vx-underground
47.6K subscribers
4.11K photos
438 videos
84 files
1.49K links
The largest collection of malware source, samples, and papers on the internet.

Password: infected

https://vx-underground.org/
Download Telegram
πŸ₯°73πŸ”₯22🀣14πŸ‘5😁5πŸ€”3❀‍πŸ”₯1🀩1🫑1
While everyone is focusing on the catastrophe of the MGM breach, it should be noted that it is business as usual for other ransomware groups.

Note: Publicly listed victims on ransomware websites indicate the victim did not pay and/or negotiations are still on-going.

- Cactus ransomware group was the most active this month (so far), with 30 new victims publicly displayed. Their victims are primarily agricultural and industrial organizations.

- ALPHV ransomware group claims 19 new victims in September. Besides MGM, they have claimed law firms, architecture and design companies, real estate companies, physicians offices, investment companies, and media analysis companies.

- Lockbit ransomware group claims 19 new victims as well. Lockbit ransomware group most notably targeted a non-profit hospital, a Behavioral health center for the mentally ill, 2 school distracts located within the United States, and law firm which represents American Veterans who need legal assistance.

- CryptBB, a new and emerging group, claimed 8 victims, most notably a school district in the United States.

- NoEscape claims to have compromised US-Canada water organization, the International Joint Commission, and threatens to leak sensitive government data.

- BianLain attacks Save the Children International, a 104 year old non-profit which aided children who were victims of WW2 nazi concentration camps (among many other incredible deeds).

- RansomedVC claims 30 new victims this month, primarily leveraging web exploitation and intimidation tactics.

Other active ransomware group activity this month: RagnarLocker, Threeam, CiphBit, Trigona, Knight, Akira, Monti, Stormous, Blacksuit, Play, RansomHouse, IncRansom, Lorenz, BlackByte, Qilin, RaGroup, Everest, Mallox, Medusa, Rhysida, 8base, Abyss.

In the month of September, 2023, there have been over 200 newly documented ransomware attacks. Again, this does not include victims who have paid.

The most notorious groups still remain on top: ALPHV and Lockbit. Both have existed (in some manner) since at least 2019.
πŸ‘22🫑10😒9❀6πŸ”₯5🀣5πŸ‘4🀯3πŸ’―3πŸ€”1
For Black Mass Volume II we spent an extra shiny penny, from our own pockets, to hire an artist who is an illustrator for Magic: The Gathering, Mythgard Tcg, Hit PointPress, Adi Shankar/Netflix, Legendary Games, and more.

Thanks to Wero Gallo Arias for the amazing work.
πŸ”₯100❀20πŸ‘6🫑5πŸ‘2😱2❀‍πŸ”₯1🀣1
We have passed 23,000 subscribers on Telegram.

Thank you for the love and support. ❀️

We look forward for continually serving you all with malware source code, samples, papers and our dumb memes.

Thanks,
❀‍πŸ”₯97❀30πŸ‘7πŸ’―6πŸ”₯5🫑4πŸŽ‰3πŸ€ͺ3😱1
Today Lockbit ransomware group issued a poll to all of their affiliates

Lockbit is considering implementing new rules for Lockbit affiliates due to their frustration with ransomware negotiators. Currently, Lockbit ransomware group has no rules in place for how much (or how little) affiliates can ransom a company for. They are considering "regulating" ransom demands

They state newer affiliates are giving large discounts to victim companies out of desperation for money, whereas more experienced affiliates do not cave to negotiator's proposed payment from the victims

National Hazard Agency, a subdivision of Lockbit ransomware group, has stated they will no longer accept payments below 3% of the companies annual revenue. They will immediately retaliate against any negotiator who approaches them with an offer of less than 3% of the companies revenue. The retaliation will be complete destruction of company data

Image 1. Original Lockbit poll
Image 2. Translated poll
Image 3. Message from National Hazard Agency
πŸ”₯42🀣14🫑8❀1πŸ‘1πŸ‘1😁1
Thank you to the person who sent us a lovely poem... from Greece's... Hellenic Army?

Image 1. Lovely poem
Image 2. Email headers
❀42😁3🫑3πŸ₯°1
Today it was reported an unidentified Threat Actor(s) compromised Mark Cuban - an American Billionaire, Investor and owner of the Dallas Mavericks. The Threat Actors stole approx. $870,000 worth of cryptocurrency.

More information here: https://www.dlnews.com/articles/people-culture/mark-cuban-loses-870k-to-a-crypto-scam/
🀣82😁5🫑4❀3😒1
In celebration of Black Mass Volume II's soon release, everything on the vx-underground merch store is 20% off.

Go to https://vx-underwear.org and use code BLACKMASS. The discount ends September 20th, 2023.
❀29πŸ‘3🫑3
How to make nerds rage
🀣167πŸ”₯14πŸ€”5😒5😁4🫑4πŸ‘3❀1
Hackers don't wear hoodies.

You may not like it, but this is what hackers actually look like.
❀‍πŸ”₯55😁26🀣25🫑12πŸ€ͺ9❀5πŸ‘5🀩2
ChatGPT is becoming so advanced it can now emulate being a jackass
🀣232🀯18😁15πŸ€”3πŸ‘2🫑2
After we complete our data migration vx-underground will have a new look again. Sponsors will be listed on top as soon as you view the website.

If any of you nerds complain, we will send you the monthly bills and ask you to pay staff member salaries.

So shut up, it's all free.
❀70πŸ‘9😁8❀‍πŸ”₯6πŸ€ͺ5🫑4πŸ€”2😱2😘2πŸ‘1
We have received our first Twitter payout. We received $285.63. We donated the full amount to WiCyS (Women in CyberSecurity).

We will continue to donate our monthly Twitter revenue to non-profits.

Have a nice day.
🀣136πŸ”₯57❀48πŸ€ͺ20πŸ‘19😒11πŸ‘6πŸŽ‰4πŸ€”2😁1
If you have any recommendations for non-profits, please send us an e-mail at staff@vx-underground.org.

We will be donating our Twitter revenue every 2 weeks.
❀45🫑22🀣10❀‍πŸ”₯1πŸ€”1😱1😒1
Today a Threat Actor named "USDoD" leaked sensitive data from TransUnion. This won't be the last of "USDoD" today though. He also compromised NATO. We'll discuss that later. But first, TransUnion.

The leaked database, over 3GB in size, contains highly sensitive PII on 58,505 people. The database appears to be compromised March 2nd, 2022. This leaked database has information on individuals all across the globe including the Americas (North and South), as well as Europe.

Leaked data includes:

- First name
- Last name
- Internal TransUnion identifiers
- Sex
- Passport information
- Place of Birth
- Date of Birth
- Civil Status (?)
- Age
- Their current employer
- Information on their employer
- Summary of financial transactions
- Credit Score
- Loans in their name
- Remaining balances on the loans
- Where they got the loan from,
- When TransUnion first began monitoring their information
😱60πŸ₯°11πŸ‘8🀣7🫑3❀2
For those wondering: Yes, this is the same "USDoD" listed on the Pompompurin indictment. They are believed to be behind many other high profile breaches.
πŸ‘32❀8🫑1