vx-underground
Amazon announced starting in 2025 all workers will be expected to be back in the office. Amazon employees jumped with joy knowing they will now have to wake up earlier, commute, waste time and money on travel, spend less time with their families, and dealβ¦
wE oFfEr fReE cOFFee
Amazon employees are making six figures. Free coffee is 100% not a make-or-break situation. Half these nerds are probably burning money on Uber Eats because they don't even want to walk to the kitchen
Amazon employees are making six figures. Free coffee is 100% not a make-or-break situation. Half these nerds are probably burning money on Uber Eats because they don't even want to walk to the kitchen
π96π€£56π―8β€4π4π€1
"Everyone has to return to office. I only made $29,300,000 last year. How am I going to afford my new yacht on this salary?" β Andy Jassy, CEO of Amazon
π€£152π«‘18π―17π’6β€2β€βπ₯2π€2π1π1
we're gone for half a day and now people are turning pagers into bombs wtf
π91π₯35π€£31π’12π€―6β€5π±2π1π1π«‘1π1
We don't know much about pagers, or explosives.
But what we do know a little about is malware and we can promise you there is not some 1337 technique that magically transforms a regular battery into an incendiary device.
tl;dr modified pagers, science or something
But what we do know a little about is malware and we can promise you there is not some 1337 technique that magically transforms a regular battery into an incendiary device.
tl;dr modified pagers, science or something
β€63π€19π11π2π’2π₯1π1
vx-underground
We don't know much about pagers, or explosives. But what we do know a little about is malware and we can promise you there is not some 1337 technique that magically transforms a regular battery into an incendiary device. tl;dr modified pagers, science orβ¦
tl;dr tl;dr this guy fuckin' nailed it and we believe him to be an expert figure on hardware hacking and big brain sciency magic stuff
https://x.com/_MG_/status/1836086734171574446
https://x.com/_MG_/status/1836086734171574446
X (formerly Twitter)
MG (@_MG_) on X
The exploding Hezbollah pagers situation is an incredibly impressive supply chain attack by Israel (most likely). I am sure more details will come, but there are already some educated guesses to be made that narrow it down.
π§΅1/n
π§΅1/n
β€47π7π€4
MG - Pagers.pdf
424.4 KB
We've learned some of you don't have Xitter, or the ability to see the post, so here it is as a PDF so you don't have to do stuff.
β€124π13π€―12π4π―4π€©3π3π’1π«‘1
We spotted someone in California with the license plate "MALWRE".
We left a sticker on your driver side window
We left a sticker on your driver side window
β€195π€26π₯°17π€―10π€£10π4π3π€©2π’1π«‘1
vx-underground
Oh. My. God. The possibilities for initial access malware just went through the roof.
Actually, maybe not. Microsoft has upped the ante. It's all over.
We didn't anticipate Microsoft actually caring π
We didn't anticipate Microsoft actually caring π
β€88π’52π19π₯°6π€2π€£2π1π1
we're gone for 30 minutes and now people are turning walkie talkies into bombs wtf
π€―117π€£69π₯14π’10π6π6π4π±2π2β€1
Lockbit ransomware group claims to have ransomed eFile dot com.
eFile dot com IS NOT the IRS eFile system. eFile dot com is an IRS authorized entity approved for submitting financial documents to the IRS.
eFile dot com IS NOT the IRS eFile system. eFile dot com is an IRS authorized entity approved for submitting financial documents to the IRS.
π€£96π±12π€7π₯6π3β€βπ₯2π’1π1π―1
we're gone for 2 hours and now people are turning butt plugs into bombs wtf
Just kidding, that didn't happen. That'd be crazy though.
Just kidding, that didn't happen. That'd be crazy though.
π113π€£76π±11β€5π€4π€4π₯2π1π1π€1
Just another day on Twitter
Photos via ZachXBT
Photos via ZachXBT
π€£151π«‘20π9β€6π±3π’2π1
Crazy Thursday.
- Dr. Web, the Russian antivirus company, disclosed a breach. Dr. Web stopped sending antivirus updates September 16th. Subsequently, Dr. Web reportedly disconnected their servers from their internal network while they investigated the suspected compromise. Dr. Web reports to have resolved the issue and has returned to normal day-to-day operations. No Threat Actor has been attributed to the compromise. They believe the compromise occurred on or around September 14th.
- Yesterday, or sometime before, GitHub users were targeted in mass by a large scale phishing and/or malware campaign. An unknown Threat Actor(s) pushed their Lumma Stealer campaign by leaving bogus issues on GitHub projects. When the project owner visited the issue, the issue linked to a domain titled 'GitHub-Scanner'. GitHub-Scanner requested the visitor prove their humanity (e.g. not a robot) by doing Windows + R and CTRL + V + ENTER. When the site is visited, the website copies malicious code to the users clipboard. Windows + R, opening Windows Run, and CTRL + V, pasting the malicious code to the Run window and ENTER would run the code, this would trick the user into executing their malware payload. Once the payload is executed, it downloads a file called 'IE6.exe'. IE6.exe is Lumma information stealer. While it is a clever trick, the Threat Actor(s) (intentionally, or unintentionally) did not account for users who are not running Windows. This caused confusion for non-Windows users, or users on mobile devices.
- Dr. Web, the Russian antivirus company, disclosed a breach. Dr. Web stopped sending antivirus updates September 16th. Subsequently, Dr. Web reportedly disconnected their servers from their internal network while they investigated the suspected compromise. Dr. Web reports to have resolved the issue and has returned to normal day-to-day operations. No Threat Actor has been attributed to the compromise. They believe the compromise occurred on or around September 14th.
- Yesterday, or sometime before, GitHub users were targeted in mass by a large scale phishing and/or malware campaign. An unknown Threat Actor(s) pushed their Lumma Stealer campaign by leaving bogus issues on GitHub projects. When the project owner visited the issue, the issue linked to a domain titled 'GitHub-Scanner'. GitHub-Scanner requested the visitor prove their humanity (e.g. not a robot) by doing Windows + R and CTRL + V + ENTER. When the site is visited, the website copies malicious code to the users clipboard. Windows + R, opening Windows Run, and CTRL + V, pasting the malicious code to the Run window and ENTER would run the code, this would trick the user into executing their malware payload. Once the payload is executed, it downloads a file called 'IE6.exe'. IE6.exe is Lumma information stealer. While it is a clever trick, the Threat Actor(s) (intentionally, or unintentionally) did not account for users who are not running Windows. This caused confusion for non-Windows users, or users on mobile devices.
π€£121π€―20π17β€4β€βπ₯3π’1
vx-underground
Crazy Thursday. - Dr. Web, the Russian antivirus company, disclosed a breach. Dr. Web stopped sending antivirus updates September 16th. Subsequently, Dr. Web reportedly disconnected their servers from their internal network while they investigated the suspectedβ¦
Oh and pagers and walkie talkies exploding. This does not fall into the realm of malware, or news we would typically discuss, but there is a high volume of people who believe this to be malware.
It's not malware. They snuck explosives into the devices.
Have a nice day.
It's not malware. They snuck explosives into the devices.
Have a nice day.
β€90π16π6π€6π4β€βπ₯3π2π’1π―1