Tag: cybercrime
-
AI Supercharges Attacks in Cybercrime’s New ‘Fifth Wave’
Weaponized AI is fueling a new wave of cybercrime, said Group-IB in its latest report First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/ai-supercharges-attacks-cybercrime/
-
Ransomware ‘Most Wanted’: Cops Seek Head of Black Basta
Crackdown Targets Multiple Members of Cybercrime Group, Including ‘Hash Crackers’. Police raided two suspected members of the notorious Black Basta ransomware group – tied to over 600 victims worldwide and many millions in ransom payments – in Ukraine and issued an international arrest warrant for the Russian national suspected of being the operation’s founder and…
-
Cybercriminals Impersonate Malwarebytes to Steal User Credentials
As part of an ongoing effort to highlight active and technically interesting intrusions, a new “Flash Hunting Findings” investigation has uncovered a short but well”‘structured malware campaign impersonating MalwareBytes to deliver infostealers and steal user logins and crypto”‘wallet data. The activity was observed between January 11 and January 15, 2026, and is characterized by consistent…
-
The Year Ransomware Went Fully Decentralized: Cyble’s 2025 Threat Analysis
Cyble’s Annual Threat Landscape Report for 2025 documents a cybercrime environment that remained volatile even as international law enforcement agencies escalated disruption efforts. Large-scale takedowns, arrests, and infrastructure seizures failed to slow adversaries for long. Instead, cybercriminal ecosystems fractured, reorganized, and re-emerged across decentralized platforms, encrypted messaging channels, and invitation-only forums. The ransomware landscape, in particular, demonstrated a capacity…
-
How Security Teams Use IP Location and DNS History In Cybercrime Investigation
In many security teams, a cybercrime investigation often begins without a complete picture. It starts with a small signal. A suspicious login. An unexpected outbound connection. A single alert that does not look right. From that moment, investigators need context. Logs alone show what happened, but not who is behind it or why it matters.…
-
Microsoft taps UK courts to dismantle cybercrime host RedVDS
Redmond says cheap virtual desktops powered a global wave of phishing and fraud First seen on theregister.com Jump to article: www.theregister.com/2026/01/15/microsoft_uk_courts_redvds/
-
Microsoft Legal Action Disrupts RedVDS Cybercrime Infrastructure Used for Online Fraud
Microsoft on Wednesday announced that it has taken a “coordinated legal action” in the U.S. and the U.K. to disrupt a cybercrime subscription service called RedVDS that has allegedly fueled millions in fraud losses.The effort, per the tech giant, is part of a broader law enforcement effort in collaboration with law enforcement authorities that has…
-
Schlag gegen Cyberkriminelle in Deutschland
Tags: cybercrime, germany, infrastructure, Internet, mail, microsoft, phishing, software, usa, windowsInternationalen Ermittlern und Microsoft ist ein Schlag gegen die Infrastruktur des Cybercrime-Dienst RedVDS gelungen. Die Server standen auch in Deutschland.In einer konzertierten Aktion haben Strafverfolgungsbehörden in Deutschland, den USA und Großbritannien zusammen mit Microsoft den globalen Cyberkriminalitätsdienst RedVDS zerschlagen. Das bestätigten die Zentralstelle für Internet- und Computerkriminalität (ZIT) bei der Generalstaatsanwaltschaft in Frankfurt sowie das Landeskriminalamt…
-
Microsoft shuts down RedVDS cybercrime subscription service tied to millions in fraud losses
Microsoft has announced a coordinated legal action in the United States and the United Kingdom to disrupt RedVDS, a global cybercrime subscription service tied to large-scale … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/01/15/microsoft-shuts-down-redvds-cybercrime-subscription-service/
-
Cybercrime-Hoster zerschlagen: Razzia in deutschem Rechenzentrum
Tags: cybercrimeIn Limburg wurden 70 Server des VDS-Hosters RedVDS beschlagnahmt. Cyberkriminelle sollen darüber Millionenschäden verursacht haben. First seen on golem.de Jump to article: www.golem.de/news/cybercrime-hoster-zerschlagen-razzia-in-deutschem-rechenzentrum-2601-204209.html
-
Microsoft disrupts massive RedVDS cybercrime virtual desktop service
Microsoft announced on Wednesday that it disrupted RedVDS, a massive cybercrime platform linked to at least $40 million in reported losses in the United States alone since March 2025. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/microsoft-seizes-servers-disrupts-massive-redvds-cybercrime-platform/
-
Cybersichere Backups: Backup ist keine Lebensversicherung für Daten
Geballte Kompetenz mit höchstem Know-how für Cybercrime und Cybersicherheit konnte das Polizeipräsidium Köln als Veranstalter knapp 100 Unternehmen seiner Stadt anbieten. Mitveranstalter waren das DIGITAL.SICHER.NRW als Kompetenzzentrum für Cybersicherheit in der Wirtschaft, die IHK Köln, die Handwerkskammer Köln sowie IT-Sicherheitsberater und Backup-Experten. Diese vermittelten passende Strategien, um möglichen Cyberangriffen mit maximaler Abwehr zu begegnen. ……
-
Neue Regeln, neue Risiken: Die wichtigsten ITHandlungsfelder für 2026
In Deutschland müssen 2026 zahlreiche neue Vorschriften im Bereich IT-Security eingehalten werden, unter anderem zur Umsetzung von EU-Vorgaben. Sie erfordern angepasste, überarbeitete oder sogar neue Ansätze für die Compliance. Hinzu kommen weiter steigende Gefahren durch KI-basierte Attacken, Cybercrime-as-a-Service und erweiterte Angriffsflächen. Unter diesen Bedingungen reichen klassische, überwiegend reaktive Verteidigungsmodelle immer weniger aus. Sicherheit muss… First…
-
Microsoft, Law Enforcement Disrupt RedVDS Global Cybercrime Service
