Tag: cybercrime
-
Threat Actors Exploiting Open-Source C2 Frameworks to Deploy Malicious Payloads
Tags: control, cyber, cyberattack, cybercrime, exploit, framework, hacking, intelligence, malicious, open-source, russia, threat, toolThreat intelligence researchers have uncovered a growing campaign where cybercriminals are weaponizing AdaptixC2, a legitimate open-source Command and Control framework designed for authorized penetration testers. The discovery reveals how threat actors are exploiting ethical hacking tools to conduct sophisticated cyberattacks, with significant ties linking the framework’s development to Russian criminal networks. Silent Push threat analysts…
-
So schützen Sie Ihr Geld beim Onlinebanking
Sparen findet nicht nur am Bankschalter statt: Viele Menschen nutzen auch Onlinebanking und mobile Banking-Apps, um ihre Finanzen zu verwalten. Etwa jede zehnte Person, die im Vorjahr von Cyberkriminalität betroffen war, erlebte jedoch Betrug beim Onlinebanking (11 %). Wer sein Geld online verwaltet, sollte seine digitale Sicherheit daher genauso ernstnehmen wie die Wahl seiner Bank….…
-
So schützen Sie Ihr Geld beim Onlinebanking
Sparen findet nicht nur am Bankschalter statt: Viele Menschen nutzen auch Onlinebanking und mobile Banking-Apps, um ihre Finanzen zu verwalten. Etwa jede zehnte Person, die im Vorjahr von Cyberkriminalität betroffen war, erlebte jedoch Betrug beim Onlinebanking (11 %). Wer sein Geld online verwaltet, sollte seine digitale Sicherheit daher genauso ernstnehmen wie die Wahl seiner Bank….…
-
ClickFix Infrastructure Surprises Inform Better Blocking
Big Crossover Found Between ClickFix and Adversary-in-the-Middle Infrastructure. Tracking how cybercriminals and their service providers use malicious infrastructure can give defenders an edge for blocking their targeting. New research spotted a massive crossover between IP addresses used for both ClickFix and adversary-in-the-middle attacks. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/clickfix-infrastructure-surprises-inform-better-blocking-a-29888
-
Strengthening security with a converged security and networking platform
created new security risks. Products are designed with different fundamental security assumptions. Each has a separate security policy and requires a specially trained administrator, making it difficult to coordinate security policies and use products together. The result is a fragmented security infrastructure with inconsistent rules and poor visibility. Conflicting policies and uneven enforcement create the…
-
Strengthening security with a converged security and networking platform
created new security risks. Products are designed with different fundamental security assumptions. Each has a separate security policy and requires a specially trained administrator, making it difficult to coordinate security policies and use products together. The result is a fragmented security infrastructure with inconsistent rules and poor visibility. Conflicting policies and uneven enforcement create the…
-
Open-source AdaptixC2 hacking tool has fans in Russian cybercrime underground
Available on GitHub and promoted to professional penetration testers, the tool AdaptixC2 has been used to spread loader malware associated with Russian ransomware groups, researchers said. First seen on therecord.media Jump to article: therecord.media/open-source-adaptixc2-red-teaming-tool-russian-cybercrime
-
Open-source AdaptixC2 hacking tool has fans in Russian cybercrime underground
Available on GitHub and promoted to professional penetration testers, the tool AdaptixC2 has been used to spread loader malware associated with Russian ransomware groups, researchers said. First seen on therecord.media Jump to article: therecord.media/open-source-adaptixc2-red-teaming-tool-russian-cybercrime
-
Threat Actors Utilize AdaptixC2 for Malicious Payload Delivery
Cybercriminals are abusing AdaptixC2, a legitimate emulation framework, in ransomware campaigns First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/adaptixc2-malicious-payload/
-
Vertrauen unter Beschuss: KI und Automatisierung befeuern eine neue Welle zielgerichteter Cyberkriminalität
Was sind die wichtigsten Veränderungen in der globalen Cybersicherheitslandschaft zwischen Juli und September 2025? Neue Erkenntnisse: KI-gestützte Phishing-Fabriken, zunehmende SMS-Kampagnen, Datenlecks und digitales Tracking prägen die Cyberkriminalitätslandschaft im dritten Quartal. Zu den wichtigsten Ergebnissen des Berichts Q3/2025 Gen Threat Report von Gen gehören 140.000 global durch KI generierte Phishing-Websites, einen Anstieg von durch KI… First…
