vx-underground
45.4K subscribers
3.9K photos
413 videos
83 files
1.42K links
The largest collection of malware source, samples, and papers on the internet.

Password: infected

https://vx-underground.org/
Download Telegram
vx-underground
A group of Threat Actors operating under the moniker "FulcrumSec" claim to have compromised an electronics manufacturer named Avnet Fulcrum contacted me regarding the compromise. Under normal circumstances I'd probably ignore the e-mail, or look into the…
It literally says in the e-mail pictured they used ChatGPT to summarize the data. It says they used the stolen OpenAI key from Avnet

People messaging me like, "yo dat looks like chatgpt"
😁73🀣50πŸ”₯5❀4πŸ‘3πŸ€“3😒1
When you have enough computers you don't need a heater. It's like, 45f outside (7c) and my office is 75f (23c).
πŸ”₯64❀7πŸ₯°7😁5πŸ‘2😒1
🀣166❀10πŸ€“6πŸ‘4πŸ”₯2😁1😒1πŸ’―1😘1
Chat, we are cooked

Discord is being extorted by the people who compromised their Zendesk instance

They've got 1.5TB of age verification related photos. 2,185,151 photos

tl;dr 2.1m Discord users drivers license and/or passport might be leaked. Unknown number of e-mails
🀣222🀯21πŸ”₯13❀‍πŸ”₯10❀9😱5πŸ‘3πŸ‘2😁2😎2πŸŽ‰1
BREAKING

The United States Federal Bureau of Investigation has released new photographs of a recent arrest of an international wanted Threat Actor
😒120🀣55❀14πŸ€“8🀩2πŸ₯°1πŸ‘1😱1🫑1
Yesterday I briefly spoke with the Threat Actor(s) responsible for compromising Discord's Zendesk.

They said they were able to compromise Discord Zendesk by compromising a "BPO Agent" (outsourced support).

They never specified how they compromised them.
πŸ₯°42πŸ€”8❀7πŸŽ‰2πŸ‘1
vx-underground
Yesterday I briefly spoke with the Threat Actor(s) responsible for compromising Discord's Zendesk. They said they were able to compromise Discord Zendesk by compromising a "BPO Agent" (outsourced support). They never specified how they compromised them.
Of course, as is tradition, it is also entirely possible they're lying and they compromised their helpdesk system in some other way. It's not uncommon for Threat Actors to lie to obfuscate how they achieved access.

Interesting times
πŸ€”52πŸ€“11❀9πŸ’―5πŸ‘1😒1
Dawg, I'm trying to fucking work and I've got notifications about the Salesforce compromise, the RedHat compromise, the Discord compromise, this fucking Asuraisjfjsjfiw botnet fucking DDoS shit going on

Threat Actors, will you CHILL THE FUCK OUT. God damn
🀣94❀12πŸ₯°7😒2πŸ”₯1
vx-underground
Dawg, I'm trying to fucking work and I've got notifications about the Salesforce compromise, the RedHat compromise, the Discord compromise, this fucking Asuraisjfjsjfiw botnet fucking DDoS shit going on Threat Actors, will you CHILL THE FUCK OUT. God damn
I can't sit down for 2 seconds without some crazy shit happening the past few days. One of y'all's mfers needs to hit the pause button or something wtf bro

I'm on mobile, but if I had an angry cat picture readily available I'd post it
🀣62❀11πŸ’―7😒3πŸ₯°1
Thank you, Riverbank, for sending me an angry cat picture. But it's too late. No one gets a cat picture
😒104😱7πŸ€”3❀2
Bro, I've got people messaging me saying they're worried they're in the Discord leaks and if their photo and/or drivers license is leaked they're going to kill themselves because it'll out them for being gay, or it'll potentially expose them to stalkers again

Wtf
🀣102😒41😱10❀5πŸ’―3πŸ‘2😁2πŸ˜‡2πŸŽ‰1πŸ€“1
This Discord Zendesk compromise has gotten more silly.

