vx-underground
47.5K subscribers
4.1K photos
438 videos
84 files
1.48K links
The largest collection of malware source, samples, and papers on the internet.

Password: infected

https://vx-underground.org/
Download Telegram
Last time on Dragon Ball Z: Paragon employees accidentally unveiled the GRAPHITE spyware panel to the world when taking selfies for LinkedIn.

GRAPHITE is spyware sold to governments to perform espionage on targets.

Paragon has officially commented on the matter by stating the OPSEC mistake was a "tiny price to pay, in relation to the contribution of female empowerment".

Paragon, what the fuck are you talking about???
🀣177❀14πŸ₯°5😁2😒2
vx-underground
Last time on Dragon Ball Z: Paragon employees accidentally unveiled the GRAPHITE spyware panel to the world when taking selfies for LinkedIn. GRAPHITE is spyware sold to governments to perform espionage on targets. Paragon has officially commented on the…
Dawg, you're selling fucking spyware to governments to spy on people who criticize the government or oppose them. What the fuck does female empowerment have to do with this? What the fuck kind of virtue signaling misdirection bullshit is this
❀93🀣68πŸ’―28πŸ₯°5πŸ‘1🀩1
Chat, my hair is thinning super bad on top. It's all over for me. In as soon as 10 years I will look like this:
❀87🫑42πŸŽ‰32🀣21πŸ”₯8❀‍πŸ”₯4😍4πŸ€“3😒2πŸ₯°1
The Windows COM (Component Object Model) at first glance seems like a nightmare, primarily because it's so poorly documented, but once you get the hang of it, it makes complete sense.

Once you get the hang of it you see all the possibilities for malware or evasion. It's a rich environment with tons of super cool and unexplored concepts. You feel like an archeologist exploring the decaying insides of the Windows Operating System.

Another problem, in my opinion, is Windows does such a piss poor job explaining how it works. They provide these massive fuck off documents, but most of it is noise and will rarely apply to what you're actually wanting or needing.

Overall I give the Windows COM three (3) cat pictures because it's such a cool technology. However, I will subtract three (3) cat pictures because newer components of Windows irritate me.
❀70🫑10πŸ‘7🀣7😒3πŸ₯°1
> be me
> snuggling with baby boy
> best feeling in world
> happy to be a Dad
> fall asleep
> sort of wake up
> feel baby boy wiggling
> "haha hes getting comfy"
> feel pressure on my eyes
> wtf
> move head a little
> feel pressure on eyes
> wake up
> open eyes
> baby boy staring straight into my soul
> hes breathing heavy
> trying to shove his little fingers in my eye sockets
> wtf.exe
> "what are you doing???"
> he laughs
> puts his fingers up my nose
> move head
> he laughs
> he leans in
> bites my face
> ????
❀151😁35🀣32πŸ₯°10❀‍πŸ”₯3😒2πŸ’―1
I read about OpenClaw.

I still don't understand the purpose. Can someone seriously explain to me the purpose of this AI assistant? I reviewed the different "skills" it offers and it makes literally zero sense.

This can be used to automate ... messages to other people? Like on Slack, or Discord, or Telegram? Check the weather? Do stuff with Stripe? I don't understand the purpose.

Why would I need something to automatically deal with instant messaging clients? Am I missing something? Even if you don't NEED it, why would you WANT it?

I DON'T UNDERSTAND
😁82πŸ’―48🀣8❀4🀝3πŸ‘2πŸ€”2πŸ‘1πŸ₯°1
vx-underground
I read about OpenClaw. I still don't understand the purpose. Can someone seriously explain to me the purpose of this AI assistant? I reviewed the different "skills" it offers and it makes literally zero sense. This can be used to automate ... messages to…
I'm not being rhetorical and I'm not trying to be critical. I see so many people discussing it and hyping it up. I've skimmed the documentation, reviewed some of the skills, but ... it JUST DOESN'T MAKE SENSE TO ME

I'm sitting here like, "why do I need an AI agent to respond to people on Discord or Slack or Telegram for me? What if it makes a mistake? What if someone abuses it?"

I don't understand the purpose and I don't place arbitrary trust into AI stuff. I'm not even being a hater, I can't wrap my head around this thing conceptually.
πŸ’―97🀝13πŸ‘7❀6🫑6πŸ₯°4😁3πŸ”₯2πŸ‘1
Mark Zuckerberg a/k/a shape shifting lizard man, has patented spooky internet ghost technology. Amazing.

By training off your data, AI can emulate your existence on social media after you've died.

Ever miss Grandmas schizo racist posts? Your heroin addict cousin getting into arguments with family members because he owes them money? Want to be constantly reminded of your friend tragic death?

With Meta spooky internet ghost technology this is possible! Yay!
πŸ₯°80🀣56❀10πŸŽ‰6❀‍πŸ”₯5πŸ”₯5😱5😁3😒2
If Palantir was actually compromised DarkWebInformer or S0ufi4n3 would be shouting from the roof tops. They'd tell everyone.

They'd dig up the corpse of Queen Elizabeth II and scream in the skeletons face Palantir has been compromised.
🀣62😁16❀6πŸ₯°2😱1😒1
Okay, so Kim Dotcom made a post online saying he has information about Palantir being compromised.

I am extremely skeptical of these claims.

My initial post escaped my core audience (as is tradition) so I am going to be a little more verbose and explain stuff.

Compromising a large institution such as Palantir is not something some random guy down the street can do. Palantir is large and has many moving parts. In other words, Palantir does not store all of it's information on one computer and in a crusty old hard drive somewhere.

