vx-underground
47.6K subscribers
4.11K photos
438 videos
84 files
1.49K links
The largest collection of malware source, samples, and papers on the internet.

Password: infected

https://vx-underground.org/
Download Telegram
Imagine if vx-underground made a LinkedIn profile. Imagine all the poor innocent normies we would scare by sharing information on the rampant cybercrime and posting pseudo satanic images
🥰48😁138🤪5🤣4💯1
In the year 2023 you have both Whitehat and Blackhat training courses.

SANS Training Course: $4,000 - $9,000
Bassterlord (National Hazard Agency) Course: $10,000

*Bassterlord is a known Lockbit affiliate
🤣45👍54🫡3😁1
The reviews are nuts.

"This book helped me ransom a SpaceX contractor"
🤣53🫡8❤‍🔥2👍2😱2😁1🤔1
The quest to locate the vx-underground password is a worldwide phenomena
🤪47🤣26😁5👍1🤔1
Spam campaigns are advanced AI.
🫡34🤪17🤣42😁1
🤯59😁83😘2
The recently released Binance court documents are absolutely insane

tl;dr acknowledge terrorists use it to launder money, openly forge reports, indifferent to cyber crime

You can read the full document here: https://downloads.coindesk.com/legal/cftc_v_binance.pdf
🤯27🔥8😱8🤪53🥰2👍1🤣1
The infamous ransomware affiliate Bassterlord has announced his retirement. He states he will now live like a normal person. He informs Lockbit ransomware group administration he will be passing his work to his trainees - a subgroup within Lockbit known as National Hazard Agency
🫡5614👍3🙏3
April 2023 will be a big month.

- New merch store managed by corg_e
- New malware database custom made via guessthepw
- Black Mass Vol 2. book will be released
🔥214
Following the arrest of Pompompurin we have seen dozens, upon dozens, of forums appear attempting to fill the void Breached has left

ViceForum
DarkForum
KKKSecForum
ZeroForum
DataForum
😁66🤣49🤔74🤪4👍1🥰1👏1💯1
Earlier today CrowdStrike reported a supply chain attack targeting the 3CX Voice Over Internet Protocol (VOIP) Windows desktop client.

- 600,000 companies use it
- 12,000,000 users
- Sophos has identified a MacOS variant infected
- Currently attributed to Lazarus Group
🤯164👍4🤔3🫡3🥰1
Prior to CrowdStrike's report - customers went to the 3CX forums expressing concerns that EDRs were reporting suspicious activity. EDRs from CrowdStrike, ESET, PaloAltoNtwks, and SentinelOne flagged the binary. 3CX said they were wrong.

Images via malwrhunterteam
🤣20🤔5👍2🤪21
SentinelOne has released an in-depth analysis of the malware and payload, they have dubbed it 'SmoothOperator'. The final payload exfiltrates data from web browsers Chrome, Edge, Brave, and Firefox.

tl;dr largest data theft in history?

https://www.sentinelone.com/blog/smoothoperator-ongoing-campaign-trojanizes-3cx-software-in-software-supply-chain-attack/
🤯20🤪3
We have malware samples from the recent 3CX VOIP supply chain attack.

- SmoothOperator.7z
- 48.1MB compressed
- Samples from CrowdStrike and SentinelOne reports

You can download the malware samples here: https://share.vx-underground.org/
🔥27🥰4👍2