vx-underground
45.8K subscribers
3.93K photos
419 videos
83 files
1.43K links
The largest collection of malware source, samples, and papers on the internet.

Password: infected

https://vx-underground.org/
Download Telegram
Channel photo updated
Several days ago Riot Games announced they were victim to a "social engineering attack". They stated they were being extorted for $10,000,000. Riot Games refused to pay the ransom

The source code to League of Legends is now up for sale online
๐Ÿคช50๐Ÿ‘5๐Ÿ‘3๐Ÿ˜ˆ2
We are currently speaking with the individual responsible for the breach on Riot Games.

They have informed us they have also stole Riot Games anti-cheat, Packman. Packman is the anti-cheat for both Valorant and League of Legends.
๐Ÿ”ฅ65๐Ÿ˜5๐Ÿคฃ5๐Ÿ‘3๐Ÿ˜ˆ2โค1
The individual responsible for the Riot Games breach has given us more information

- Social engineered an employee via SMS
- Initial goal was stealing Vanguard
- They pivoted through the network, was unable to get Domain Controller
- SOC detected them in approx. 36 hours
๐Ÿ’…37๐Ÿ‘9๐Ÿ˜ˆ6
vx-underground
The individual responsible for the Riot Games breach has given us more information - Social engineered an employee via SMS - Initial goal was stealing Vanguard - They pivoted through the network, was unable to get Domain Controller - SOC detected them inโ€ฆ
- They did not deploy any malware to the network
- Managed to escalate privileges by social engineering a company director
- They stated they would not give us more information at this time, more information will be shared in the following days

There is your free DFIR report
โค41๐Ÿ‘6๐Ÿ’‹4๐Ÿ‘2โšก1๐Ÿ˜ˆ1
Last update for the Riot Games breach. Here is the file directory listing of (some) of the exfiltrated data.

Goodnight (or good morning to some of you).
๐Ÿ”ฅ30๐Ÿ‘9๐Ÿ†3๐Ÿ˜ˆ1
This media is not supported in your browser
VIEW IN TELEGRAM
Threat Intelligence the second a significant breach occurs
๐Ÿคฃ65๐Ÿคก8๐Ÿ˜ˆ3๐Ÿ˜2๐Ÿ‘1
Microsoft has announced it intends on modernizing Windows Explorer

This is a preview image that has been released.
๐Ÿคฎ141๐Ÿ—ฟ20๐Ÿคก12๐Ÿ‘4๐Ÿ˜3๐Ÿค”1๐Ÿ˜ˆ1
Why does vx-underground archive The Old New Thing? This is why:
๐Ÿ‘39๐Ÿ˜11๐Ÿ˜ˆ1
Yesterday Yandex's Git repository was leaked. It has resulted in dozens of hardcoded credentials being exposed.
๐Ÿ”ฅ78๐Ÿ˜18๐Ÿ‘3๐Ÿ‘Ž3๐Ÿ˜1๐Ÿ˜ˆ1
Since we shared news on the Riot games breach we have seen a flood of League of Legends players. They are funny.
๐Ÿ˜60๐Ÿ”ฅ12๐Ÿ‘2๐Ÿ˜ˆ2
HIVE ransomware group's Tor domain has been seized by EUROPOL

*No official announcement yet from United States Department of Justice or EUROPOL
๐Ÿคฌ33โค9๐Ÿ˜6๐Ÿ˜ข2๐Ÿ’ฉ1๐Ÿคก1๐Ÿ˜ˆ1
The United States Department of Justice has stated in their official press conference, regarding the disruption of HIVE ransomware group infrastructure, that they "hacked the hackers" to disrupt their operations and infrastructure. They state they have decrypted 1,500 companies.
โคโ€๐Ÿ”ฅ18๐Ÿคช8๐Ÿ–•6๐Ÿ‘5๐Ÿ˜3๐Ÿคก3๐Ÿ˜ˆ1
This is the 2nd time, that we are aware of, that the United States Department of Justice, has admitted to using offensive operations to take down, or disrupt, ransomware groups.

The DoJ has announced that they are now focusing their efforts on HIVE affiliates and developers.
๐Ÿคก5๐Ÿ‘2๐Ÿฅฐ1๐Ÿ˜ˆ1
The United States government has admitted, for the 2nd time, to utilizing offensive operations against ransomware groups

tl;dr ransomware group with 24/7 SOC
๐Ÿ’ฉ32๐Ÿคฃ20๐Ÿ”ฅ4๐Ÿคก4๐Ÿ‘2โค1๐Ÿ˜1๐Ÿ˜ˆ1
Conspiracy theories galore online right now as people speculate that the NSA used a 0day exploit to compromise HIVE. Others suggest it was an inside job - an admin at HIVE leaked information to EUROPOL agents.

Reality: Phishing (probably)
๐Ÿ‘24๐Ÿค”9โค6๐Ÿ˜4๐Ÿ”ฅ3๐Ÿ˜ˆ2
Ransomware group comment to the HIVE take down:

ALPHV: This would not work on us, we have too strong security and we do not store anything on our servers

BianLian: Too bad. I think they will be restored under a new name

Lockbit: Nice news. I love when FBI pwn my competitors
๐Ÿคฃ66๐Ÿ”ฅ12๐Ÿ˜ˆ5๐Ÿ‘3๐Ÿ’ฉ3๐Ÿ‘1
The Yandex leak has shown that Yandex uses racial slurs as variable names.

Text translation:

Github: We renamed Master to Main so it is not associated with racism

Yandex:
๐Ÿ˜81๐Ÿฅฐ13๐Ÿ‘7๐Ÿ‘Ž5๐Ÿฅด5๐Ÿคฃ4๐Ÿ‘2๐ŸŒญ2๐Ÿ˜ˆ1
Lockbit ransomware group has informed us they have acquired a 3rd ransomware variant.

- Lockbit Red
- Lockbit Black
- Lockbit Green

They also have modified their ESXI ransomware variant.

Yes, they actually wrote "TLP:RED" in the image.
๐Ÿ‘19โคโ€๐Ÿ”ฅ7๐Ÿคก6๐Ÿ˜ˆ3