Tag: crimes
-
Microsoft scores win against Office 365 credential thieves
Microsoft’s Digital Crimes Unit disrupts a major phishing-as-a-service operation that targeted and stole Office 365 usernames and credentials First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366631473/Microsoft-scores-win-against-Office-365-credential-thieves
-
Microsoft and Cloudflare teamed up to dismantle the RaccoonO365 phishing service
Microsoft and Cloudflare disrupted the RaccoonO365 phishing service, used to steal thousands of user credentials. A joint operation conducted by Microsoft and Cloudflare has taken down the infrastructure used by the RaccoonO365 phishing service (tracked by Microsoft as Storm-2246). Microsoft announced that its Digital Crimes Unit shut down RaccoonO365, seizing 338 sites used to steal…
-
Microsoft and Cloudflare execute ‘rugpull’ on massive phishing empire
Tags: access, ai, attack, blockchain, breach, computer, credentials, crime, crimes, crypto, cybercrime, data, detection, exploit, extortion, finance, fraud, infrastructure, international, law, microsoft, phishing, programming, scam, service, strategy, threat, toolLegal victory with limitations: Microsoft’s investigation identified Joshua Ogundipe, based in Nigeria, as the operation’s leader and primary architect. The company filed a lawsuit against Ogundipe and four associates listed as John Does in late August, then obtained a court order from the US District Court for the Southern District of New York in early…
-
BreachForums kingpin goes from walk-free deal to 3-year stretch
Prosecutors say Conor Fitzpatrick’s crimes caused ‘incalculable’ damage First seen on theregister.com Jump to article: www.theregister.com/2025/09/17/breachforums_founder_prison/
-
Microsoft Shuts Down RaccoonO365 Phishing Ring, Seizes 338 Websites
Microsoft’s Digital Crimes Unit dismantled RaccoonO365, a major phishing service that stole thousands of user credentials and targeted US healthcare organisations. Discover how the operation worked and its global impact. First seen on hackread.com Jump to article: hackread.com/microsoft-shuts-down-raccoono365-phishing-seizes-sites/
-
Microsoft Takes Down 300+ Websites Behind RaccoonO365 Phishing Scheme
Tags: access, control, crime, crimes, cyber, cybercrime, infrastructure, microsoft, phishing, serviceMicrosoft’s Digital Crimes Unit (DCU) has seized control of 338 websites facilitating RaccoonO365, the rapidly expanding phishing-as-a-service platform that enables anyone to harvest Microsoft 365 credentials. Acting under a court order from the Southern District of New York, the DCU disrupted the operation’s technical infrastructure, denying cybercriminals access to victims and cutting off their revenue…
-
RaccoonO365 Phishing Network Dismantled as Microsoft, Cloudflare Take Down 338 Domains
Microsoft’s Digital Crimes Unit said it teamed up with Cloudflare to coordinate the seizure of 338 domains used by RaccoonO365, a financially motivated threat group that was behind a phishing-as-a-service (Phaas) toolkit used to steal more than 5,000 Microsoft 365 credentials from 94 countries since July 2024.”Using a court order granted by the Southern District…
-
RaccoonO365 Phishing Network Shut Down After Microsoft and Cloudflare Disrupt 338 Domains
Microsoft’s Digital Crimes Unit said it teamed up with Cloudflare to coordinate the seizure of 338 domains used by RaccoonO365, a financially motivated threat group that was behind a phishing-as-a-service (Phaas) toolkit used to steal more than 5,000 Microsoft 365 credentials from 94 countries since July 2024.”Using a court order granted by the Southern District…
-
Principal Financial pioneers biometric authentication to beat online fraud
Tags: attack, authentication, business, ciso, compliance, conference, crime, crimes, data, finance, fraud, government, privacy, risk, strategy, threat, tool, vulnerabilityImplementing quickly and decisively. Fraud was rising at an alarming pace, so speed mattered. Principal had to test, validate, and deploy a solution in months, not years.Balancing security with usability. Principal needed biometric authentication that was simple enough that customers wouldn’t get frustrated and abandon the process.Navigating uncharted territory. Principal was shifting to DIVA without…
-
TDL001 – Cybersecurity Explained: Privacy, Threats, and the Future – Chester Wisniewski
Tags: access, ai, attack, backdoor, breach, business, ciso, computer, country, crime, crimes, cyber, cybercrime, cybersecurity, data-breach, defense, detection, edr, email, finance, firewall, gartner, government, guide, hacker, hacking, Hardware, infosec, Internet, jobs, linkedin, mail, malicious, microsoft, military, monitoring, network, password, phishing, phone, privacy, programming, ransomware, risk, russia, scam, skills, software, sophos, spam, sql, strategy, switch, technology, threat, update, virus, vulnerability, wifi, windowsSummary “The Defenders Log” Episode 1 features host David Redekop and guest Chet Wisniewski discussing the dynamic world of cybersecurity. Wisniewski, with decades of experience, traces his journey from early BBS and phone network exploration to becoming a cybersecurity expert. They delve into the evolution of hacking, the emergence of profitable cybercrime like email spam,…
-
TRM Launches Industry-Wide Platform to Fight Crypto Crimes
With Beacon Network, TRM Labs has brought together law enforcement and some of the largest crypto exchanges to fight against crypto crimes First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/trm-labs-beacon-network-fight/
-
TRM Launches Industry-Wide Platform to Fight Crypto Crimes
With Beacon Network, TRM Labs has brought together law enforcement and some of the largest crypto exchanges to fight against crypto crimes First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/trm-labs-beacon-network-fight/
-
493 Cases of Sextortion Against Children Linked to Notorious Scam Compounds
Scam compounds in Cambodia, Myanmar, and Laos have conned people out of billions. New research shows they may be linked to child sextortion crimes too. First seen on wired.com Jump to article: www.wired.com/story/child-sextorition-scam-compounds-southeast-asia/
-
Ghanaian fraudsters arrested for BEC/Sakawa
