October 17th - Ukrainian Cyber Alliance takes down Trigona ransomware group, taking down servers and seizing wallets.
October 19th - EUROPOL takes down RagnarLocker ransomware group
Image 1 & 2: Ukrainian Cyber Alliance
Image 3: Ragnar Locker
October 19th - EUROPOL takes down RagnarLocker ransomware group
Image 1 & 2: Ukrainian Cyber Alliance
Image 3: Ragnar Locker
π57π15π’11π€£8π«‘8β€7π―3π€2
vx-underground
This is Maksim Yakubets. Feel old yet?
It appears people do not know (or remember) Maksim Yakubets.
Yakubets is a member of Evil Corp. He is behind Zeus, Dridex, and suspected to have ties to ransomware groups.
He married an FSB officers daughter and owns a Lamborghini with the license plate "Thief".
Yakubets is a member of Evil Corp. He is behind Zeus, Dridex, and suspected to have ties to ransomware groups.
He married an FSB officers daughter and owns a Lamborghini with the license plate "Thief".
π€£121π«‘21β€11π8π₯7β€βπ₯3π€3π2π1
We have a reverse engineering challenge for you nerds.
In Black Mass Vol. 3, scheduled for October, 2024, we will unveil "Matryoshka". Matryoshka is a strange malware proof-of-concept. We would like you to reverse engineer it to tell us how you think it works.
* Matryoshka only works on Windows 10 or above
* proof-of-concept is not malicious
* you're free to reverse engineer it by any means necessary: static, dynamic, sandbox, making your friend do it, whatever.
* malware proof-of-concept is NOT packed
* Matryoshka does not possess any anti-debug or anti-VM functionality
* source code and full explanation of code will be released in Black Mass Vol. 3
* best write up goes in Black Mass Vol. 3 to show the defensive aspect to Matryoshka!
* binary is being shared in .7z with a super 1337 password!!!!11
inb4 someone reverse engineers it in totality in 2 minutes because they've seen "Kob*".
Matryoshka download: https://samples.vx-underground.org/root/Samples/Matryoshka.7z
In Black Mass Vol. 3, scheduled for October, 2024, we will unveil "Matryoshka". Matryoshka is a strange malware proof-of-concept. We would like you to reverse engineer it to tell us how you think it works.
* Matryoshka only works on Windows 10 or above
* proof-of-concept is not malicious
* you're free to reverse engineer it by any means necessary: static, dynamic, sandbox, making your friend do it, whatever.
* malware proof-of-concept is NOT packed
* Matryoshka does not possess any anti-debug or anti-VM functionality
* source code and full explanation of code will be released in Black Mass Vol. 3
* best write up goes in Black Mass Vol. 3 to show the defensive aspect to Matryoshka!
* binary is being shared in .7z with a super 1337 password!!!!11
inb4 someone reverse engineers it in totality in 2 minutes because they've seen "Kob*".
Matryoshka download: https://samples.vx-underground.org/root/Samples/Matryoshka.7z
π47β€βπ₯21β€10π«‘10π€£6π€5π―1
Yeah, Okta's support system was compromised. Yeah, they had access for over 2 weeks. Yeah, the Threat Actor(s) probably went through some pretty sensitive stuff...
But they offer SSO at $2/user, so it's not really that big of a deal, right?
But they offer SSO at $2/user, so it's not really that big of a deal, right?
π€£57π8π4π«‘2β€βπ₯1π€1π1
vx-underground
Yeah, Okta's support system was compromised. Yeah, they had access for over 2 weeks. Yeah, the Threat Actor(s) probably went through some pretty sensitive stuff... But they offer SSO at $2/user, so it's not really that big of a deal, right?
Yeah, Okta wasn't aware of the breach until a customer alerted them to a potential compromise.
But they offer MFA at $3/user, so it's not a big deal, right?
But they offer MFA at $3/user, so it's not a big deal, right?
π€£88π5β€2π1π€1π1
We are aware our Twitter ransomware bot is still offline.
We do not know where the individual maintaining it went. We last spoke with them approx. 2 months ago. They disappeared without a trace.
We do not know where the individual maintaining it went. We last spoke with them approx. 2 months ago. They disappeared without a trace.
π±61π«‘38π€£13π€7π3π1
Uhaul was breached. 13GBs of data was exfiltrated from their SharePoint. Initial access was granted by social engineering an employee through text messages.
tl;dr another day in Shangri-La
tl;dr another day in Shangri-La
β€32π―14π6π±5π3π€£2
CloudFlare did a blog yesterday about how the company they use (Okta) was breached (again) and how the Threat Actor tried to pivot into their network (again) and how they mitigated it (again).
The blog gives recommendations to Okta ππ
https://blog.cloudflare.com/how-cloudflare-mitigated-yet-another-okta-compromise/
The blog gives recommendations to Okta ππ
https://blog.cloudflare.com/how-cloudflare-mitigated-yet-another-okta-compromise/
The Cloudflare Blog
How Cloudflare mitigated yet another Okta compromise
On Wednesday, October 18, 2023, we discovered attacks on our system that we were able to trace back to Okta. We have verified that no Cloudflare customer information or systems were impacted by this event because of our rapid response.
π€£68β€6π6β€βπ₯2
Luckily, even though their stock fell 11%, they're saving money. They laid off their entire internal Red Team in March because ???
Who needs internal security audits anyway???
Who needs internal security audits anyway???
π€£120π±6π«‘5π3π’2β€1
Coding malware is good for you.
- Teaches you low level programming concepts
- Helps get a better understanding of computer security
- Can help improve reverse engineering skills
- Improves focus, attention to detail, critical thinking skills
- Teaches you low level programming concepts
- Helps get a better understanding of computer security
- Can help improve reverse engineering skills
- Improves focus, attention to detail, critical thinking skills
β€152π―30π16π6π6π€5
Not everyone who codes malware is a bad person. Is every person who admires the engineering behind weapons a dangerous person? No.
Also, the engineering behind the AK47 is badass.
https://youtu.be/_eQLFVpOYm4
Also, the engineering behind the AK47 is badass.
https://youtu.be/_eQLFVpOYm4
YouTube
How an AK-47 Works
A 3D animation created in Cinema 4D and After Effects showing how an AK-47 rifle works. Corona renderer was used in order to create realistic materials and reflections.
Get a miniature AK-47 replica! https://amzn.to/43Mz2AI
Interested in licensing my animationβ¦
Get a miniature AK-47 replica! https://amzn.to/43Mz2AI
Interested in licensing my animationβ¦
β€75π―18π9π€£7π€3π2π€2π’1
Seeing non-technical people seriously discussing malware will tempt you into diving face first into a woodchipper
π₯78π€£40π9β€βπ₯6π’5π3π―3