vx-underground
47.6K subscribers
4.1K photos
438 videos
84 files
1.49K links
The largest collection of malware source, samples, and papers on the internet.

Password: infected

https://vx-underground.org/
Download Telegram
What's new with us? Well, we've got quite a bit of updates.

1. Our new VXDB is live, we are working on populating it with our entire malware sample collection. Once all malware samples are present we will allow verified individuals to share and/or upload samples to the VXDB. We are restricting access to verified individuals only so the database isn't filled with junk data. The database is, as we've said 1,000 times before, free for everyone to use. It currently has limitations, but it is an ongoing work and progress and it is 100% open source:)

2. Black Mass Volume II will be released this weekend (ideally). It was be available for sale on Amazon and free for download on vx-underground. The Amazon price will be as cheap as possible to ensure people all across the world, regardless of income, can purchase a physical if they'd like. Additionally, upon release we will be giving away over 40 copies of Black Mass Volume II for free! More details on that later.

3. vx-underground is being re-vamped (again). We are migrating away from Alibaba and moving to Wasabi. Alibaba was being ... a pain ... they do not play nice while migrating. We've had to make several local copies and now we are in the process of migrating to Wasabi. Once the migration is complete vx-underground will receive a new front-end (again). The new front-end will be written in Elixir, automatically update with new additions, and allow website visitors to scrape the site easier. Yes, we are going WAY out of our way to make sure you nerds can scrape it.

4. Yes, we will eventually sell physical copies of vx-underground on SATA harddrives. This is something we are currently researching to ensure we do not bankrupt ourselves trying to do this. Be patient.

5. We are doing another giveaway. Soon we will be giving away subscriptions to MULLVAD VPN for nerds who care about their privacy, or something.

6. Finally, as is tradition, we have tons of new papers and samples to add. However, we cannot do this until step 3 is complete.

This is all thanks to our monthly supporters and sponsors. Thank you for the love and support.

Have a nice day (or evening).
โค83๐Ÿ‘12๐Ÿ”ฅ5๐Ÿคช2
Another day, another series of e-mails from compromised government e-mail addresses.

Thank you for the messages Will and USDoD. They have been received.
โค59๐Ÿคช12๐Ÿ‘7๐ŸŽ‰6๐Ÿคฃ4๐Ÿ˜ฑ2๐Ÿ”ฅ1
Very cool. Thank you Bitdefender and TrustedSec for the kind words when speaking with Forbes. However, we would like to note vx-underground is a collective of several people - it is not a single person.

(TrustedSec knows this, maybe Mr. Hammerstone made an oopsie doopsie)
โค90๐Ÿ˜23๐Ÿ’ฏ8๐Ÿซก5๐ŸŽ‰4๐Ÿ‘1
Haha just kidding, vx-underground is just 1 person... kind of...
๐Ÿ˜89๐Ÿซก16๐Ÿค”13๐Ÿคฃ10โค8๐Ÿ˜ฑ4๐Ÿคฏ3๐Ÿ˜3โคโ€๐Ÿ”ฅ2๐Ÿ‘1
Security researcher Gi7w0rm accidentally got access to the International Space Stations urine recycling system.

He was able to identify when astronauts used the restroom (based on urine percentage increasing) and when it was processing urine (urine percentage decreasing).
๐Ÿคฃ164๐Ÿ˜9๐Ÿค”8๐Ÿ‘7โค4๐Ÿซก4๐Ÿคช4๐Ÿ‘3๐Ÿคฏ1
Note: Per the insights from a space nerd, SWGlassPit, this is publicly available telemetry originally released for a now defunct project known as ISS live.

tl;dr ISS lets you monitor pee-pee and poo-poo? We had no idea =D

Real-time monitoring is here: https://iss-mimic.github.io/Mimic/
๐Ÿ˜36๐Ÿคฏ11๐Ÿ‘6๐Ÿซก5๐Ÿคช3
We have pioneered a new method for extending WiFi technologies (we stole it actually). Our methodology uses aerodynamic engineering, or whatever fancy word works here. Please see the attached image which demonstrates our technology. We believe this was revolutionize WiFi.
๐Ÿ”ฅ100๐Ÿคฃ70๐Ÿ˜15๐Ÿ˜ฑ7๐Ÿค”6๐Ÿ’ฏ6โค5๐Ÿ™5๐Ÿ‘2
The past 72 hours we have added 221,319 new malware samples to the VXDB. We only have 15,778,681 samples remaining. ๐Ÿซก

Reminder that the VXDB is free for anyone to use. Oh, and it's open source.

https://virus.exchange

Have a nice day.
โค47๐Ÿซก22๐Ÿ‘1
When Scattered Spider compromised MGM they tried to modify code for the slot machines to make them spit out money ๐Ÿ˜‚๐Ÿ˜‚

These nerds are going full Ocean's Eleven
๐Ÿคฃ72๐Ÿ”ฅ10โค5๐Ÿ˜4๐Ÿ’ฏ2๐Ÿค”1
Do wE kNoW iF CaEsArS wAs HaCkeD?!

