vx-underground
47.6K subscribers
4.11K photos
438 videos
84 files
1.49K links
The largest collection of malware source, samples, and papers on the internet.

Password: infected

https://vx-underground.org/
Download Telegram
Prior to CrowdStrike's report - customers went to the 3CX forums expressing concerns that EDRs were reporting suspicious activity. EDRs from CrowdStrike, ESET, PaloAltoNtwks, and SentinelOne flagged the binary. 3CX said they were wrong.

Images via malwrhunterteam
🀣20πŸ€”5πŸ‘2πŸ€ͺ2❀1
SentinelOne has released an in-depth analysis of the malware and payload, they have dubbed it 'SmoothOperator'. The final payload exfiltrates data from web browsers Chrome, Edge, Brave, and Firefox.

tl;dr largest data theft in history?

https://www.sentinelone.com/blog/smoothoperator-ongoing-campaign-trojanizes-3cx-software-in-software-supply-chain-attack/
🀯20πŸ€ͺ3
We have malware samples from the recent 3CX VOIP supply chain attack.

- SmoothOperator.7z
- 48.1MB compressed
- Samples from CrowdStrike and SentinelOne reports

You can download the malware samples here: https://share.vx-underground.org/
πŸ”₯27πŸ₯°4πŸ‘2
Very cool, thanks for supporting vx-underground, LeBron James
🀣45πŸ€ͺ19πŸ”₯10😁4πŸ€”3❀2🀯1😘1
The 3CX CEO stated that the supply chain attack that occured wasn't their fault, rather it was the result of an upstream vendor being compromised, suggesting FFmpeg, because this is where the malware payload resides

FFmpeg denies this because they don't release compiled binaries
😁49🀯9🀣7πŸ€”1
During the SolarWinds supply chain attack, the CEO blamed the intern. Now, a CEO must blame the free and open source library.
πŸ€ͺ27πŸ’―19😁13
BreachedForum users, 2023, colorized
😒95🀣33❀17πŸ™8πŸ‘4πŸ₯°1😁1πŸŽ‰1😍1
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ”₯60πŸ₯°8😍8πŸ’―6🀩5😁2❀‍πŸ”₯1
🚨 !!!!BREAKING!1!! 🚨

vx-underground, the infamous hacker forum and ransomware aktivist collective, has had their domain seized by EUROPOL

!!!!ALL PASSWORDS HAVE BEEN CHANGED!!!!
🀣165🫑17🀯16😁9πŸ€ͺ8😱6😒6πŸŽ‰6πŸ€”2πŸ’―2πŸ₯°1
If you or a person you know has been a victim of vx-underground, please contact Joe Biden
😁74🫑58🀣33πŸ‘5🀯5😱4πŸŽ‰4πŸ€ͺ3
Haha April Fool's.

We gotcha so good, you frickin nerds 😎
🀯67πŸ€ͺ19😘9🫑8πŸ₯°6😱5😁3πŸŽ‰3😒2πŸ™1πŸ’―1
Our website has been restored. The prank is over.

Please download malware.

https://www.vx-underground.org/
πŸ₯°39πŸ€ͺ14🀣9🫑7πŸ€”2❀1😱1
POV: you're a network administrator enforcing a password expiration policy. Every user on the network has successfully updated their password.

The password: Spring2023!
🀣86😁10πŸ‘4πŸŽ‰4
We've updated the vx-underground "The Old New Thing" archive from Raymond Chen for the month of March, 2023.

Check it out here: https://www.vx-underground.org/the_old_new_thing.html
πŸ‘20❀‍πŸ”₯4
An unknown individual has compromised the email system for Equifax. They have sent out an email with the subject matter as "Free Pompompurin".

Image 1. email extended header information
Image 2. email itself
😁47🫑30❀8🀣4πŸ‘2