In Nigeria, scammers who specialize in Romance Scams and BEC are called “Yahoo Boys.” In Ghana, the term for the same activity is “Sakawa.” Several Ghanaian headlines are talking about this case with headlines such as “Multimillion dollar Sakawa” or “Sakawa Chairman Busted” or “Sakawa Kingpin Bows to Extradition!” On 08AUG2025 the US Attorney’s office…
-
Operation Chakra V: Call Center Scammers and your PII
Here we have another cautionary tale about off-shoring customer service when faced with the reality of Call Center Scams that commit fraud via Tech Support Scams and Government Impersonation. In this case, FirstIdea, an Indian company is charged with committing fraud against at least 100 victims from Australia and the UK. FirstIdea.us, according to their…
-
Germany limits police spyware use to serious crimes
Germany’s top court ruled police can use spyware only for crimes punishable by at least three years in prison. Germany’s top court ruled that police may only use spyware to monitor devices in cases involving crimes with a maximum sentence of at least three years. >>The interference with both the fundamental right protecting IT-systems and Art. 10(1) of…
-
Germany’s top court holds that police can only use spyware to investigate serious crimes
The plaintiffs argued that a 2017 rules change enabling law enforcement to use spyware to eavesdrop on encrypted chats and messaging platforms could unfairly expose communications belonging to people who are not criminal suspects. First seen on therecord.media Jump to article: therecord.media/germany-spyware-limitations-court-rules
-
IRL Com recruits teens for real-life stabbings, shootings, FBI warns
From scams to violence, the crimes extend beyond the digital realm First seen on theregister.com Jump to article: www.theregister.com/2025/07/23/irl_com_recruits_teens/
-
Armenian Extradited to US Over Ryuk Ransomware
The suspect faces three charges for his alleged crimes that could earn him up to five years in federal prison, and a heap of fines. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/armenian-extradited-ryuk-ransomware
-
Meme Crimes Can You Conspire By Meme?
Can a person be convicted of a federal conspiracy solely by posting misleading political memes online, without ever having communicated or knowingly coordinated with their alleged co-conspirators? First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/07/meme-crimes-can-you-conspire-by-meme/
-
Pro basketball player and 4 youths arrested in connection to ransomware crimes
Suspects were allegedly involved in a string of ransomware breaches. First seen on arstechnica.com Jump to article: arstechnica.com/security/2025/07/pro-basketball-player-and-4-youths-arrested-in-connection-to-ransomware-crimes/
-
Tech firms complicit in ‘economy of genocide’, says UN rapporteur
A UN special rapporteur has called for technology firms operating in Israel and the Occupied Palestinian Territories to immediately halt their activities, in wider report about the role corporate entities have played in the Israeli state’s ongoing ‘crimes of apartheid and genocide’ First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366626968/Tech-firms-complicit-in-economy-of-genocide-says-UN-rapporteur
-
Virginia county says April ransomware attack exposed employee SSNs
Carol Steele, the county’s administrator, said they hired cybersecurity experts to help with the recovery and notified the FBI’s Cyber Crimes Division as well as the Cyber Fusion Center of the Virginia State Police. First seen on therecord.media Jump to article: therecord.media/virginia-county-says-ransomware-attack-exposed-ssns
-
Second espionage-linked cyberattack hits ICC, exposing persistent threats to global justice systems
Tags: attack, crime, crimes, cyber, cyberattack, cybersecurity, data, disinformation, espionage, identity, infrastructure, intelligence, international, Internet, office, resilience, russia, spy, threat, ukrainePattern of sophisticated cyber espionage: This marks the second major cybersecurity incident targeting the ICC in recent years. In September 2023, the court disclosed it had suffered what it later characterized as “a targeted and sophisticated attack with the objective of espionage” that was “a serious attempt to undermine the Court’s mandate.”According to reports following…
-
International Criminal Court Hacked via Sophisticated Cyber Campaign
The International Criminal Court (ICC), the global tribunal responsible for prosecuting serious international crimes, has been targeted by a sophisticated and highly focused cyberattack late last week. The Court confirmed that the incident, which marks the second such breach in recent years, was quickly detected and contained through its robust cybersecurity measures. According to an…
-
Reported Impersonation Scams Surge 148% as AI Takes Hold
New ITRC data reveals identity crimes are down but impersonation scams now account for a third of all scams First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/reported-impersonation-scams-surge/
-
Microsoft launches European Security Program to counter nation-state threats
Tags: access, ai, attack, blizzard, cloud, control, country, crime, crimes, cyber, cybercrime, cybersecurity, framework, google, government, group, infrastructure, intelligence, malicious, malware, microsoft, network, open-source, resilience, russia, service, strategy, threat, vulnerabilityThree-component strategy: The European Security Program will operate through three main components designed to strengthen continental cyber defenses.The first element centers on enhanced threat intelligence sharing, where Microsoft will provide European governments with AI-enhanced, real-time insights into nation-state tactics.The company’s Digital Crimes Unit will expand intelligence sharing through the Cybercrime Threat Intelligence Program, giving European…
-
The US Is Storing Migrant Children’s DNA in a Criminal Database
Customs and Border Protection has swabbed the DNA of migrant children as young as 4, whose genetic data is uploaded to an FBI-run database that can track them if they commit crimes in the future. First seen on wired.com Jump to article: www.wired.com/story/cbp-dna-migrant-children-fbi-codis/