-
Vertrauen unter Beschuss: KI und Automatisierung befeuern eine neue Welle zielgerichteter Cyberkriminalität
Was sind die wichtigsten Veränderungen in der globalen Cybersicherheitslandschaft zwischen Juli und September 2025? Neue Erkenntnisse: KI-gestützte Phishing-Fabriken, zunehmende SMS-Kampagnen, Datenlecks und digitales Tracking prägen die Cyberkriminalitätslandschaft im dritten Quartal. Zu den wichtigsten Ergebnissen des Berichts Q3/2025 Gen Threat Report von Gen gehören 140.000 global durch KI generierte Phishing-Websites, einen Anstieg von durch KI… First…
-
US Withholds Support for UN Global Cybercrime Treaty
US Cites Risk of Treaty Being Weaponized by Authoritarian Regimes, Privacy Concerns. The U.S. declined to sign the new U.N. cybercrime convention despite support from 72 nations and its backing by Russia and China over fears it could be exploited by authoritarian states to legitimize surveillance, censor dissent and pressure cross-border data cooperation. First seen…
-
US Withholds Support for UN Global Cybercrime Treaty
US Cites Risk of Treaty Being Weaponized by Authoritarian Regimes, Privacy Concerns. The U.S. declined to sign the new U.N. cybercrime convention despite support from 72 nations and its backing by Russia and China over fears it could be exploited by authoritarian states to legitimize surveillance, censor dissent and pressure cross-border data cooperation. First seen…
-
NFC Relay Attack: 700+ Android Apps Harvest Banking Login Details
Tags: android, attack, banking, credentials, cyber, cybercrime, finance, login, malicious, nfc, russia, technology, threatA sophisticated cybercrime campaign leveraging Near Field Communication technology has exploded across multiple continents, with researchers at zLabs identifying over 760 malicious Android applications designed to steal banking credentials and facilitate fraudulent transactions. What initially appeared as isolated incidents in April 2024 has evolved into a large-scale threat operation targeting financial institutions across Russia, Poland,…
-
NFC Relay Attack: 700+ Android Apps Harvest Banking Login Details
Tags: android, attack, banking, credentials, cyber, cybercrime, finance, login, malicious, nfc, russia, technology, threatA sophisticated cybercrime campaign leveraging Near Field Communication technology has exploded across multiple continents, with researchers at zLabs identifying over 760 malicious Android applications designed to steal banking credentials and facilitate fraudulent transactions. What initially appeared as isolated incidents in April 2024 has evolved into a large-scale threat operation targeting financial institutions across Russia, Poland,…
-
‘Scamming became the new farming’: inside India’s cybercrime villages
How did an obscure district in a neglected state become India’s byword for digital deceit?On the surface, the town of Jamtara appeared no different from neighbouring districts. But, if you knew where to look, there were startling differences. In the middle of spartan villages were houses of imposing size and unusual opulence. Millions of Indians…
-
Hackers Allegedly Leak HSBC USA Customer and Financial Information
A threat actor has claimed responsibility for breaching HSBC USA, the American division of the global investment bank and financial services holding company. The cybercriminal posted an extensive database for sale on underground forums, alleging it contains fresh and comprehensive customer data stolen from the financial institution. Massive Collection of Sensitive Customer Data According to…
-
KI 2030: Wenn Maschinen Cybercrime neu erfinden
Bis 2030 werden viele Ransomware- und Datendiebstahlkampagnen vollständig von autonomen KI-Systemen durchgeführt rund um die Uhr, ohne menschliches Zutun. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/ki-2030-wenn-maschinen-cybercrime-neu-erfinden/a42523/
-
BKA-Bundeslagebild Cybercrime 2024 und Cyber-Resilience – ‘Unternehmen müssen sich auf den Ernstfall vorbereiten”
First seen on security-insider.de Jump to article: www.security-insider.de/unternehmen-muessen-sich-auf-den-ernstfall-vorbereiten-a-0354a808e25a0cd700bad0435c16df51/
-
New Atroposia RAT Uses Hidden Remote Desktop, Vulnerability Scanning and Advanced Persistence
