Tag: cybercrime
-
Foreign hackers breached a US nuclear weapons plant via SharePoint flaws
Tags: access, attack, authentication, breach, china, control, corporate, cve, cyber, cybercrime, cybersecurity, data, defense, exploit, flaw, framework, government, group, hacker, identity, infrastructure, intelligence, Intruder, korea, microsoft, monitoring, network, ransomware, reverse-engineering, risk, russia, supply-chain, tactics, technology, theft, threat, vulnerability, zero-day, zero-trustChina or Russia? Conflicting attribution: Microsoft attributed the broader wave of SharePoint exploitations to three Chinese-linked groups: Linen Typhoon, Violet Typhoon, and a third actor it tracks as Storm-2603. The company said the attackers were preparing to deploy Warlock ransomware across affected systems.However, the source familiar with the Kansas City incident tells CSO that a…
-
TikTok videos continue to push infostealers in ClickFix attacks
Cybercriminals are using TikTok videos disguised as free activation guides for popular software like Windows, Spotify, and Netflix to spread information-stealing malware. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/tiktok-videos-continue-to-push-infostealers-in-clickfix-attacks/
-
Europol Dismantles SIM Farm Network Powering 49 Million Fake Accounts Worldwide
Europol on Friday announced the disruption of a sophisticated cybercrime-as-a-service (CaaS) platform that operated a SIM farm and enabled its customers to carry out a broad spectrum of crimes ranging from phishing to investment fraud.The coordinated law enforcement effort, dubbed Operation SIMCARTEL, saw 26 searches carried out, resulting in the arrest of seven suspects and…
-
Authorities Shut Down Cybercrime-as-a-Service, Seize 40,000 SIM Cards
Law enforcement authorities across Europe have dismantled a sophisticated cybercrime-as-a-service operation that enabled criminals to commit widespread fraud and other serious offenses across the continent. The coordinated action, codenamed ‘SIMCARTEL’, resulted in seven arrests, the seizure of over 40,000 active SIM cards, and the takedown of infrastructure that facilitated crimes causing millions of euros in…
-
Europol dismantles cybercrime network linked to $5.8M in financial losses
Authorities arrested seven people allegedly involved in the operation and seized 1,200 SIM boxes containing 40,000 active SIM cards. First seen on cyberscoop.com Jump to article: cyberscoop.com/europol-dismantles-cybercime-network-sim-boxes-fraud/
-
Europol dismantles cybercrime network linked to $5.8M in financial losses
Authorities arrested seven people allegedly involved in the operation and seized 1,200 SIM boxes containing 40,000 active SIM cards. First seen on cyberscoop.com Jump to article: cyberscoop.com/europol-dismantles-cybercime-network-sim-boxes-fraud/
-
Europol dismantles SIM box operation renting numbers for cybercrime
European law enforcement in an operation codenamed ‘SIMCARTEL’ has dismantled an illegal SIM-box service that enabled more than 3,200 fraud cases and caused at least 4.5 million euros in losses. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/europol-dismantles-sim-box-operation-renting-numbers-for-cybercrime/
-
Attackers Exploit Zendesk Authentication Issue to Flood Targets’ Inboxes with Corporate Notifications
Cybercriminals have discovered a gap in Zendesk’s ticket submission process and are using it to bombard victims with waves of misleading support messages. When configured to accept anonymous requests, however, the service can be abused to generate email floods that appear to come from legitimate corporate domains. Earlier this week, security blogger Brian Krebs was…
-
Microsoft revokes 200+ certificates abused by Vanilla Tempest in fake Teams campaign
Microsoft revoked 200+ certificates used by Vanilla Tempest to sign fake Teams installers spreading Oyster backdoor and Rhysida ransomware. Microsoft revoked over 200 certificates used by the cybercrime group Vanilla Tempest (aka VICE SPIDER and Vice Society) to sign fake Teams installers spreading the Oyster backdoor and Rhysida ransomware. The threat actor has been active…
-
Microsoft revokes 200+ certificates abused by Vanilla Tempest in fake Teams campaign
Microsoft revoked 200+ certificates used by Vanilla Tempest to sign fake Teams installers spreading Oyster backdoor and Rhysida ransomware. Microsoft revoked over 200 certificates used by the cybercrime group Vanilla Tempest (aka VICE SPIDER and Vice Society) to sign fake Teams installers spreading the Oyster backdoor and Rhysida ransomware. The threat actor has been active…
-
Microsoft Report Warns of AI-Powered Automation in Cyberattacks and Malware Creation
