vx-underground
47.6K subscribers
4.11K photos
439 videos
84 files
1.49K links
The largest collection of malware source, samples, and papers on the internet.

Password: infected

https://vx-underground.org/
Download Telegram
Spam campaigns are advanced AI.
🫑34πŸ€ͺ17🀣4❀2😁1
🀯59😁8❀3😘2
The recently released Binance court documents are absolutely insane

tl;dr acknowledge terrorists use it to launder money, openly forge reports, indifferent to cyber crime

You can read the full document here: https://downloads.coindesk.com/legal/cftc_v_binance.pdf
🀯27πŸ”₯8😱8πŸ€ͺ5❀3πŸ₯°2πŸ‘1🀣1
The infamous ransomware affiliate Bassterlord has announced his retirement. He states he will now live like a normal person. He informs Lockbit ransomware group administration he will be passing his work to his trainees - a subgroup within Lockbit known as National Hazard Agency
🫑56❀14πŸ‘3πŸ™3
April 2023 will be a big month.

- New merch store managed by corg_e
- New malware database custom made via guessthepw
- Black Mass Vol 2. book will be released
πŸ”₯21❀4
Following the arrest of Pompompurin we have seen dozens, upon dozens, of forums appear attempting to fill the void Breached has left

ViceForum
DarkForum
KKKSecForum
ZeroForum
DataForum
😁66🀣49πŸ€”7❀4πŸ€ͺ4πŸ‘1πŸ₯°1πŸ‘1πŸ’―1
Earlier today CrowdStrike reported a supply chain attack targeting the 3CX Voice Over Internet Protocol (VOIP) Windows desktop client.

- 600,000 companies use it
- 12,000,000 users
- Sophos has identified a MacOS variant infected
- Currently attributed to Lazarus Group
🀯16❀4πŸ‘4πŸ€”3🫑3πŸ₯°1
Prior to CrowdStrike's report - customers went to the 3CX forums expressing concerns that EDRs were reporting suspicious activity. EDRs from CrowdStrike, ESET, PaloAltoNtwks, and SentinelOne flagged the binary. 3CX said they were wrong.

Images via malwrhunterteam
🀣20πŸ€”5πŸ‘2πŸ€ͺ2❀1
SentinelOne has released an in-depth analysis of the malware and payload, they have dubbed it 'SmoothOperator'. The final payload exfiltrates data from web browsers Chrome, Edge, Brave, and Firefox.

tl;dr largest data theft in history?

https://www.sentinelone.com/blog/smoothoperator-ongoing-campaign-trojanizes-3cx-software-in-software-supply-chain-attack/
🀯20πŸ€ͺ3
We have malware samples from the recent 3CX VOIP supply chain attack.

- SmoothOperator.7z
- 48.1MB compressed
- Samples from CrowdStrike and SentinelOne reports

You can download the malware samples here: https://share.vx-underground.org/
πŸ”₯27πŸ₯°4πŸ‘2
Very cool, thanks for supporting vx-underground, LeBron James
🀣45πŸ€ͺ19πŸ”₯10😁4πŸ€”3❀2🀯1😘1
The 3CX CEO stated that the supply chain attack that occured wasn't their fault, rather it was the result of an upstream vendor being compromised, suggesting FFmpeg, because this is where the malware payload resides

FFmpeg denies this because they don't release compiled binaries
😁49🀯9🀣7πŸ€”1
During the SolarWinds supply chain attack, the CEO blamed the intern. Now, a CEO must blame the free and open source library.
πŸ€ͺ27πŸ’―19😁13