Tag: cybercrime
-
Scattered Spider Hacker Gets 10 Years, $13M Restitution for SIM Swapping Crypto Theft
A 20-year-old member of the notorious cybercrime gang known as Scattered Spider has been sentenced to ten years in prison in the U.S. in connection with a series of major hacks and cryptocurrency thefts.Noah Michael Urban pleaded guilty to charges related to wire fraud and aggravated identity theft back in April 2025. News of Urban’s…
-
Scattered Spider hacker gets sentenced to 10 years in prison
Noah Michael Urban, a key member of the Scattered Spider cybercrime collective, was sentenced to 10 years in prison on Wednesday after pleading guilty to charges of wire fraud and conspiracy in April. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/scattered-spider-hacker-gets-sentenced-to-10-years-in-prison/
-
22-year-old Operator of ‘Rapper Bot’ Botnet Charged for Launching 3 Tbps DDoS Attack
Federal authorities have charged a 22-year-old Oregon man with operating one of the most powerful distributed denial-of-service (DDoS) botnets ever discovered, marking a significant victory in the ongoing battle against cybercriminal infrastructure. Ethan Foltz of Eugene, Oregon, faces federal charges for allegedly developing and administering the >>Rapper Bot
-
AI website builder Lovable increasingly abused for malicious activity
Cybercriminals are increasingly abusing the AI-powered Lovable website creation and hosting platform to generate phishing pages, malware-dropping portals, and various fraudulent websites. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/ai-website-builder-lovable-increasingly-abused-for-malicious-activity/
-
Cybercriminals Abuse Vibe Coding Service to Create Malicious Sites
Some LLM-created scripts and emails can lower the barrier of entry for low-skill attackers, who can use services like Lovable to create convincing, effective websites in minutes. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/cybercriminals-abuse-vibe-coding-service-malicious-sites
-
Oregon Man Charged in Global “Rapper Bot” DDoSHire Scheme
A massive cybercrime operation tied to one of the internet’s most powerful DDoS-for-hire botnets, Rapper Bot, has been brought down, and at the center of the case is a 22-year-old man from Eugene, Oregon. According to a federal criminal complaint filed on August 6, 2025, in the District of Alaska, Ethan Foltz is alleged to…
-
How Online Poker Platforms Are Reinventing Cybersecurity Standards for Digital Gaming
The threat of cybercrime is continuously growing online. Developing technology can certainly be a great tool for societal improvement. However, it has its ramifications. The most obvious is that new technologies mean that bad actors have the ability to more effectively threaten those who are just looking for a good time. The concern regarding cybersecurity…
-
Mobile Phishers Target Brokerage Customers in ‘Ramp and Dump’ Cashout Scheme
Cybercriminal groups specializing in advanced mobile phishing kits have evolved their operations beyond stealing payment card data for mobile wallet enrollment, now pivoting to exploit brokerage accounts in sophisticated ‘ramp and dump’ schemes. This shift, as detailed in recent research by security experts, leverages compromised user credentials to manipulate foreign stock prices, circumventing traditional security…
-
Hackers Exploit Cisco Secure Links to Evade Scanners and Bypass Filters
Tags: attack, cisco, credentials, cyber, cybercrime, detection, email, exploit, hacker, infrastructure, network, phishingCybercriminals have discovered a sophisticated new attack vector that weaponizes Cisco’s security infrastructure against users, according to recent research from Raven AI. The company’s context-aware detection systems uncovered a credential phishing campaign that exploits Cisco Safe Links to evade traditional email security scanners and bypass network filters, highlighting a dangerous trend of attackers turning trusted…
-
DoJ Seizes $2.8M in Crypto from Zeppelin Ransomware Group
The Department of Justice has announced a significant victory against cybercriminals, seizing over $2.8 million in cryptocurrency and additional assets from a Zeppelin ransomware operation. The coordinated law enforcement action targeted Ianis Aleksandrovich Antropenko, who faces federal charges for his role in deploying ransomware attacks against victims worldwide, including numerous American organizations and businesses. Major…
-
New Ghost-Tapping Attacks Target Apple Pay and Google Pay Users’ Linked Cards
Chinese-speaking cybercriminals are using ghost-tapping techniques to take advantage of Near Field Communication (NFC) relay tactics in a sophisticated evolution of payment card fraud. They are mainly targeting mobile payment services such as Apple Pay and Google Pay. This attack vector involves relaying stolen payment card credentials from compromised devices to mules’ burner phones, enabling…
-
Scammers Target BackSchool Deals, Diverting Shoppers to Fraud Sites
As the back-to-school season intensifies, cybercriminals are exploiting the heightened online shopping activity by deploying sophisticated scams aimed at siphoning funds and personal data from unsuspecting consumers. According to retail analytics, U.S. households allocate approximately $860 per child on essentials like supplies, apparel, and electronics, creating a lucrative window for threat actors. These perpetrators engineer…
-
Ganzheitlicher Ansatz für die IT-Sicherheit
Für eine effektive Verteidigung sind integrierte, sorgfältig geplante und implementierte Strategien erforderlich. Zero Trust, Threat-Intelligence, Mitarbeitersensibilisierung und die Einführung vertrauenswürdiger Lösungen sind nur einige der Eckpfeiler einer effizienten Strategie. Der zunehmende Einsatz von KI bei Cybercrimes hat das Bedrohungsszenario komplexer gemacht. Bereits im Jahr 2023 sorgte der Fall eines Mitarbeiters eines britischen Unternehmens für… First…