Microsoft and law enforcement agencies in Europe disrupted the operations of RedVDS, a global cybercrime service that sold cheap and disposable dedicated virtual servers to threat actors that used them to run BEC, phishing, and other fraud campaigns. The vendor now wants to shut down its payment networks and find the operators behind it. First…
-
Sophisticated VoidLink malware framework targets Linux cloud servers
Cloud reconnaissance and adaptability: The malware was designed to detect whether it’s being executed on various cloud platforms such as AWS, GCP, Azure, Alibaba, and Tencent and then to start leveraging those vendors’ management APIs. The code suggests the developers plan to add detections for Huawei, DigitalOcean, and Vultr in the future.The malware collects extensive…
-
Microsoft Disrupts Cybercrime Service RedVDS
RedVDS, a cybercrime-as-a-service operation that has stolen millions from victims, lost two domains to a law enforcement operation supported by Microsoft. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/microsoft-disrupts-cybercrime-service-redvds
-
Microsoft disrupts RedVDS cybercrime platform behind $40 million in scam losses
Microsoft and law enforcement partners took down a popular cybercriminal subscription service called RedVDS that was used to enable more than $40 million in fraud losses in the United States alone. First seen on therecord.media Jump to article: therecord.media/microsoft-redvds-cybercrime-scam
-
Microsoft seizes RedVDS infrastructure, disrupts fast-growing cybercrime marketplace
Tags: attack, credentials, cybercrime, infrastructure, marketplace, microsoft, phishing, service, theft, toolThe service became a prolific tool for cybercriminals in the past year, as it facilitated thousands of attacks involving credential theft, account takeovers, mass phishing and payment diversion fraud. First seen on cyberscoop.com Jump to article: cyberscoop.com/microsoft-seizes-disrupts-redvds-cybercrime-marketplace/
-
How Cybercrime Markets Launder Breach Proceeds and What Security Teams Miss
Explore how cybercrime markets turn stolen data into laundered funds using dollar”‘pegged assets, mixers and exchanges-and why tracking BTC USDT price and stablecoin flows now matters for security, fraud and AML teams. First seen on hackread.com Jump to article: hackread.com/cybercrime-markets-stablecoins-launder-breach-proceeds/
-
How Cybercrime Markets Launder Breach Proceeds and What Security Teams Miss
Explore how cybercrime markets turn stolen data into laundered funds using dollar”‘pegged assets, mixers and exchanges-and why tracking BTC USDT price and stablecoin flows now matters for security, fraud and AML teams. First seen on hackread.com Jump to article: hackread.com/cybercrime-markets-stablecoins-launder-breach-proceeds/
-
Cybercrime und Desinformation – Fake-Leaks als Mittel der Cybererpressung
First seen on security-insider.de Jump to article: www.security-insider.de/fake-leaks-cybererpressung-ransomware-a-0117c0adbed3cf60df8fc018dee3f256/
-
Cybercrime und Desinformation – Fake-Leaks als Mittel der Cybererpressung
First seen on security-insider.de Jump to article: www.security-insider.de/fake-leaks-cybererpressung-ransomware-a-0117c0adbed3cf60df8fc018dee3f256/
-
Cybercrime und Desinformation – Fake-Leaks als Mittel der Cybererpressung
First seen on security-insider.de Jump to article: www.security-insider.de/fake-leaks-cybererpressung-ransomware-a-0117c0adbed3cf60df8fc018dee3f256/
-
SpyCloud Launches Supply Chain Solution to Combat Rising Third-Party Identity Threats
Tags: access, ai, authentication, breach, business, communications, compliance, credentials, cybercrime, cybersecurity, dark-web, data, data-breach, defense, government, grc, group, identity, incident response, infosec, infrastructure, malware, monitoring, phishing, ransomware, risk, risk-management, service, supply-chain, technology, theft, threat, toolFor government agencies and critical infrastructure operators, supply chain threats present national security risks that demand heightened vigilance. Public sector organizations managing sensitive data and critical services increasingly rely on contractors and technology vendors whose compromised credentials could provide adversaries with pathways into classified systems or essential infrastructure. Last year alone, the top 98 Defense…
-
Cybersecurity risk will accelerate this year, fueled in part by AI, says World Economic Forum
Tags: ai, attack, automation, business, ceo, ciso, control, country, cryptography, cyber, cybercrime, cybersecurity, data, detection, exploit, finance, framework, fraud, governance, healthcare, incident, infrastructure, international, middle-east, phishing, ransomware, resilience, risk, service, skills, software, strategy, supply-chain, technology, threat, tool, vulnerabilityAI is anticipated to be the most significant driver of change in cybersecurity in 2026, according to 94% of survey respondents;87% of respondents said AI-related vulnerabilities had increased in the past year. Other cyber risks that had increased were (in order) cyber-enabled fraud and phishing, supply chain disruption, and exploitation of software vulnerabilities;confidence in national cyber…
-
BreachForums Data Leak Raises Fresh Questions Over Credibility
BreachForums, one of the most well-known English-language cybercrime forums, has reportedly suffered a data breach, exposing user information after the site was taken offline once again. As reported by The Register, a database linked to the forum was leaked online, potentially revealing account details, private messages and metadata on close to 325,000 accounts. However, security…
-
Enterprise security faces a three-front war: cybercrime, AI misuse, and supply chains
Security teams are dealing with pressures tied to AI use, geopolitical instability, and expanding cybercrime that reach beyond technical controls, according to findings from … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/01/13/wef-global-cybersecurity-outlook-2026/

