Windows has 3 different types of boolean values.
typedef int BOOL
typedef BYTE BOOLEAN
typedef short VARIANT_BOOL
*BYTE is defined as an unsigned char
When setting VARIANT_BOOL you cannot use TRUE or FALSE. You need to use VARIANT_TRUE or VARIANT_FALSE
Have a nice day.
typedef int BOOL
typedef BYTE BOOLEAN
typedef short VARIANT_BOOL
*BYTE is defined as an unsigned char
When setting VARIANT_BOOL you cannot use TRUE or FALSE. You need to use VARIANT_TRUE or VARIANT_FALSE
Have a nice day.
π€88π€£25π₯13π€―11β€10π8π«‘8π±6π’5π€3π2
Another 116,024 malware samples queued and ready for upload into the VXDB π«‘
*Our VXDB is free for everyone to use
*You can download and search samples
*Bulk download coming (eventually)
https://virus.exchange
*Our VXDB is free for everyone to use
*You can download and search samples
*Bulk download coming (eventually)
https://virus.exchange
π26β€12π3π₯°2π«‘2
We were just informed that a member of vx-underground lost two family members in Maine yesterday. A cousin and a nephew were the victims of a very sick person.
We will be inactive for the next couple of days.
We will be inactive for the next couple of days.
π’369π«‘71β€48π30π±7π5π€£5π3π€2π€―2π1
Yesterday Lockbit ransomware group listed Boeing on their victims list. Boeing is a multinational American company with an estimated annual revenue of $66,610,000,000. They have over 150,000 employees worldwide. Boeing serves both the public and private sector.
We spoke with Lockbit ransomware group administrative staff yesterday regarding Boeing. They informed us that they have not yet spoke with a representative from Boeing and they will not disclose any information to us about Boeing - more specifically they would not give us insights into how long they had access to Boeing, how much data was exfiltrated, what kind of data was stolen, etc.
Lockbit stated their ransomware affiliate got access using a 0day exploit. However, Lockbit would not elaborate further on this exploit hence we cannot verify the legitimacy of these claims.
It is also probably worth noting that most victims listed by Lockbit are given 10 days (or more) to begin negotiations. Lockbit gave Boeing less than 6 days
We spoke with Lockbit ransomware group administrative staff yesterday regarding Boeing. They informed us that they have not yet spoke with a representative from Boeing and they will not disclose any information to us about Boeing - more specifically they would not give us insights into how long they had access to Boeing, how much data was exfiltrated, what kind of data was stolen, etc.
Lockbit stated their ransomware affiliate got access using a 0day exploit. However, Lockbit would not elaborate further on this exploit hence we cannot verify the legitimacy of these claims.
It is also probably worth noting that most victims listed by Lockbit are given 10 days (or more) to begin negotiations. Lockbit gave Boeing less than 6 days
π₯75π±19π9π7β€2π1π―1π€£1π1
We received our latest paycheck from Twitter. It is a mind boggling $39.36.
We do not believe this is sufficient enough to donate to a non-profit. Instead we will use this to giveaway 3 copies of Black Mass Volume II.
We will share information on this giveaway later.
We do not believe this is sufficient enough to donate to a non-profit. Instead we will use this to giveaway 3 copies of Black Mass Volume II.
We will share information on this giveaway later.
β€80π₯16π6π±4π€4π4π€3
This media is not supported in your browser
VIEW IN TELEGRAM
ZachXBT, an independent cryptocurrency investigator who monitors and tracks cryptocurrency scams, received a video from a group of scammers. They got full bottle service last night, somewhere in Canada, and held a sign taunting him with "ZachXBT is watching".
π81π€£69β€βπ₯8π€―5β€4π4π’2π€1π±1π1
This media is not supported in your browser
VIEW IN TELEGRAM
Around July, 2023 an individual operating under the alias "Blue" and "Trout", successfully phished someone and stole $213,000 from the victim.
They subsequently paid a group of men to dance and thank the victim for the money.
They subsequently paid a group of men to dance and thank the victim for the money.
π€£201π15π11π’11β€5π₯5
Christmas is coming early for Android malware fans.
π€50π7β€βπ₯3π3π±3π«‘3
This media is not supported in your browser
VIEW IN TELEGRAM
Sim swappers and crypto drainers seem to dislike ZachXBT. We received an anonymous message today with this video.
π€£133π―23β€6π4π€4π€2π1
We've updated the vx-underground malware source code collection on GitHub.
Yesterday the source code to banking trojans Android.Hook and Android.Ermac were leaked online.
*Hook is the successor to Ermac
*Thanks to 3xp0rtblog for the code
https://github.com/vxunderground/MalwareSourceCode
Yesterday the source code to banking trojans Android.Hook and Android.Ermac were leaked online.
*Hook is the successor to Ermac
*Thanks to 3xp0rtblog for the code
https://github.com/vxunderground/MalwareSourceCode
GitHub
GitHub - vxunderground/MalwareSourceCode: Collection of malware source code for a variety of platforms in an array of differentβ¦
Collection of malware source code for a variety of platforms in an array of different programming languages. - vxunderground/MalwareSourceCode
π20π₯°9π₯8β€3
This media is not supported in your browser
VIEW IN TELEGRAM
ZachXBT, an independent cryptocurrency investigator who monitors and tracks cryptocurrency scams, shared ANOTHER video of cryptocurrency thieves taunting him.
The sign says "Fuck ZachXBT. Chards"
That's 3 videos now π
The sign says "Fuck ZachXBT. Chards"
That's 3 videos now π
π79π€£42β€24π10π’8π±3π―3π€2
This media is not supported in your browser
VIEW IN TELEGRAM
"Who is 29a labs?"
π€32π’16π€£5π«‘5β€3