cybercriminals

  1. Tomcat

    "Save it now, decrypt it later": how cybercriminals are preparing for the quantum future

    Software vulnerabilities, attacks on the quantum Internet - what can we expect from criminals? The analytical agency Gartner predicts that by 2025, about 40% of large companies will start implementing quantum technologies and conduct pilot projects based on them. According to McKinsey &...
  2. Tomcat

    911 S5 botnet: US imposes sanctions against cybercriminals from China and Thailand

    How an international proxy network was used to steal social security payments. The US Treasury Department has imposed sanctions on a network of cybercriminals that includes three Chinese citizens and three companies from Thailand. The subjects are linked to a large botnet that controlled a...
  3. Tomcat

    Cybercriminals complain that they are being deceived by the creators of ransomware

    Cybercriminals who use ransomware complain that the malware they use has a built-in backdoor that allows them to intercept the ransom. According to rumors, the REvil group, which provides a ransomware service, deceives its own customers. REvil leases its software to other scammers in exchange...
  4. Tomcat

    1,300 cybercriminals found in Belarus

    By the beginning of this year, the Belarusian Interior Ministry registered 1,300 cybercriminals, which include hackers, carders, Internet scammers and other unpleasant personalities. This year, 847 crimes involving the use of computer equipment were committed in Belarus, including 334 crimes...
  5. Father

    Why do cybercriminals use some programming languages more often than others

    Programming languages are an important tool for cyber attacks. We'll tell you what makes PowerShell, Bash, and JavaScript attractive to cybercriminals, what is the secret to the popularity of C / C++, and how to avoid becoming a victim of malicious Python applications. Introduction What...
  6. Father

    4 ways that cybercriminals Hide attacks with filling in credentials

    Credential stuffing is a cyberattack in which public usernames and passwords are used to gain fraudulent access to accounts through large-scale automated login requests. The heavy use of accounts, password reuse, and massive amounts of compromised credentials on the darknet create a perfect...
  7. Father

    7 old attack vectors that are still used by cybercriminals

    Even in the current era of digital evolution, malicious hackers continue to use attack vectors created decades ago. Research shows notable periods of resurgence in some methods considered obsolete. This indicates that, although the specifics of attacks may change over time, the points of...
  8. Father

    Hack like clockwork: case studies and tips for dealing with cybercriminals

    Cryptographic attacks are sweeping the world like a tsunami. In Russia, companies with previously compromised credentials are more likely to fall under the wave. Another situation is when victims used publicly available applications with vulnerabilities, such as Microsoft Exchange. If the first...
  9. Father

    Microsoft Graph API: how a legitimate platform has become a powerful weapon for cybercriminals

    Hackers deploy their own C2 infrastructure at the company's facilities for free, and don't hesitate to use them for malicious purposes. Cybercriminals are increasingly using the Microsoft Graph API to manage malware and bypass detection systems. According to researchers from Symantec, such...
  10. Father

    The Central Bank of India plans to allow banks to block the accounts of cybercriminals

    The Reserve Bank of India (RBI, the Central Bank) intends to allow the country's banks to temporarily block accounts that are used for fraudulent schemes by cybercriminals. As reported by Reuters, citing sources, the regulator is considering such measures due to the growth of online crime in the...
  11. Father

    African countries are becoming increasingly attractive to cybercriminals

    Experts are sounding the alarm, claiming that Africa and the West need a unified cyber defense. Performanta identified a trend of shifting malicious digital attacks from government actors to developing countries. According to the company's analysis, organizations in developing countries are...
  12. Father

    Where Cybercriminals are born: Sophos explores the cradle of evil on the darknet

    How ransomware for dummies is distributed on shadow forums and what it threatens. Experts from Sophos cyber intelligence department identified 19 different types of ransomware on four shadow forums between June 2023 and February 2024, which were offered for sale for relatively small amounts...
  13. Father

    Cybercriminals target veterans: a fraudulent special operation by May 9

    Partner programs will bring down a flurry of deception on the elderly by Victory Day. Cybercriminals are launching new large-scale fraud campaigns, timed to coincide with May 9. F. A. C. C. T. experts have discovered new partner programs aimed at older people — including veterans. Over the past...
  14. Father

    LockBit 3.0: Chaos Constructor in the hands of cybercriminals

    Kaspersky Lab analyzed the events of the past and came to a disappointing conclusion. The latest Kaspersky Lab study analyzes in detail the consequences of the LockBit 3.0 constructor leak that occurred in 2022. Then cybercriminals were able to create flexibly customized versions of malware...
  15. Father

    Vietnamese hackers robbed Asia: Telegram as a marketplace for cybercriminals

    How new tools with unknown origins are monetized. According to a new Cisco Talos report, Vietnamese hackers have been distributing a new infostealer since May 2023 in order to get their hands on financial data. Called CoralRaider, the campaign targeted victims in India, China, South Korea...
  16. Father

    FixedFloat hacked again: Cybercriminals stole $2.8 million

    The exchange is experiencing its second attack in 2 months. The FixedFloat project team has revealed information about the second platform security breach, which is caused by the same cybercriminals as the attack in February. On April 1, attackers exploited a vulnerability in the FixedFloat...
  17. Teacher

    Cybercriminals cash in on Ramadan: Fraud in Saudi Arabia breaks records

    Scammers used new methods of deception in the East, earning $100 million. During Ramadan, Resecurity recorded a significant increase in the number of fraudulent activities and scams, coinciding with an increase in retail and online transactions. Cybercriminals are particularly active in the...
  18. Teacher

    A resident of Grodno transferred more than Br50 thousand to cybercriminals

    A resident of Grodno transferred more than Br50 thousand to fraudsters. BelTA learned this from Inna Poznyak, official representative of the USC for the Grodno region. "Since the beginning of the year, more than 30 criminal cases have been initiated in the Grodno region, in which the victims...
  19. Teacher

    Loop DoS: infinite loops in the service of cybercriminals

    How the Achilles heel of the UDP protocol can lead to a digital catastrophe. Researchers at the CISPA identified a new type of denial-of-service (DoS) attack, dubbed "Loop DoS". The attack affects application-level protocols, causing endless communication cycles between network services and...
  20. Teacher

    US Department of Justice fights phantom cybercriminals

    The US Department of Justice has announced the return of a $2.3 million cryptocurrency linked to a Pig Butchering scam that affected at least 37 US residents. During the investigation of one of these schemes in 2023, when a Massachusetts resident lost $400 thousand, the police tracked transfers...
Top