Palantir (presumably) has data segregated meaning not all data is one place. Different types of data is going to be stored in different locations (in the cloud, or physically on-premise). Hence, a compromise of Palantir which would unveil ALL DATA would require two things:

- Extreme skill
- Extreme patience

This sort of compromise is not something that happens in a day. This sort of compromise is something which would take weeks, months, or maybe even years depending on the objective. Historically, when large compromises toward large institutions occur it is almost exclusively performed by state-sponsored Threat Groups (hackers funded by governments), or in some more rare scenarios, financially motivated Threat Actors (ransomware, extortionists).

If Palantir was compromised, it would be EXTREMELY unusual for a state-sponsored group or financially motivated group to make it exclusive to one individual person. Rarely do state-sponsored Threat Groups notify influencers, or journalists, ... or anyone really of their objectives. They're funded by governments. Governments do not care about clout. IF a state-sponsored group does notify someone, they typically do mass e-mails to journalists (for misinformation, disinformation, or fearmongering, some sort of strategic objective, they don't do it to look cool).

If it was performed by a financially motivated Threat Group they will almost immediately discuss it online in their domain of choice. For example, many Threat Actors who compromise places may sell access on forums such as Exploit, TierOne, or Breached (or whatever is adjacent to Breached). Alternatively, ransomware groups post about it on their personal website to try to extort or intimidate victims. However, no discussion of Palantir has appeared in any of these places.

Okay... so no signs from financially motivated Threat Actors... and it would be really unusual for a state-sponsored Threat Actor to make it exclusive to one person... is there anything else weird about this? Yes.

If Palantir was compromised it would be unusual for ANY group of Threat Actors to notify anyone immediately after a compromise. By notifying Kim Dotcom, or whoever, they're sounding the metaphorical alarm. Palantir is going to immediately order a DFIR (Digital Forensics and Incident Response) and begin an internal audit. Things are going to be locked down. If someone compromised Palantir why would they burn access so quickly? Why would they notify someone so quickly? They're leaving an audit trail.

There is a lot of speculation, little evidence, and things not really making a whole lot of sense.

Is it possible Kim Dotcom is telling the truth? Yes.
Is it likely? No.

Is it possible Kim Dotcom THINKS it's real, but it's NOT real? Yes, that is more likely to be true. It would not surprise me if he is (intentionally, or unintentionally) participating in a misinformation campaign.

Pic unrelated
πŸ‘62πŸ₯°9πŸ€”8❀5πŸ’―4πŸ”₯1
Before my son was born my wife and I read all these books and stuff on babies. We also took these fancy classes.

Literally none of them told us the baby would try to headbutt.

THEIR HEADS HURT. THEY HEADBUTT YOUR FACE
πŸ₯°86😁31❀12🀯7❀‍πŸ”₯4πŸ’―2πŸ‘1πŸ”₯1
Meanwhile on X, I volunteered to run TorGuard VPNs social media. They're a big donor to vx-underground.

In one day I got in trouble. I made a joke we're laying off the engineering department and apparently it's not cool to joke about laying people off
😁172❀28🀣20😒10🀯7πŸ™4πŸ₯°2❀‍πŸ”₯1😱1
> be me
> long day at long day factory
> decide to relax
> open x
> it's the everything app
> click "For You"
> first post
> trans person crying
> say they're burden on family
> say they're being kicked out
> point camera at three bottles of pills
> open all bottles
> take all pills at once
> record their suicide
> x, the everything app
😒169😁33🀣31😱10🀯8❀6πŸŽ‰6πŸ₯°4πŸ’―2😎2πŸ€”1
FLARE released a paper on a Linux botnet using IRC as a C2.

WHAT YEAR IS IT???

Then I remembered Threat Actors can't use Discord as a C2 because they probably want ID verification
😁71🀣50πŸ₯°8❀6πŸ”₯3
I'm currently:
- writing over 500,000,000 lines of code a day
- running 400 different agents
- building 9 different apps

My wife and her boyfriend are so proud of me. What's your excuse?
🀣177πŸ₯°18πŸ€“15🫑8😁5❀3😱1😎1
When people ask what I do for a living I have no idea how to explain to them I collect, develop, and reverse engineer malware.

I usually say, "I do stuff with computers".

Then I immediately change the conversation and hide.
πŸ€“66πŸ₯°23❀7🀣3πŸ‘2😎2
Apparently this account is large enough now where this is important news to people

Yes, people actually received this on Xitter
🀣128πŸ₯°17❀7😁7πŸ”₯4πŸ‘1😒1πŸŽ‰1😍1
Media is too big
VIEW IN TELEGRAM
🀣39πŸ₯°14❀5❀‍πŸ”₯4πŸ€“2
Was surfing the internet and found some kid who is sharing his malware proof-of-concepts online. His work is primarily recycling and recreating existing techniques for him to study or to demonstrate the ideas to others.

Is his code good? No, God no. It is littered with errors, poor naming conventions, and extremely dangerous control flow. I love it him for this, unironically.

This kid having bad code shows he isn't using AI to work. He is legit. He is putting himself out there, demonstrating what he can do (or can't do), and showing he isn't afraid to get criticized.

I love seeing people grind and put in the work. It's the pain that makes you good. Taking shortcuts doesn't achieve anything.

I don't know if it he is on social media stuff, but you're doing good stuff, "CaptMag". Keep putting in work. You'll go far. I see you, gang.
❀115πŸ₯°8πŸ‘6❀‍πŸ”₯3πŸ‘3