cookie

نحن نستخدم ملفات تعريف الارتباط لتحسين تجربة التصفح الخاصة بك. بالنقر على "قبول الكل"، أنت توافق على استخدام ملفات تعريف الارتباط.

avatar

vx-underground

The largest collection of malware source, samples, and papers on the internet. Password: infected https://vx-underground.org/

إظهار المزيد
مشاركات الإعلانات
34 084
المشتركون
+5624 ساعات
+4047 أيام
+1 90630 أيام

جاري تحميل البيانات...

معدل نمو المشترك

جاري تحميل البيانات...

00:46
Video unavailableShow in Telegram
Law enforcement has released a new 'episode' of Operation Endgame. The video is odd.
إظهار الكل...
🤓 49🤔 3😢 2🤣 2 1🙏 1😘 1
Snowflake has put out a statement denying being compromised Full statement: https://community.snowflake.com/s/question/0D5VI00000Emyl00AB/detecting-and-preventing-unauthorized-user-access
إظهار الكل...
Snowflake Community

Join our community of data professionals to learn, connect, share and innovate together

🤔 9😁 2👍 1😢 1
May 26th Hudson Rock began investigating the alleged TicketMaster breach and the subseuent Santander Bank breach. They spoke with an unidentified Threat Actor(s) claiming responsibility for the breach. Hudson Rock was able to confirm some of their statements. They discovered Snowflake, a large cloud storage provider, was impacted by Lumma Stealer. The unidentified Threat Actor states they were able to get access to those companies by Infostealer malware, which allowed them to log into ServiceNow and bypass OKTA. The unidentified Threat Actor(s) stated they're trying to extort Snowflake for $20,000,000 but Snowflake has ignored them. The Threat Actor(s) also claim to have exfiltrated sensitive data from over 400 companies which use Snowflake. More information: https://www.hudsonrock.com/blog/snowflake-massive-breach-access-through-infostealer-infection
إظهار الكل...
Snowflake, Cloud Storage Giant, Suffers Massive Breach: Hacker Confirms to Hudson Rock Access Through Infostealer Infection

Hudson Rock is able to confirm a massive breach at Snowflake was caused by credentials compromised via an Infostealer infection.

🔥 28👍 3😱 3 2
The good news: prompted UAC, administrative privileges required to access this folder The bad news: still easily accessible
إظهار الكل...
🤣 93😁 7👏 6🔥 4👍 1😢 1
01:13
Video unavailableShow in Telegram
Security researcher GossiTheDog shared a TikTok video from Microsoft employees showing Microsoft Recall. Rest assured that malware will not be able to access it and your privacy is safe (joking, it's super unsafe)
إظهار الكل...
🤣 83👍 7😱 3🤔 2 1😢 1
We are aware that one of the images released by the National Police of Ukraine, during a raid from Operation Endgame, shows an arrest of a naked person. No information is given on who this person is or why they're naked. tl;dr prolly raided while showering or going potty
إظهار الكل...
🤣 79🫡 22😁 7😢 1
Today the National Police of Ukraine, in conjunction with the Cyber Department of the Security Service of Ukraine, announced a takedown of multiple 'hacker services'. The takedown is in partnership with the United States, France, the Netherlands, the United Kingdom, Northern Ireland, Denmark, and Germany in what is now being labeled as "Operation Endgame". The raids disclosed today are related to 'Pikabot', 'IcedId', and 'AlexCrypt'. These malicious tools and malware campaigns are explicitly noted by the National Police of Ukraine as being in the arsenal of Russian-based Threat Groups 'BlackBasta', 'REvil', and 'Conti'. Raids were conducted in unspecified regions of Ukraine. However, it is noted suspected developers, suspected administrators, and suspected operation organizers were raided. Furthermore, servers were 'blocked' (?), mobile devices were seized, and computer equipment was seized. More information: https://cyberpolice.gov.ua/news/zablokovano-xakerski-servisy-svitovyx-kiberzlochynnyx-organizaczij-slidchi-naczpolicziyi-ukrayiny-doluchylysya-do-mizhnarodnoyi-speczoperacziyi-endgame-2143/
إظهار الكل...
🤣 48👍 15 5😢 5🤔 1
Photo unavailableShow in Telegram
"successfully executive" Imagine if we could make a single post without sounding like a bunch of idiots
إظهار الكل...
❤‍🔥 49🤣 24 4😁 3💯 2👍 1🔥 1🥰 1😢 1🎉 1
Previously on Dragon Ball Z: Law enforcement agents seized the BreachForum backend and placed a 'this site has been seized' sticker on the BreachForum landing page. However, shortly after the takedown, BreachForum quickly returned online. Fast forward to today: BreachForum administrative staff issued a statement on their forum to Breach members and law enforcement agencies. The messages are attached to this post. Breach administrative staff also shared e-mail's between them and their host provider In summary Breach administrative staff assert law enforcement failed to successfully executive a seizure and inadvertently caused damage to a business who is not affiliated with them. Breach administrators also some how acquired the e-mail correspondence between law enforcement agencies and their host provider.
إظهار الكل...
🤣 103🤯 8🔥 2😢 1
Crazy to think we've got Fed anime and Fed dubstep before we got Elder Scrolls VI or Grand Theft Auto VI
إظهار الكل...
🤣 101🔥 7 3🙏 2👍 1😢 1