Tag: crimes
-
493 Cases of Sextortion Against Children Linked to Notorious Scam Compounds
Scam compounds in Cambodia, Myanmar, and Laos have conned people out of billions. New research shows they may be linked to child sextortion crimes too. First seen on wired.com Jump to article: www.wired.com/story/child-sextorition-scam-compounds-southeast-asia/
-
Ghanaian fraudsters arrested for BEC/Sakawa
In Nigeria, scammers who specialize in Romance Scams and BEC are called “Yahoo Boys.” In Ghana, the term for the same activity is “Sakawa.” Several Ghanaian headlines are talking about this case with headlines such as “Multimillion dollar Sakawa” or “Sakawa Chairman Busted” or “Sakawa Kingpin Bows to Extradition!” On 08AUG2025 the US Attorney’s office…
-
Operation Chakra V: Call Center Scammers and your PII
Here we have another cautionary tale about off-shoring customer service when faced with the reality of Call Center Scams that commit fraud via Tech Support Scams and Government Impersonation. In this case, FirstIdea, an Indian company is charged with committing fraud against at least 100 victims from Australia and the UK. FirstIdea.us, according to their…
-
Germany limits police spyware use to serious crimes
Germany’s top court ruled police can use spyware only for crimes punishable by at least three years in prison. Germany’s top court ruled that police may only use spyware to monitor devices in cases involving crimes with a maximum sentence of at least three years. >>The interference with both the fundamental right protecting IT-systems and Art. 10(1) of…
-
Germany’s top court holds that police can only use spyware to investigate serious crimes
The plaintiffs argued that a 2017 rules change enabling law enforcement to use spyware to eavesdrop on encrypted chats and messaging platforms could unfairly expose communications belonging to people who are not criminal suspects. First seen on therecord.media Jump to article: therecord.media/germany-spyware-limitations-court-rules
-
IRL Com recruits teens for real-life stabbings, shootings, FBI warns
From scams to violence, the crimes extend beyond the digital realm First seen on theregister.com Jump to article: www.theregister.com/2025/07/23/irl_com_recruits_teens/
-
Armenian Extradited to US Over Ryuk Ransomware
The suspect faces three charges for his alleged crimes that could earn him up to five years in federal prison, and a heap of fines. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/armenian-extradited-ryuk-ransomware
-
Meme Crimes Can You Conspire By Meme?
Can a person be convicted of a federal conspiracy solely by posting misleading political memes online, without ever having communicated or knowingly coordinated with their alleged co-conspirators? First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/07/meme-crimes-can-you-conspire-by-meme/
-
Pro basketball player and 4 youths arrested in connection to ransomware crimes
Suspects were allegedly involved in a string of ransomware breaches. First seen on arstechnica.com Jump to article: arstechnica.com/security/2025/07/pro-basketball-player-and-4-youths-arrested-in-connection-to-ransomware-crimes/
-
Tech firms complicit in ‘economy of genocide’, says UN rapporteur
A UN special rapporteur has called for technology firms operating in Israel and the Occupied Palestinian Territories to immediately halt their activities, in wider report about the role corporate entities have played in the Israeli state’s ongoing ‘crimes of apartheid and genocide’ First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366626968/Tech-firms-complicit-in-economy-of-genocide-says-UN-rapporteur
-
Virginia county says April ransomware attack exposed employee SSNs
Carol Steele, the county’s administrator, said they hired cybersecurity experts to help with the recovery and notified the FBI’s Cyber Crimes Division as well as the Cyber Fusion Center of the Virginia State Police. First seen on therecord.media Jump to article: therecord.media/virginia-county-says-ransomware-attack-exposed-ssns
-
Second espionage-linked cyberattack hits ICC, exposing persistent threats to global justice systems
Tags: attack, crime, crimes, cyber, cyberattack, cybersecurity, data, disinformation, espionage, identity, infrastructure, intelligence, international, Internet, office, resilience, russia, spy, threat, ukrainePattern of sophisticated cyber espionage: This marks the second major cybersecurity incident targeting the ICC in recent years. In September 2023, the court disclosed it had suffered what it later characterized as “a targeted and sophisticated attack with the objective of espionage” that was “a serious attempt to undermine the Court’s mandate.”According to reports following…
-
International Criminal Court Hacked via Sophisticated Cyber Campaign
The International Criminal Court (ICC), the global tribunal responsible for prosecuting serious international crimes, has been targeted by a sophisticated and highly focused cyberattack late last week. The Court confirmed that the incident, which marks the second such breach in recent years, was quickly detected and contained through its robust cybersecurity measures. According to an…
-
Reported Impersonation Scams Surge 148% as AI Takes Hold
New ITRC data reveals identity crimes are down but impersonation scams now account for a third of all scams First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/reported-impersonation-scams-surge/
