criminals

  1. Man

    NexFundAI: FBI Creates Cryptocurrency Trap for Criminals

    Investigators showed ingenuity to uncover a scam worth millions of dollars. On Wednesday, US law enforcement officers released the results of the operation to catch cryptocurrency scammers. An investigation conducted by the FBI revealed a sophisticated scheme for manipulating the prices of...
  2. Man

    Microsoft is sounding the alarm: LoTS techniques are rapidly gaining popularity among criminals

    How did OneDrive and Dropbox become top phishing tools? Microsoft warns of a rise in attacks using file storage services such as SharePoint, OneDrive and Dropbox to circumvent defenses. In these cyberattacks, attackers compromise business email (BECs), resulting in financial theft, data theft...
  3. Friend

    Open channels, closed cases: how criminals expose themselves on Telegram

    WSJ: US intelligence agencies successfully use the messenger in investigations. According to The Wall Street Journal (WSJ), despite the widespread use of Telegram by criminals, the messenger has become an important tool for law enforcement agencies to penetrate criminal groups even without...
  4. Friend

    Fraud and love: how a woman from Florida became a "banker" of criminals

    Trust and feelings have become tools for money laundering. According to the case file, 30-year-old Christine Petitfrer from the city of Miramar used bank accounts to receive funds obtained as a result of fraud related to romantic scams. Petitfrère kept part of the money for herself as a reward...
  5. Carding Forum

    Europol: AI becomes a weapon in the hands of criminals

    Growing fragmentation makes it difficult to assess the real scale of cyber threats. Ransomware groups are becoming increasingly fragmented due to recent law enforcement actions, according to Europol's latest report on Organized Crime on the Internet (IOCTA). The 10th edition of the report...
  6. Carding Forum

    Secret plastic surgery hospitals for criminals found in Philippines

    In the Philippines, there is a whole network of clinics specializing in plastic surgery. According to the BBC, they provide their services to members of the mafia and fraudulent groups. Two months ago, a police raid at one of these hospitals seized tools for hair transplantation and skin...
  7. Tomcat

    How officials in Moldova helped dangerous criminals hide from Interpol

    What awaits those who dare to sabotage the Red Notice system? As a result of an investigation by international law enforcement agencies, a criminal organization operating in Moldova was uncovered and suspected of trying to sabotage the Interpol system that helps participating countries locate...
  8. Tomcat

    Criminals sell extortion benefits online

    Snapchat, Instagram, and TikTok must urgently take action to combat sexual extortion. Researchers have found that criminals openly sell online sexual extortion manuals on social media. This illegal practice is now called "sextortion". Tutorials and videos detail how to impersonate young girls...
  9. Father

    How to catch criminals in the Deep Web

    Cryptographic technologies of network anonymity and online payments allowed criminals to create a black market where they sell and buy drugs, stolen and counterfeit goods, and not only that. In response, the police and other law enforcement agencies are improving their technology, moving their...
  10. Father

    Saving Money for Espionage: NYPD will use Chinese drones against criminals

    Why do the police justify buying unsafe drones from China? The U.S. Congress has expressed concern over plans by the NYPD to use Chinese drones in five high-crime areas. The government's concerns were voiced by NYPD Deputy Operations Commissioner Kaz Daughtry at a House of Representatives...
  11. Father

    Geolocation by phone number: how criminals track subscribers and attack companies

    Finding out a person's location today is easy. Just look at his social networks. Usually, people themselves are willing to share such information in posts or stories. But sometimes even the most secretive Internet users are under threat – attackers determine their location by phone number. Why...
  12. Father

    Dangerous Connections: How criminals hack IT products via GitHub

    In this new article, read expert advice on protecting against cyber attacks through third-party code repositories. At the end of 2023, an article titled "One Attack on the Supply Chain to rule everyone" appeared on the Internet, which described a way to gain access to the GitHub repository...
  13. Father

    Google vs crypto fraud: Legal Action should Cool the ardor of Chinese criminals

    It took 87 malicious apps and 100,000 victims for the company to pay attention to the situation. Earlier last week, Google filed a lawsuit against two Chinese app developers, accusing them of creating fraudulent apps for investing in cryptocurrencies and publishing them on the Google Play...
  14. Tomcat

    Criminals Hack VPN Servers to Install Backdoors

    Supposedly Iranian government-sponsored cybercriminal groups exploit VPN server vulnerabilities in their malicious campaigns to create backdoors in companies around the world. According to a report by specialists from the Israeli company ClearSky, Iranian cybercriminals are attacking...
Top