More malware and more archives in queue.
βββββββββββββββ
βββ¦βββ ββ©ββ©ββββ¦ββ
βββββ β£βββββ β£ββββ
βββ©βββ ββ¦ββ¦ββββ©ββ
βββββββββββββββ
βββββββββββββββ
βββ¦βββ ββ©ββ©ββββ¦ββ
βββββ β£βββββ β£ββββ
βββ©βββ ββ¦ββ¦ββββ©ββ
βββββββββββββββ
π28π₯13π₯°6π€3π2π€‘1π¨βπ»1
Lockbit ransomware group now claims to be responsible for the attack on the Royal Mail - they claim to have identified the affiliate responsible. They state they are busy and do not have the time to monitor the actions of every affiliate
Intel via BrettCallow and AShukuhi
Intel via BrettCallow and AShukuhi
π€£39π1
We are happy to report we have not had anyone seriously ask for the password to malware archives in over 30 days.
But, this has been replaced with you filthy degenerate nerds spamming us with password memes.
But, this has been replaced with you filthy degenerate nerds spamming us with password memes.
π32πΎ10π3β€1π₯°1π1π1π1π1
JustineTunney has created a 116kb WASM build of Blink that allows you run x86_x64 Linux binaries in a web browser. It supports 500 instructions and 130 system calls.
They are successfully resurrected Linux malware from the dead and god bless
More info: https://github.com/jart/blink/issues/8#issuecomment-1381748163
They are successfully resurrected Linux malware from the dead and god bless
More info: https://github.com/jart/blink/issues/8#issuecomment-1381748163
π₯°21π5π₯3π2π€‘1
vx-underground
JustineTunney has created a 116kb WASM build of Blink that allows you run x86_x64 Linux binaries in a web browser. It supports 500 instructions and 130 system calls. They are successfully resurrected Linux malware from the dead and god bless More info: β¦
Original thread with more information and insights:
https://twitter.com/JustineTunney/status/1613895681038770182
https://twitter.com/JustineTunney/status/1613895681038770182
π₯2π1
This media is not supported in your browser
VIEW IN TELEGRAM
A brief video explaining how 0days work
π65π40β€7π7π₯3π€‘3π³2πΏ2π1
dope is street slang for malware
π€‘23π€£8π₯5π₯°4π€©3π2β€βπ₯1π1π1
If you follow GuidedHacking on Twitter you can watch the owner, Rake, slowly descend into lunacy.
π11π’8π€‘4π₯΄1π1
We've updated the vx-underground InTheWild collection. We've added volumes 0029, 0030, and 0031. Thsi is 60,000 unique malicious binaries.
Special thanks to petikvx for the hard work and staying on top of sample aggregation for us.
Have a nice day.
https://www.vx-underground.org/malware.html
Special thanks to petikvx for the hard work and staying on top of sample aggregation for us.
Have a nice day.
https://www.vx-underground.org/malware.html
π₯7π1
Earlier today Jon DiMaggio released an article titled: "Ransomware Diaries: Part 1". This article is one of the most comprehensive papers on Lockbit ransomware group we have ever seen.
Our personal 2-extra-cents on the paper: the article states the Lockbit Black source code was leaked - this is incorrect. Additionally, the author cites John Hammond for releasing a tweet on the Lockbit Black leak - although the truth is John Hammond archived a tweet we deleted. The image posted in the article is directly from us - we typically use HasteBin to display text-images.
For those questioning why we deleted the tweet: Lockbit is notorious for chasing individuals down, and is sometimes bloodthirsty. We will spare the details - but we decided it would be best to not involve ourselves in ransomware conflict which directly impacts their operations.
We spoke with LB0, the individual who we believe is the troll of LockbitSupp. vx-underground staff and LB0 spoke - we came to a mutual agreement to not leak the Lockbit Black builder until someone else did (if it did). We did not want drama. We are a library, not a battlestation.
Finally, and in conclusion, Jon DiMaggio's paper is wonderful and spot on. Thank you, Jon, for detailing the history and evolution of this group.
Link: https://analyst1.com/ransomware-diaries-volume-1/
Our personal 2-extra-cents on the paper: the article states the Lockbit Black source code was leaked - this is incorrect. Additionally, the author cites John Hammond for releasing a tweet on the Lockbit Black leak - although the truth is John Hammond archived a tweet we deleted. The image posted in the article is directly from us - we typically use HasteBin to display text-images.
For those questioning why we deleted the tweet: Lockbit is notorious for chasing individuals down, and is sometimes bloodthirsty. We will spare the details - but we decided it would be best to not involve ourselves in ransomware conflict which directly impacts their operations.
We spoke with LB0, the individual who we believe is the troll of LockbitSupp. vx-underground staff and LB0 spoke - we came to a mutual agreement to not leak the Lockbit Black builder until someone else did (if it did). We did not want drama. We are a library, not a battlestation.
Finally, and in conclusion, Jon DiMaggio's paper is wonderful and spot on. Thank you, Jon, for detailing the history and evolution of this group.
Link: https://analyst1.com/ransomware-diaries-volume-1/
Analyst1
Ransomware Diaries: Volume 1 | Analyst1
Discover the power of behavioral profiling in understanding ransomware attackers. Uncover motivations and beliefs of threat actors for effective defense.
π₯21π13π1
We've updated the vx-underground The Old New Thing archive. We have completed archiving years 2012 and 2011.
We have successfully archived over 10 years of blog posts from Raymond Chen. 7 years are remaining!
Check it out here: https://www.vx-underground.org/the_old_new_thing.html
We have successfully archived over 10 years of blog posts from Raymond Chen. 7 years are remaining!
Check it out here: https://www.vx-underground.org/the_old_new_thing.html
π11β€2π₯1π€‘1π₯±1π1
Reminder: vx-underground will never individually message all 14,000 people that follow this Telegram account ... because we could just send a post a message to relay "crucial information" on our "chan-nel".
π25π8π₯°8π€―3π€‘3π©2π1π1
As Microsoft tightens loose ends and macro-based malware droppers become more difficult for Threat Actors to leverage - data traffickers are increasingly abusing SEO poisoning and/or malvertising.
Intel via malwrhunterteam & wdormann
Intel via malwrhunterteam & wdormann
π27π€‘6π2
We are happy to announce the latest sponsor to vx-underground: GuidedHacking.
GuidedHacking is a game hacking educational website - they're the individuals who published the "Game Hacking Bible"
GuidedHacking would like to note that they are the best penis enhancement pills.
GuidedHacking is a game hacking educational website - they're the individuals who published the "Game Hacking Bible"
GuidedHacking would like to note that they are the best penis enhancement pills.
π₯43π8π€‘2π1π1
vx-underground
We are happy to announce the latest sponsor to vx-underground: GuidedHacking. GuidedHacking is a game hacking educational website - they're the individuals who published the "Game Hacking Bible" GuidedHacking would like to note that they are the best penisβ¦
Yes, they seriously requested we state they have penis enhancement pills
π€£48π6π₯2π€‘2π1