In the past month nerds have been complaining of a worm on Activision's MW2 (2009)
A shared sample shows a sideloaded 32bit dsound.dll with some silly strings. It hooks DirectSoundCreate8 and then begins to work
We have only briefly skimmed the file. We'll share the sample
A shared sample shows a sideloaded 32bit dsound.dll with some silly strings. It hooks DirectSoundCreate8 and then begins to work
We have only briefly skimmed the file. We'll share the sample
ðą38ð10âĪ7ðĪ3ðĪŊ1
The sample is available on the vx-underground website. It is located under /Tmp/
Hash: CB000ABED31B92B4F3F895A633EF0FFAF01A1BE0DFC73619ACF98C1605A5999D
Hash: CB000ABED31B92B4F3F895A633EF0FFAF01A1BE0DFC73619ACF98C1605A5999D
âĪ24ð6âĪâðĨ3ðĒ2
We're in the process of re-verifying our APT sample and paper collection while simultaneously renaming directory structures to improve legibility.
Behold! It is beautiful =D
Behold! It is beautiful =D
âĪ47ðĨ7ðĨ°3ðĪ2
CyberAv3ngers claim to has compromised Bazan Group, an oil refinery and petrochemicals company located in Haifa Bay, Israel.
âĪ107ðĪĢ37ðĨ25ðą10ðĪ6âĪâðĨ5ð4ðĒ3ðŦĄ3ð1
Benefits of joining the Infosec X (formerly Twitter) community
- Stay up to date with news
- Social network
- Become targeted by Threat Actors
- Establish & maintain bitter rivalries with people you'll never meet
- Stay up to date with news
- Social network
- Become targeted by Threat Actors
- Establish & maintain bitter rivalries with people you'll never meet
ðĪĢ118ðĨ°8ð7ðĪŠ6ðĨ4ð2ð1ðĪ1ðŊ1
We've updated the vx-underground Windows malware paper collection
-2012-02-14 - Stack Necromancy - Defeating Debuggers By Raising the Dead
-2019-06-19 - Combining Direct System Calls & sRDI
-2020-06-20 - Hiding Process Memory via Anti-Forensic Techniques
https://www.vx-underground.org/
-2012-02-14 - Stack Necromancy - Defeating Debuggers By Raising the Dead
-2019-06-19 - Combining Direct System Calls & sRDI
-2020-06-20 - Hiding Process Memory via Anti-Forensic Techniques
https://www.vx-underground.org/
ð15ð5
This media is not supported in your browser
VIEW IN TELEGRAM
vx-underground was created May, 2019. The Twitter was created August, 2019.
It has been 4 long years and we still get asked "what's the password?"
It has been 4 long years and we still get asked "what's the password?"
ðĪĢ86ðĪŠ10ðĪ6ð5ðą5âĪ4ð1ðĪŊ1
Media is too big
VIEW IN TELEGRAM
Black Mass Volume II is near completion.
It will be available for free on vx-underground or purchase as a physical copy on Amazon.
ðķqueue the party music ðķ
It will be available for free on vx-underground or purchase as a physical copy on Amazon.
ðķqueue the party music ðķ
âĪ58ðĨ14ðĪ6ðĪĢ4ð3ðĪĐ2ð1
This isn't even a meme, the Mayor seriously says they've reached a settlement with the Threat Actor
https://montclairlocal.news/cyber-attack-on-montclair-township-led-to-450k-settlement/
https://montclairlocal.news/cyber-attack-on-montclair-township-led-to-450k-settlement/
Montclair Local
Cyber Attack on Montclair Township Led to $450K Settlement
The Garden State Joint Insurance Fund made the deal as law enforcement began investigations into possible criminal charges
ðĪĢ61ðĪŊ11ð4ð4âĪ3ð2ð1ðĒ1ðŦĄ1
If cybercrime didn't exist this entire industry would implode into itself like a dying sun.
ð93ð23âĪ10ðĪĢ7âĪâðĨ6ðĪ6ðŦĄ6ð1ð1
We've updated the vx-underground malware paper collection
- VBA resolving exports in runtime without NtQueryInformationProcess or GetProcAddress
- Escalating Privileges via Third-Party Windows Installers
- Using WebAPK Technology for Phishing Attacks
https://www.vx-underground.org
- VBA resolving exports in runtime without NtQueryInformationProcess or GetProcAddress
- Escalating Privileges via Third-Party Windows Installers
- Using WebAPK Technology for Phishing Attacks
https://www.vx-underground.org
âĪ33ðĪŠ4ð3ð2