vx-underground
cl0p ransomware group has listed 231 new victims on their blog. These are companies that have not paid. These companies ransomed are the result of the MoveIT exploit. Out of the 231 ransomed organizations, 21 are schools located in the United States. Statsβ¦
Oops. We need to make a slight correction to this post.
231 companies have been impacted by cl0p post-MoveIT exploit*.
These 231 companies are either posted on the cl0p site OR have publicly disclosed a breach via cl0p*
Not all 231 are confirmed to be as a result of MoveIT*
231 companies have been impacted by cl0p post-MoveIT exploit*.
These 231 companies are either posted on the cl0p site OR have publicly disclosed a breach via cl0p*
Not all 231 are confirmed to be as a result of MoveIT*
π18β€5π’1
We've updated the vx-underground malware collection. Virusshare00474 is now available for download.
- 38,786 unique malicious binaries
- All named using Kaspersky naming convention
- 13.42GB (compressed)
Have a nice day.
https://www.vx-underground.org
- 38,786 unique malicious binaries
- All named using Kaspersky naming convention
- 13.42GB (compressed)
Have a nice day.
https://www.vx-underground.org
π₯29β€7π6π―2β€βπ₯1π’1π«‘1
Inspired by our friend SPTHvx, let's review a collection of malware author interviews from the 80s, 90s, and 2000s.
In these interviews, the interviewer asked "what do you think the future of malware looks like?".
Let's open a time capsule on a Saturday night =D
In these interviews, the interviewer asked "what do you think the future of malware looks like?".
Let's open a time capsule on a Saturday night =D
π€£30π₯10β€4π2
We've updated the vx-underground archive. We've collected every article from 'Defense in Depth, the Microsoft way' by Stefan Kanthak.
Enjoy the rest of your weekend.
https://www.vx-underground.org/
Enjoy the rest of your weekend.
https://www.vx-underground.org/
β€40π₯9π4π4π€ͺ1