Yes, they were compromised around the exact same time as MGM and access to Caesar's was compromised using the exact same technique that was used against MGM.

Read the U.S. Securities and Exchange Commission report, nerds.
๐Ÿ‘27๐Ÿคฃ21โค5๐Ÿคฏ4
While we're busy uploading data to the VXDB, and migrating data to our new host, feel free to add one of our members on Rocket League.

In homage to Wazawaka's wild antics, the Rocket League account is: "MIKHAIL MATVEEV"
๐Ÿคฃ76๐Ÿ˜5๐Ÿซก4โคโ€๐Ÿ”ฅ2๐Ÿ‘1
Hello,

We are aware ALPHV ransomware group criticized us for spreading misinformation. They incorrectly attributed us to the Financial Times article about ALPHV affiliates attempting to tamper with slot machines

We will speak with ALPHV and resolve the issue.

Thanks,
๐Ÿ‘40๐Ÿซก23๐Ÿคช13โค1๐Ÿ˜ข1
Thank you to the ALPHV ransomware group administrative staff for correcting their blog post and correcting the misattribution to us.

We wholeheartedly appreciate.
๐Ÿ‘50โค10๐Ÿซก9๐Ÿ‘2๐ŸŽ‰1
This media is not supported in your browser
VIEW IN TELEGRAM
U+4VeZwaR37JIofFHKafYTXVXQhP278yfarcWWRwZlI=
๐Ÿค”74๐Ÿคช17๐Ÿ”ฅ12๐Ÿ˜ข3๐Ÿซก3๐Ÿ‘2๐Ÿ˜ฑ2๐Ÿคฏ1
๐Ÿฅฐ73๐Ÿ”ฅ22๐Ÿคฃ14๐Ÿ‘5๐Ÿ˜5๐Ÿค”3โคโ€๐Ÿ”ฅ1๐Ÿคฉ1๐Ÿซก1
While everyone is focusing on the catastrophe of the MGM breach, it should be noted that it is business as usual for other ransomware groups.

Note: Publicly listed victims on ransomware websites indicate the victim did not pay and/or negotiations are still on-going.

- Cactus ransomware group was the most active this month (so far), with 30 new victims publicly displayed. Their victims are primarily agricultural and industrial organizations.

- ALPHV ransomware group claims 19 new victims in September. Besides MGM, they have claimed law firms, architecture and design companies, real estate companies, physicians offices, investment companies, and media analysis companies.

- Lockbit ransomware group claims 19 new victims as well. Lockbit ransomware group most notably targeted a non-profit hospital, a Behavioral health center for the mentally ill, 2 school distracts located within the United States, and law firm which represents American Veterans who need legal assistance.

- CryptBB, a new and emerging group, claimed 8 victims, most notably a school district in the United States.

- NoEscape claims to have compromised US-Canada water organization, the International Joint Commission, and threatens to leak sensitive government data.

- BianLain attacks Save the Children International, a 104 year old non-profit which aided children who were victims of WW2 nazi concentration camps (among many other incredible deeds).

- RansomedVC claims 30 new victims this month, primarily leveraging web exploitation and intimidation tactics.

Other active ransomware group activity this month: RagnarLocker, Threeam, CiphBit, Trigona, Knight, Akira, Monti, Stormous, Blacksuit, Play, RansomHouse, IncRansom, Lorenz, BlackByte, Qilin, RaGroup, Everest, Mallox, Medusa, Rhysida, 8base, Abyss.

In the month of September, 2023, there have been over 200 newly documented ransomware attacks. Again, this does not include victims who have paid.

The most notorious groups still remain on top: ALPHV and Lockbit. Both have existed (in some manner) since at least 2019.
๐Ÿ‘22๐Ÿซก10๐Ÿ˜ข9โค6๐Ÿ”ฅ5๐Ÿคฃ5๐Ÿ‘4๐Ÿคฏ3๐Ÿ’ฏ3๐Ÿค”1
For Black Mass Volume II we spent an extra shiny penny, from our own pockets, to hire an artist who is an illustrator for Magic: The Gathering, Mythgard Tcg, Hit PointPress, Adi Shankar/Netflix, Legendary Games, and more.

Thanks to Wero Gallo Arias for the amazing work.
๐Ÿ”ฅ100โค20๐Ÿ‘6๐Ÿซก5๐Ÿ‘2๐Ÿ˜ฑ2โคโ€๐Ÿ”ฅ1๐Ÿคฃ1