-
Microsoft launches European Security Program to counter nation-state threats
Tags: access, ai, attack, blizzard, cloud, control, country, crime, crimes, cyber, cybercrime, cybersecurity, framework, google, government, group, infrastructure, intelligence, malicious, malware, microsoft, network, open-source, resilience, russia, service, strategy, threat, vulnerabilityThree-component strategy: The European Security Program will operate through three main components designed to strengthen continental cyber defenses.The first element centers on enhanced threat intelligence sharing, where Microsoft will provide European governments with AI-enhanced, real-time insights into nation-state tactics.The company’s Digital Crimes Unit will expand intelligence sharing through the Cybercrime Threat Intelligence Program, giving European…
-
The US Is Storing Migrant Children’s DNA in a Criminal Database
Customs and Border Protection has swabbed the DNA of migrant children as young as 4, whose genetic data is uploaded to an FBI-run database that can track them if they commit crimes in the future. First seen on wired.com Jump to article: www.wired.com/story/cbp-dna-migrant-children-fbi-codis/
-
Enterprise-specific zero-day exploits on the rise, Google warns
Tags: access, apple, apt, attack, china, cisco, cloud, crime, crimes, cyberespionage, detection, endpoint, exploit, finance, flaw, google, group, Hardware, incident response, injection, Internet, ivanti, korea, lessons-learned, mandiant, microsoft, mitigation, network, north-korea, remote-code-execution, russia, service, strategy, technology, threat, tool, update, vpn, vulnerability, zero-daySurge in network edge device exploitation: Of the 33 zero-day vulnerabilities in enterprise-specific products, 20 targeted hardware appliances typically located at the network edge, such as VPNs, security gateways, and firewalls. Notable targets last year included Ivanti Cloud Services Appliance, Palo Alto Networks’ PAN-OS, Cisco Adaptive Security Appliance, and Ivanti Connect Secure VPN.Targeted attacks against…
-
FBI Reports ₹1.38 Lakh Crore Loss in 2024, a 33% Surge from 2023
The FBI’s Internet Crime Complaint Center (IC3) has reported a record-breaking loss of $16.6 billion (approximately ₹1.38 lakh crore) due to cyber-enabled crimes in 2024, marking a staggering 33% increase from the previous year. Established 25 years ago, IC3 has evolved into the primary hub for reporting cyber fraud and threats, processing over 9 million…
-
CEO of cybersecurity firm charged with installing malware on hospital systems
Veritaco CEO Jeffrey Bowie faces charges for allegedly installing malware on hospital computers, violating Oklahoma’s Computer Crimes Act. Jeffrey Bowie, CEO of the cybersecurity firm Veritaco, is facing two counts of violating Oklahoma’s Computer Crimes Act for allegedly infecting employee computers at the Oklahoma City St. Anthony Hospital. The man is accused of having installed…
-
U.S. Secret Service Reveals Ways to Identify Credit Card Skimmers
With credit card skimming crimes escalating nationwide, the U.S. Secret Service’s Washington Field Office is sharing essential tips for the public to protect themselves from this growing threat, shared by Officials in LinkedIn post. According to the agency, credit card skimming involves criminals installing illicit devices to steal card information, has become a “low-risk, high-reward”…
-
UK Police Are Ill-Equipped to Tackle AI Crimes
New Turing Institute Report Urges Government to Create AI Crime Task Force. British law enforcement agencies are ill-equipped to tackle artificial intelligence-enabled cybercrime, a report by The Alan Turing Institute says, pointing to an enormous gap between police technical capabilities and the growing sophistication of threat actors. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/uk-police-are-ill-equipped-to-tackle-ai-crimes-a-27888
-
Microsoft Busts Hackers Selling Illegal Azure AI Access
LLMjacking operation leveraged illicit access GenAI services to produce explicit celebrity images and other harmful content, Microsoft’s digital crimes unit says. First seen on darkreading.com Jump to article: www.darkreading.com/application-security/microsoft-openai-hackers-selling-illicit-access-azure-llm-services
-
How Banks Can Adapt to the Rising Threat of Financial Crime
Banking fraud and financial crimes are growing more sophisticated every day. By understanding the threats and building strong collaborations, banks can protect themselves and their clients. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/how-banks-adapt-rising-threat-financial-crime
-
Unusual attack linked to Chinese APT group combines espionage and ransomware
Tags: apt, attack, breach, china, cloud, country, credentials, crime, crimes, crypto, cyber, cybercrime, cyberespionage, data, encryption, espionage, exploit, finance, firewall, government, group, hacker, infection, insurance, intelligence, korea, microsoft, network, north-korea, ransom, ransomware, russia, software, tactics, technology, threat, veeam, vulnerabilityThe attacker demanded a $2-million ransom: The attack that resulted in the deployment of the RA World ransomware program, as well as data exfiltration, had the same chain: the toshdpdb.exe loading toshdpapi.dll then decrypting toshdp.dat which resulted in the PlugX variant being deployed. The difference is the attacker then chose to deploy the RA World…

