vx-underground
45.8K subscribers
3.93K photos
419 videos
83 files
1.43K links
The largest collection of malware source, samples, and papers on the internet.

Password: infected

https://vx-underground.org/
Download Telegram
Last update for the Riot Games breach. Here is the file directory listing of (some) of the exfiltrated data.

Goodnight (or good morning to some of you).
ðŸ”Ĩ30👍9🏆3😈1
This media is not supported in your browser
VIEW IN TELEGRAM
Threat Intelligence the second a significant breach occurs
ðŸĪĢ65ðŸĪĄ8😈3😁2👍1
Microsoft has announced it intends on modernizing Windows Explorer

This is a preview image that has been released.
ðŸĪŪ141ðŸ—ŋ20ðŸĪĄ12👍4😁3ðŸĪ”1😈1
Why does vx-underground archive The Old New Thing? This is why:
👍39😁11😈1
Yesterday Yandex's Git repository was leaked. It has resulted in dozens of hardcoded credentials being exposed.
ðŸ”Ĩ78😁18👍3👎3😐1😈1
Since we shared news on the Riot games breach we have seen a flood of League of Legends players. They are funny.
😁60ðŸ”Ĩ12👍2😈2
HIVE ransomware group's Tor domain has been seized by EUROPOL

*No official announcement yet from United States Department of Justice or EUROPOL
ðŸĪŽ33âĪ9😁6ðŸ˜Ē2ðŸ’Đ1ðŸĪĄ1😈1
The United States Department of Justice has stated in their official press conference, regarding the disruption of HIVE ransomware group infrastructure, that they "hacked the hackers" to disrupt their operations and infrastructure. They state they have decrypted 1,500 companies.
âĪ‍ðŸ”Ĩ18ðŸĪŠ8🖕6👍5😁3ðŸĪĄ3😈1
This is the 2nd time, that we are aware of, that the United States Department of Justice, has admitted to using offensive operations to take down, or disrupt, ransomware groups.

The DoJ has announced that they are now focusing their efforts on HIVE affiliates and developers.
ðŸĪĄ5👍2ðŸĨ°1😈1
The United States government has admitted, for the 2nd time, to utilizing offensive operations against ransomware groups

tl;dr ransomware group with 24/7 SOC
ðŸ’Đ32ðŸĪĢ20ðŸ”Ĩ4ðŸĪĄ4👍2âĪ1😁1😈1
Conspiracy theories galore online right now as people speculate that the NSA used a 0day exploit to compromise HIVE. Others suggest it was an inside job - an admin at HIVE leaked information to EUROPOL agents.

Reality: Phishing (probably)
👍24ðŸĪ”9âĪ6😁4ðŸ”Ĩ3😈2
Ransomware group comment to the HIVE take down:

ALPHV: This would not work on us, we have too strong security and we do not store anything on our servers

BianLian: Too bad. I think they will be restored under a new name

Lockbit: Nice news. I love when FBI pwn my competitors
ðŸĪĢ66ðŸ”Ĩ12😈5👍3ðŸ’Đ3👏1
The Yandex leak has shown that Yandex uses racial slurs as variable names.

Text translation:

Github: We renamed Master to Main so it is not associated with racism

Yandex:
😁81ðŸĨ°13👍7👎5ðŸĨī5ðŸĪĢ4👏2🌭2😈1
Lockbit ransomware group has informed us they have acquired a 3rd ransomware variant.

- Lockbit Red
- Lockbit Black
- Lockbit Green

They also have modified their ESXI ransomware variant.

Yes, they actually wrote "TLP:RED" in the image.
👍19âĪ‍ðŸ”Ĩ7ðŸĪĄ6😈3
What the hell is wrong with you nerds?
ðŸĪĢ66ðŸ”Ĩ6ðŸĪĄ6🎉4âĪ‍ðŸ”Ĩ3💋2😈1
This media is not supported in your browser
VIEW IN TELEGRAM
It is of the utmost importance we relay this information to all of you:
ðŸ”Ĩ27ðŸĨ°11ðŸ’Đ10ðŸĪŊ5ðŸĪĄ5😁3ðŸģ3☃2🌚2😈2😍1
Yandex confirms usage of racial slurs in company source code. Yandex states the code which uses racial slurs did not affect company services (?), and was only used internally. They stated the racial slurs violate company policy and have apologized

https://cyberscoop.com/racial-slurs-discovered-in-leaked-yandex-source-code/
😁46👍4ðŸĨ°2ðŸ”Ĩ1👏1ðŸĪŽ1ðŸ˜Ē1🏆1😈1
We've updated the vx-underground malware sample collection

- Virusshare.00456
- Virusshare.Android.APK.2022
- 36,260 new malicious binaries added
- All named using Kaspersky naming convention

Check it out here: https://samples.vx-underground.org/samples/Blocks/
ðŸŦĄ19👍4âĪ2ðŸĨ°1ðŸ˜ą1😈1
General updates:

- 45TB+ of data delivered in the past 28 days
- 95% completion of The Old New Thing archive
- 15% of malware collection synced with Tria.ge
- ???
👍21ðŸĪĄ3ðŸĨą1😈1