Tags: access, credentials, cyber, cyberattack, cybercrime, malware, marketplace, network, rat, theft, vulnerabilityA sophisticated new remote access trojan called Atroposia has emerged in underground cybercrime marketplaces, offering attackers a comprehensive toolkit for hidden remote desktop access, credential theft, and network manipulation at an accessible price point. Security researchers at Varonis recently discovered the malware being promoted on underground forums, highlighting how advanced cyberattack capabilities are increasingly packaged…
-
Atroposia malware kit lowers the bar for cybercrime, and raises the stakes for enterprise defenders
Tags: apt, authentication, automation, ciso, credentials, crime, cybercrime, defense, detection, dns, endpoint, infrastructure, mail, malicious, malware, mfa, monitoring, rat, service, spam, threat, tool, update, vulnerabilityRAT toolkits proliferating: Atroposia is one of a growing number of RAT tools targeting enterprises; Varonis has also recently discovered SpamGPT and MatrixPDF, a spam-as-a-service platform and malicious PDF builder, respectively.Shipley noted that these types of packages which identify additional avenues to maintain persistence have been around for some time; Mirai, which goes back to…
-
Rethinking Identity Security in the Age of AI
Tags: access, ai, api, attack, authentication, automation, awareness, best-practice, breach, business, captcha, ceo, container, control, credentials, cyber, cybercrime, cybersecurity, data, deep-fake, defense, detection, email, endpoint, exploit, finance, fraud, Hardware, iam, identity, login, malware, mfa, monitoring, passkey, password, phishing, risk, risk-management, scam, threat, tool, vulnerabilityRethinking Identity Security in the Age of AI madhav Tue, 10/28/2025 – 06:35 Traditional identity protections were never designed for the age of AI. They can’t stop the lightning-fast, highly convincing identity attacks AI facilitates. There’s a reason that nearly 60% of businesses say compromised credentials are the leading cause of breaches. Data Security Marco…
-
Rethinking Identity Security in the Age of AI
Tags: access, ai, api, attack, authentication, automation, awareness, best-practice, breach, business, captcha, ceo, container, control, credentials, cyber, cybercrime, cybersecurity, data, deep-fake, defense, detection, email, endpoint, exploit, finance, fraud, Hardware, iam, identity, login, malware, mfa, monitoring, passkey, password, phishing, risk, risk-management, scam, threat, tool, vulnerabilityRethinking Identity Security in the Age of AI madhav Tue, 10/28/2025 – 06:35 Traditional identity protections were never designed for the age of AI. They can’t stop the lightning-fast, highly convincing identity attacks AI facilitates. There’s a reason that nearly 60% of businesses say compromised credentials are the leading cause of breaches. Data Security Marco…
-
New Atroposia malware comes with a local vulnerability scanner
A new malware-as-a-service (MaaS) platform named Atroposia provides cybercriminals a remote access trojan that combines capabilities for persistent access, evasion, data theft, and local vulnerability scanning. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/new-atroposia-malware-comes-with-a-local-vulnerability-scanner/
-
New Atroposia malware comes with a local vulnerability scanner
A new malware-as-a-service (MaaS) platform named Atroposia provides cybercriminals a remote access trojan that combines capabilities for persistent access, evasion, data theft, and local vulnerability scanning. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/new-atroposia-malware-comes-with-a-local-vulnerability-scanner/
-
Attackers Sell Turnkey Remote Access Trojan ‘Atroposia’
Atroposia, a new RAT malware, offers low-level cybercriminal affiliates the ability to utilize sophisticated stealth and persistence capabilities. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/attackers-sell-turnkey-remote-access-trojan-atroposia
-
Attackers Sell Turnkey Remote Access Trojan ‘Atroposia’
Atroposia, a new RAT malware, offers low-level cybercriminal affiliates the ability to utilize sophisticated stealth and persistence capabilities. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/attackers-sell-turnkey-remote-access-trojan-atroposia
-
UN’s First Global Cybercrime Treaty Sparks Debate Over Privacy and Surveillance
While many governments have celebrated the treaty’s adoption, rights organizations and technology firms have expressed concern. The post UN’s First Global Cybercrime Treaty Sparks Debate Over Privacy and Surveillance appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-un-cybercrime-treaty/