-
New Crypto24 Ransomware Attacks Bypass EDR
While several cybercrime groups have embraced EDR killers, researchers say the deep knowledge and technical skills demonstrated by Crypto24 signify a dangerous escalation. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/crypto24-ransomware-bypass-edr
-
Police & Government Email Access for Sale on Dark Web
Cybercriminals are auctioning off live email credentials, giving other criminals access to sensitive systems, confidential intelligence, and, potentially, a higher success rate than ever. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/government-email-sale-dark-web
-
Cybercrime Groups ShinyHunters, Scattered Spider Join Forces in Extortion Attacks on Businesses
Tags: attack, credentials, cybercrime, data, extortion, finance, group, service, tactics, technology, theftAn ongoing data extortion campaign targeting Salesforce customers may soon turn its attention to financial services and technology service providers, as ShinyHunters and Scattered Spider appear to be working hand in hand, new findings show.”This latest wave of ShinyHunters-attributed attacks reveals a dramatic shift in tactics, moving beyond the group’s previous credential theft and database…
-
Cybercriminals Exploit Low-Cost Initial Access Broker Market
Rapid7 found that threat actors are able to purchase low-cost initial access broker services, with many packages offering a variety of options First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/cybercriminals-low-cost-initial/
-
ShinyHunters Tactics Now Mirror Scattered Spider
There’s growing evidence that two of arguably the most dangerous cybercrime groups out there are tag-teaming big targets. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/shinyhunters-tactics-mirror-scattered-spider
-
Oh, great.Three notorious cybercrime gangs appear to be collaborating
Tags: cybercrimeScattered Spider, ShinyHunters, and Lapsus$ spent the weekend bragging to each other on a Telegram channel First seen on theregister.com Jump to article: www.theregister.com/2025/08/12/scattered_spidershinyhunterslapsus_cybercrime_collab/
-
Oh, great.Three notorious cybercrime gangs appear to be collaborating
Tags: cybercrimeScattered Spider, ShinyHunters, and Lapsus$ spent the weekend bragging to each other on a Telegram channel First seen on theregister.com Jump to article: www.theregister.com/2025/08/12/scattered_spidershinyhunterslapsus_cybercrime_collab/
-
9 things CISOs need know about the dark web
Tags: 2fa, access, ai, attack, automation, backup, blockchain, botnet, breach, captcha, ceo, ciso, communications, corporate, credentials, crypto, cyber, cybercrime, cybersecurity, dark-web, data, data-breach, ddos, deep-fake, defense, detection, dns, exploit, extortion, finance, fraud, group, guide, hacking, identity, incident, incident response, infrastructure, intelligence, international, jobs, law, leak, lockbit, malicious, malware, marketplace, mfa, monitoring, network, open-source, phishing, privacy, ransomware, resilience, risk, russia, saas, scam, service, strategy, tactics, technology, threat, tool, training, vpn, vulnerability, zero-dayNew groups form after major marketplaces are disrupted: International takedown efforts damage infrastructure and curb cybercrime operations by disrupting larger operations, removing major players from the ecosystem and scattering user bases.However, the dark web is highly adaptive and sophisticated actors often maintain contingency plans, including mirrors, backups, and alternative forums, according to Edward Currie, associate…
-
DarkBit Hackers Target VMware ESXi Servers to Deploy Ransomware and Encrypt VMDK Files
A sophisticated ransomware attack by a previously unknown cybercriminal group called >>DarkBit
-
DarkBit Hackers Target VMware ESXi Servers to Deploy Ransomware and Encrypt VMDK Files
A sophisticated ransomware attack by a previously unknown cybercriminal group called >>DarkBit
-
Report: Chaos bei der Verantwortung für Cybersicherheit
Sicherheitsexperte Dennis Weyel: »Unternehmen sollten einen Chief Information Security Officer als zentrale Sicherheitsinstanz etablieren.« Das Bundesamt für Sicherheit in der Informationstechnik (BSI) stuft die IT-Sicherheitslage in Deutschland im aktuellen Lagebericht 2024 als »besorgniserregend« ein, aber in der Wirtschaft ist die Verantwortlichkeit für die Abwehr der Cyberkriminalität weitgehend »chaotisch« organisiert. Diese Diskrepanz deckt der »Cyber Security……
-
Report: Chaos bei der Verantwortung für Cybersicherheit
Sicherheitsexperte Dennis Weyel: »Unternehmen sollten einen Chief Information Security Officer als zentrale Sicherheitsinstanz etablieren.« Das Bundesamt für Sicherheit in der Informationstechnik (BSI) stuft die IT-Sicherheitslage in Deutschland im aktuellen Lagebericht 2024 als »besorgniserregend« ein, aber in der Wirtschaft ist die Verantwortlichkeit für die Abwehr der Cyberkriminalität weitgehend »chaotisch« organisiert. Diese Diskrepanz deckt der »Cyber Security……
-
Pediatric Practice, IT Vendor Settle $5.15M Breach Suit
At Least 918K Affected in 2024 BianLian Data Theft Attack. A New York-based pediatric practice and its managed services vendor have agreed to pay $5.15 million to settle a proposed class action lawsuit stemming from a 2024 data theft attack affecting more than 918,000 people and allegedly carried out by cybercrime gang BianLian. First seen…
-
CastleBot MaaS Released Diverse Payloads in Coordinated Mass Ransomware Attacks
IBM X-Force has uncovered CastleBot, a nascent malware framework operating as a Malware-as-a-Service (MaaS) platform, enabling cybercriminals to deploy a spectrum of payloads ranging from infostealers to sophisticated backdoors implicated in ransomware operations. First detected in early 2025 with heightened activity since May, CastleBot facilitates the delivery of threats like NetSupport and WarmCookie, which have…

