vx-underground
47.6K subscribers
4.11K photos
439 videos
84 files
1.49K links
The largest collection of malware source, samples, and papers on the internet.

Password: infected

https://vx-underground.org/
Download Telegram
Very cool, thanks for the shirt SpecterOps =D
❀‍πŸ”₯60😒7πŸ‘5❀3😁1
T-Mobile has been breached (again). Data has been exfiltrated and it is being shared online (again).

This is T-Mobile's 8th breach since 2018.

This is the 3rd breach this year.

This breach is 90GB of exfiltrated employee PII.
🀣112πŸŽ‰9🫑9πŸ€”6😒4πŸ‘3❀1
This man did 1 pushup every time T-Mobile was Breached. Look at him now!
🀣219🫑14πŸ”₯9😁5
Hello, prepare yourself for another long post about the new T-Mobile breach and a mistake that we made.

Mistake: Employee PII was leaked, NOT customer PII. This is the 2nd time a T-Mobile breach has exposed T-Mobile employees.

We've had a large number of people asking how we knew about the T-Mobile breach and, is is tradition, we knew because the people responsible for it (leaking) notified us. However, it is already being discussed on forums.Unlike previous times we're given information prior to it's "official" media announcement, we can do more than "trust me, bro".

The breach was performed by an individual named "Doubl". The information was leaked by an individual named "Emo".

Oh, and hi Emo :)

The T-Mobile breached occurred in April, 2023. Data from the breach was not shared until September 21, 2023 (today, as of this writing). This breach occurred shortly after the 2nd breach of this year, which occurred in March, 2023. We do not know why it took the Threat Actor(s) several months to leak the data, we can only speculate, so we will not =D

The leak was shared on the infamous BreachForum, information from the database is publicly available and is already being disseminated throughout Telegram and Discord.

The information from the leak is very large and we would not be able to sufficiently detail everything leaked in text because it is multiple databases. See attached image for a list of all data leaked.

Image 1. Data from the leak. It is censored to protect employees.

Image 2. List of database rows leaked
πŸ‘48πŸ’―6πŸ”₯4❀1🫑1
It's the year 2050, Neurolink is a mainstream success.

Nerds use Flipper Zero to make you poop your pants while sleeping
🀣211πŸ‘10❀7πŸ€”5πŸ™5😱3❀‍πŸ”₯2πŸ‘1
Poopy pants ransomware group (PP for short)
πŸ€ͺ96🀣25😁10❀7πŸ€”4πŸ‘2❀‍πŸ”₯1πŸ‘1
Today BleepinComputer reached out to T-Mobile regarding the allegations of them being compromised.

T-Mobile informed them that it was NOT T-Mobile corporate that was compromised, rather it was a T-Mobile franchise. This breach was disclosed in court May 10th, 2023. The data was not leaked until yesterday.

Luckily, this only impacted 17,835 past and current employees

https://www.jdsupra.com/legalnews/amtel-llc-dba-connectivity-source-3147197/
πŸ€ͺ38🀣18πŸ‘5
This media is not supported in your browser
VIEW IN TELEGRAM
When the security analysts and network administrators detect unusual activity on the network
🀣114😁28❀6πŸ€ͺ5🫑3πŸ‘2
The T-Mobile ConnectivitySource retailer breach contains 146,109 audio recordings of customers calling stores. The retailer is present in 38 states.
🀯58🀣11😁9😱5🫑3πŸ‘2😒1πŸ€ͺ1
We listened to over 500 recordings. Highlights include:

- Employee calls in sick on their first day on the job
- Someone got the job! (Congrats Ms. Sneed)
- Old people who are extremely confused and refer to cell phones as 'towers'.
- People who are not sure if they're even talking to T-Mobile (???)
- A woman telling the store her Dad's house burned down (and laughs about it?)
- A guy who did not get the job and asks why very, very, very aggressively
😁122🀣29😱16πŸ‘6πŸ”₯6❀4🫑2😒1
We're almost done with migration.

Thank god. Seriously. It took 2 christmas miracles to get this thing where it is now
πŸŽ‰84πŸ‘15πŸ₯°6❀‍πŸ”₯5🀯1
vx-underground is a dangerous website. When visiting the website it is advised you wear a full hazmat suit. If that is not an option, a construction hard hat will suffice.

Thanks,
😁100🫑31🀣14πŸ‘8❀5😱5πŸ’―2🀩1😍1πŸ€ͺ1
Hello,

We've had a few people reach out to us regarding to Black Mass Volume I & II. Yes, the PDFs are intentionally left publicly available on the website. The e-book is free, the physical copies are available on Amazon.

Nobody leaked them on Discord.

Have a nice weekend:)
❀‍πŸ”₯60🀣41πŸ‘9πŸ‘5πŸ€ͺ4😁2πŸŽ‰2🫑2😱1
❀70πŸ‘9🫑8❀‍πŸ”₯4πŸ₯°1πŸ‘1😱1
Today Basssterlord, a member of National Hazard Agency (a subgroup of Lockbit ransomware group) deleted his Twitter profile.

He requested that we note that it was not due to harassment or law enforcement.

He said they're very busy and now is not a good time to meme onlineπŸ˜‚πŸ˜‚

He was spending too much time memeing and shit posting πŸ˜‚πŸ˜‚πŸ˜‚
🀣119🫑18πŸ‘7😱2
It's always important to practice computer hygiene. We recommend washing your computer daily with soap and warm water.

This can help prevent viruses and bacterial infections!
🀣158🫑22πŸ€ͺ17πŸ‘8😁5❀4😱2😒2
Because nerds keep asking us about alleged Sony ransomware incident

tl;dr Threat Actors did not deploy ransomware, no corporate data was stolen, services not impacted. Data was exfiltrated from Jenkins, SVN, SonarQube, and Creator Cloud Development. They're extorting Sony
❀29🀣25πŸ‘8πŸ€”4🫑2
cl0p ransomware group has ransomed SickKids, one of the largest pediatric healthcare facilities in the world.

They've exfiltrated 13 years of data related to fertility, pregnancy, and healthcare information on children (including newborns).

https://techcrunch.com/2023/09/25/decade-of-newborn-child-registry-data-stolen-in-moveit-mass-hack/
😒108πŸ€”10πŸ”₯6😁4❀2πŸ‘2
Interesting side note: In 2022 this facility was ransomed by Lockbit ransomware group. Subsequently Lockbit ransomware group administrative staff apologized (for the first time) and gave the decryption key for free (for the first time).

Let's hope cl0p does the same.
πŸ‘71πŸ₯°8πŸ€”8πŸ‘6
vx-underground
cl0p ransomware group has ransomed SickKids, one of the largest pediatric healthcare facilities in the world. They've exfiltrated 13 years of data related to fertility, pregnancy, and healthcare information on children (including newborns). https://tech…
Hello, apologies - we believe this post lacks clarity.

They did not ransom* SickKids, as in deploy ransomware, we meant they're extorting SickKids because they exfiltrated sensitive data.

To be the best of our knowledge no ransomware payload was deployed.
🫑53πŸ‘5❀4