I Bought 25 Million Computer Viruses - VX Underground Malware HDD

preview_player
Показать описание

We bought an external 8TB hard drive filled to the brim with malware from a faceless group of researchers known as VX Underground. What is on it? What can we do with it? What are OTHERS doing with it? Big thanks to smelly and lil cheezer for sending this to us.

Purchases made through some store links may provide some compensation to Linus Media Group.

FOLLOW US
---------------------------------------------------  

MUSIC CREDIT
---------------------------------------------------
Intro: Laszlo - Supernova

Outro: Approaching Nirvana - Sugar High

CHAPTERS
---------------------------------------------------
0:00 Intro
1:52 Is this dangerous?
2:55 Borat
4:55 We're in
7:53 How does these rats do so much
10:30 What about Linux?
12:28 That's a little scary
14:25 How to protect yourself
16:38 This is almost too simple
19:38 Who is doing this?
21:18 How will we use this power?
Рекомендации по теме
Комментарии
Автор

I didn't know you guys were tapping into the horror tech genre...

Pisty.
Автор

So the hacker doesn’t actually see a black terminal with fast moving green text 😔

cloroxbleach
Автор

I work as an IT technician and this is hands-down one of the most interesting videos you've posted in a very long time. Absolutely invaluable for a quick look into how things are changing in our digital landscape on a daily basis.

draconian_torch
Автор

Malware analyst and digital forensics analyst here, super pleasantly surprised to see LTT do a video on my job and VX underground. They're one of the cooler parts of the info sec community.

Very good surface level explanations on lots of different concepts here too!

eros
Автор

You guys need to do more videos like this. Interesting, educational, informative, and fun. Great idea!

TheDexterousdrew
Автор

Me when I lend my computer to my friend for 2 seconds :

deleted-something
Автор

Back in the day, I discovered 45k-50K instances of the Nimda worm on the college campus network. I notified the professor of my findings. Shortly after, the Network Admin was let go for downloading "stuff".

JoshuaHaglund
Автор

"If we get infected, I dont own the company" is such an on point statement about company security and why its so hard to keep the weakest link from nearly always being the human element.. people dont care much if its not their stuff

vamsterr
Автор

This is the first time I watched the whole sponsor segment because it was actually pretty interesting to see how these products work!

aesync
Автор

Viruses are getting scarier and scarier nowdays..
Really good video to teach people to be more careful on the internet!

ImMrLegitMate
Автор

The guy you mentioned, Marcus Hutchins, who defeated the wannacry virus has a YouTube channel and makes very informative videos on Cybersecurity and I.T Security in general. If you are doing any more videos like this, you should have him on. He is really interesting.

stretchx
Автор

I work for a company I can't disclose, and work in environments that use ThreatLocker.
I can swear that ThreatLocker is very good at what it does. Including stopping Microsoft from running it's own software because how it handles some parts of it's programming can look fishy.

JereVali
Автор

Me just chilling with my neuralink. Linus with 25 million computer viruses:

stackedpringles
Автор

"this hard drive contains 25M pieces of malware"
My family computer back when limewire was a thing: "those are rookie numbers"

FanterA
Автор

It's both fascinating and terrifying how simple these tools are and how easily a system can be compromised.

RILDIGITAL
Автор

5:40 The UAC (admin popup) bypass hasn't been "patched" because there is nothing to patch. It is trivial to bypass UAC on a default Windows install. This is an interesting thing to research, but here's the TL;DR. A long time ago people got annoyed by having UAC popup for everything. So, Microsoft made it so UAC only pops for some actions, not all, by default. Unless you manually restore UAC to it's full control, most people would consider it useless.

xZF
Автор

Long term cybersecurity staffer here, maybe I’m dead inside after all these years but this wasn’t shocking to me… it’s a great educational video for those outside of the industry though. Great work guys!

rzy
Автор

Honestly, that moment of silence followed by: "Anyway... good luck" is both hilarious, but very successfully portrays how genuinely concerning a lot of this stuff is.
In some ways, it gives me the same kind of feeling that I get when I think about the reducing efficacy of antibiotics. Obviously not quite the same, but both give me the same kind of feeling.

enisylo
Автор

I would suggest setting up a small scale model of a networking enviroment of a typical office and show from begining to end how this works. I would love to have such a video to show as a demo to our employees. We are a hospital hat was hit by randsomware a few years ago, and being able to show people how these things work and why certain security measures are crucial would be a godsend. Might even make a small series or a few PSA's to spread the word.

matthewhartin
Автор

Threatlocker is actually pretty great. You can create policies for groups of machines, and then you can use their built in app policies to allow things like "all office suite programs" to whitelist them, or adobe reader, for example. The policy will allow future version to run automatically when a new version comes out, and you can even prevent older versions from running (such as if a vulnerability is found in an older version). You can also sandbox a program in a vm to see if it's malicious, and allow or block it based on that result. It's actually a very sick suite of tools.

WarrenGarabrandt