Previously, the Threat Actors responsible for the Discord Zendesk compromise claimed they had gotten access by compromising a BPO (Business Process Outsource) employee.

They were not lying.

It turns out that in August the Threat Actors who compromised Discord began sending emails to Discord outsourced employees offering them money in exchange for access to Discords internals.

The people they emailed was a very small team located in Southeast Asia. This particular office only has a handful of employees assigned to working Discord helpdesk (including age verification). This team is assigned to primarily handle back log work. This team had a great deal of access and were believed to be "trusted".

One of the emails this small team received offered $500 compensation to prove they're a Discord BPO employee. They offered an additional "several thousand dollar" lump sum payment in exchange for giving them access.

The Discord BPO employees were told to ignore the emails. Unfortunately, it appears one of these BPO employees did not ignore the emails and accepted the bribe.

$500 in this Southeastern Asian country is an astronomical amount of money. The "several thousand dollar" lump sum payment would be enough for this person to live comfortably for several years in their country.
πŸ₯°66🫑20❀16🀣5😒4😁1πŸŽ‰1πŸ€“1
BreachedForum-dot-hn, the latest incarnation of Breached, has been seized by the United States Federal Bureau of Investigation.

It wasn't even alive for a month. God damn. FBI moving fast
πŸ”₯46🀣31😒12πŸ‘2❀1πŸ₯°1
vx-underground
This Discord Zendesk compromise has gotten more silly. Previously, the Threat Actors responsible for the Discord Zendesk compromise claimed they had gotten access by compromising a BPO (Business Process Outsource) employee. They were not lying. It turns…
It should be noted this is not the first time Insider Threats have damaged a company. Most notably, Coinbase had a problem with a BPO accepting bribes to get access to Coinbase internals.

Likewise, ransomware groups have historically looked for Insider Threats to get access
πŸ₯°31πŸ‘10❀2πŸŽ‰1
Chat, it's been another wonderful week of internet schizophrenia.

Will the Discord Zendesk nerds drop more data and cause more drama? What will happen to the BreachForum domain now that it's been seized? Will a new one appear? What the fuck happened to that RedHat data? How did the FBI seizure Breached so fast? Who is doing these massive DDoS attacks? How did the NCA UK arrest the pre school ransomware Threat Actors so fast? I had 12 tacos covered in hot sauce and my tummy hurts. Will I ever learn?

Find out next time on Dragon Ball Z
πŸ”₯78❀‍πŸ”₯5😁5🀣2❀1😒1
❀40πŸ₯°18🀣13😒2
Shuffle, the cryptocurrency based online casino, announced a security breach as a result of a 3rd party being compromised.

The 3rd party which was compromised is Fast Track. Fast Track is a CRM (Customer Relation Software) for managing things such as customer support tickets.

Shuffle has stated the 3rd party compromise has resulted in the exfiltration of the following data:
- Email
- Name (Full name not specified)
- Addresses (Unspecified in crypto address or physical)
- Transactions (Unspecified historical or specific)
- Bet data

This is eerily similar to the recent Discord Zendesk 3rd party compromise.
🀣66❀5πŸ”₯5πŸŽ‰2😒1
vx-underground
Shuffle, the cryptocurrency based online casino, announced a security breach as a result of a 3rd party being compromised. The 3rd party which was compromised is Fast Track. Fast Track is a CRM (Customer Relation Software) for managing things such as customer…
Dawg, if it comes out that this online casino was compromised as a result of an Insider Threat (bribery), I'm going to lose my mind
πŸ₯°52😁13❀4πŸ™2🀯1😒1
vx-underground
Whoa whoa whoa. Interesting update. Yesterday Discord silently updated their breach notification press release. They name dropped the BPO. Why? πŸ€” https://discord.com/press-releases/update-on-security-incident-involving-third-party-customer-service
Part of me wonders if since I posted the compromise was the result of a BPO they decided to release more details on it.

Or maybe it's completely unrelated and just a coincidence, but it was unveiled at the same time

Probably just a coincidence, but I like to hope
πŸ€”28πŸ€“8😎5πŸŽ‰1