vx-underground
45.4K subscribers
3.9K photos
413 videos
83 files
1.42K links
The largest collection of malware source, samples, and papers on the internet.

Password: infected

https://vx-underground.org/
Download Telegram
Two online casinos announced a compromise this week as a result of a 3rd party Customer Management Relationship software called Fast Track
πŸ€”44🀣42πŸ”₯2πŸ₯°2πŸ‘1😒1
Every second something is pirated

Because of this theft, groups like Metallica, or celebrities like Dwayne "The Rock" Johnson, may be unable to purchase their next series of mansions.

Dwayne "The Rock" Johnson only made $88,000,000 from the film "Red One". How will he survive?
😒90🀣58🀯8😱3❀2πŸ‘2πŸ’―1
vx-underground
Every second something is pirated Because of this theft, groups like Metallica, or celebrities like Dwayne "The Rock" Johnson, may be unable to purchase their next series of mansions. Dwayne "The Rock" Johnson only made $88,000,000 from the film "Red One".…
Dwayne "The Rock" Johnson only has 8 homes.

Look how you're forcing him to live by pirating his movies. He's basically homeless
🀣88πŸ”₯65😒25🀯7πŸ₯°3🫑3❀2πŸ’―2
I've made so many updates to vx-underground (while simultaneously schizo posting), it cannot fit in a single post without it looking like garbage.

Here is a PasteBin link with the latest updates from the past 10 days (it's a lot)

https://pastebin.com/raw/EsErG6uV
πŸ‘40❀18πŸ₯°6😒1
vx-underground
I've made so many updates to vx-underground (while simultaneously schizo posting), it cannot fit in a single post without it looking like garbage. Here is a PasteBin link with the latest updates from the past 10 days (it's a lot) https://pastebin.com/raw/EsErG6uV
In case you missed it, I'm aiming to collect every publicly released malware analysis paper (ever) and link it with the corresponding files listed in the paper. At my current pace it's going to take me about 3 years and 4 months to do everything from 2007 - present
🫑82❀23🀯8πŸ€“5πŸ‘4❀‍πŸ”₯3πŸ€”3😒1
πŸ”₯102🀣42😒28πŸ’―14❀10πŸŽ‰2
Orange,

I saw your email and I love it. This is great stuff. I'm probably not going to be on my computer for the rest of the day, but I'm super excited to share it tomorrow morning. I love you so much for this stuff.

Thanks,
- smelly
πŸ₯°38πŸ‘6❀4πŸ€“3😘2😒1
Loteria de Medellin (the Lottery of Medellin, Columbia) has allegedly been compromised by Crimson Collective

They claim over 1TB of data have been exfiltrated.

They've released samples of drivers licenses, applications, etc.

Insert Dragon Ball Z reference
πŸ₯°34πŸ”₯6❀‍πŸ”₯4πŸ‘4😒1🀩1
vx-underground
Loteria de Medellin (the Lottery of Medellin, Columbia) has allegedly been compromised by Crimson Collective They claim over 1TB of data have been exfiltrated. They've released samples of drivers licenses, applications, etc. Insert Dragon Ball Z reference
Fixed this. Initially I wrote Medellin, Spain

For some reason I confused Medellin, Columbia for Madrid, Spain

I've got a very high IQ, it's (falling) off the charts
🀣49πŸ₯°8πŸ€“5❀4😁2😘2😒1πŸ’―1
My Xitter For You tab was curated fairly well. It was a nice combination of cat pictures, information security news, and a sprinkle of politics

Today my For You is Steve Jobs daughter, big breasted women, and Twitch streamers

Wtf is this shit? Give me my cats back
🀣85😒16πŸ”₯12πŸ₯°6❀5πŸ˜‡2
Yeah, I'm killing myself tonight
🀣208😁15🀯10πŸ‘4πŸ₯°4😒4
vx-underground
Yeah, I'm killing myself tonight
Tldr guy says telling someone how much RAM you have is a security issue. Fucking ridiculous.
😁87🀣66❀6πŸ”₯4πŸ€”3😒2
Chat, we are so back.

"Orange" leaked the Islamic Revolutionary Guard Corps (IRGC) malware source code for "BellaCiao". BellaCiao has been discussed by various Cyber Threat Intelligence agencies.

This includes "Variant 1", "Variant 2", and documentation on how it works
❀50🀯7πŸ’―7😒2πŸ‘1😎1
I'm not a forensics expert. I couldn't forensic my way out of a forensics thing.

However, this cyber weapon thingy leaked from the Iranian government has a program debug file thingy and it contains a debug file path

What could it mean?
πŸ₯°49😁18🀣18πŸ€”6😒2❀1πŸ€“1🫑1
vx-underground
I'm not a forensics expert. I couldn't forensic my way out of a forensics thing. However, this cyber weapon thingy leaked from the Iranian government has a program debug file thingy and it contains a debug file path What could it mean?
Myself personally, whenever I am performing a state-sponsored campaign to infiltrate a foreign adversary of the government in which I reside, I too name the directory structure after our primary target.

This makes it easier for me to remember who our Commander has instructed us to target. Furthermore, in the event of a compromise or whistleblower, analysts whom are employed by our foreign adversaries can easily identify our objectives and modus operandi
πŸ₯°45🀣26😁8❀‍πŸ”₯4❀1πŸ‘1
TIL "Bella Ciao" is an anti-Nazi and anti-fascist Italian folk song.

The Iranian government named their malware payload "Bella Ciao".
πŸ₯°91🀣47πŸ€“11❀7❀‍πŸ”₯6πŸ€”3πŸŽ‰2