee with information stealer malware.
Ubisoft technically* wasn't "compromised" (hacked) in the traditional usage of the word. I can't go into too much detail, because I don't want my knee caps broken with a baseball bat, but the event we all witnessed was the result of API abuse
In simpler terms, nerds discovered an exposed API endpoint (computer where instructions are sent to) and abused the poop out of it. This endpoint received commands for all sorts of stuff (bans, credits, etc). Normally another program sends instructions to this endpoint.
Under normal conditions, this endpoint requires authentication with a "key" (instead of using a username and password), but nerds ... sort of ... found a way to bypass the API key requirement. I'm using the word bypass here extremely liberally. What happened was extremely silly.
Ubisoft is aware of what happened. They're not dumb. The fix for the issue they're encountering is kind of a pain in the ass to fix, it'll take some time, I'm not surprised nerds managed to metaphorically kick in the door (abuse the API endpoint) again.
Ubisoft itself was not compromised. No employee data was stolen. No customer data was stolen. Nerds basically beat Siege servers with a stick until it did stuff.
❤🔥51🤣30❤13💯6🥰2😢1🤓1
The unfortunate reality is that I know dozens of people who have tried to notify vendors, or government agencies, of vulnerabilities or potential problems. For reasons I do not understand, sometimes things are brushed aside, or forgotten, or mishandled, and nothing is resolved.
Interestingly, and for reasons I do not understand, if they (the person who found the potential problem or vulnerability) notify me of the problem and I make a post on social media about it (to nearly 400,000 people), suddenly the issue is far more important and it is magically resolved.
I hate to say it, but sometimes you kind of have to bully and/or shame places into fixing things. I don't necessarily blame the security teams, I think it is a bureaucracy issue and/or management issue.
Interestingly, and for reasons I do not understand, if they (the person who found the potential problem or vulnerability) notify me of the problem and I make a post on social media about it (to nearly 400,000 people), suddenly the issue is far more important and it is magically resolved.
I hate to say it, but sometimes you kind of have to bully and/or shame places into fixing things. I don't necessarily blame the security teams, I think it is a bureaucracy issue and/or management issue.
💯68🤣15❤9👍4🥰2😢2😱1
This media is not supported in your browser
VIEW IN TELEGRAM
HOLY SHIT. Razer has demoed Razer Project AVA, a 3D Hologram AI companion.
Dawg, it's a fucking AI HOLOGRAM DESKTOP WAIFU
Dawg, it's a fucking AI HOLOGRAM DESKTOP WAIFU
🤣84😎17🥰7😱6❤🔥3❤2🤓2👏1😢1
vx-underground
HOLY SHIT. Razer has demoed Razer Project AVA, a 3D Hologram AI companion. Dawg, it's a fucking AI HOLOGRAM DESKTOP WAIFU
Dawg, the split second I saw I could have that niche Japanese internet celebrity lady living in a fucking jar on my desk, I immediately pre-ordered this fucking thing
🤣77😁10❤7😢6👍2🔥2🥰2👏2