Tags: ai, automation, cyber, cyberattack, cybercrime, data, defense, incident, intelligence, malware, microsoft, phishing, vulnerabilityCybercriminals are weaponizing artificial intelligence to accelerate malware development, discover vulnerabilities faster, and create more sophisticated phishing campaigns, according to Microsoft’s latest Digital Defense Report covering trends from July 2024 through June 2025. In 80% of the cyber incidents Microsoft investigated last year, attackers sought to steal data primarily for profit rather than intelligence gathering.…
-
North Korean Hackers Exploit EtherHiding to Spread Malware and Steal Crypto Assets
Tags: attack, blockchain, crypto, cyber, cybercrime, cybersecurity, exploit, hacker, malicious, malware, north-korea, technology, threatThe cybersecurity landscape has witnessed a significant evolution in attack techniques with North Korean threat actors adopting EtherHiding, a sophisticated method that leverages blockchain technology to distribute malware and facilitate cryptocurrency theft. EtherHiding represents a fundamental shift in how cybercriminals store and deliver malicious payloads by embedding malware code within smart contracts on public blockchains…
-
North Korean Hackers Exploit EtherHiding to Spread Malware and Steal Crypto Assets
Tags: attack, blockchain, crypto, cyber, cybercrime, cybersecurity, exploit, hacker, malicious, malware, north-korea, technology, threatThe cybersecurity landscape has witnessed a significant evolution in attack techniques with North Korean threat actors adopting EtherHiding, a sophisticated method that leverages blockchain technology to distribute malware and facilitate cryptocurrency theft. EtherHiding represents a fundamental shift in how cybercriminals store and deliver malicious payloads by embedding malware code within smart contracts on public blockchains…
-
Dairy Farmers of America confirms June cyberattack leaked personal data
The Dairy Farmers of America said cybercriminals breached company systems in June, gaining access to the information of employees and members of the cooperative. First seen on therecord.media Jump to article: therecord.media/dairy-farm-leaked-info-ransomware
-
Dairy Farmers of America confirms June cyberattack leaked personal data
The Dairy Farmers of America said cybercriminals breached company systems in June, gaining access to the information of employees and members of the cooperative. First seen on therecord.media Jump to article: therecord.media/dairy-farm-leaked-info-ransomware
-
Key to Qilin’s Ransomware Success: Bulletproof Hosting
Reigning Ransomware Group Thrives in Part Through Affiliated Cybercrime Services. Security experts say the greatest number of ransomware attacks in recent months has continued to trace to the long-running crime group Qilin, and that the group’s reign is enabled in no small part through an apparently close affiliation with a network of bulletproof hosting providers.…
-
Security as a Business Enabler, Not a Barrier
ISMG’s Sean Mack on Aligning Strategy and Culture for Long-Term Risk Reduction. Cybercrime is accelerating while budgets stay flat. To keep pace, organizations must treat security as a strategic enabler – not an afterthought. Sean Mack of ISMG’s CXO Advisory Practice outlines how aligning business goals, shifting left, and building a security culture drive better…
-
Microsoft warns of a 32% surge in identity hacks, mainly driven by stolen passwords
Hackers are also increasingly turning to other methods to obtain credentials. Microsoft tracked surges in the use of infostealer malware by criminals and an increase of IT scams where cybercriminals call a company’s help desk and simply ask for password resets. First seen on therecord.media Jump to article: therecord.media/microsoft-warns-of-surge-identity-hacks-passwords
-
Microsoft warns of a 32% surge in identity hacks, mainly driven by stolen passwords
Hackers are also increasingly turning to other methods to obtain credentials. Microsoft tracked surges in the use of infostealer malware by criminals and an increase of IT scams where cybercriminals call a company’s help desk and simply ask for password resets. First seen on therecord.media Jump to article: therecord.media/microsoft-warns-of-surge-identity-hacks-passwords
-
Operation Heracles strikes blow against massive network of fraudulent crypto trading sites
In a significant crackdown against online cybercriminals, German authorities have successfully dismantled a network of fraudulent cryptocurrency investment sites that has targeted millions of unsuspecting people across Europe. First seen on bitdefender.com Jump to article: www.bitdefender.com/en-us/blog/hotforsecurity/operation-heracles-strikes-blow-massive-network-fraudulent-crypto-trading-sites
-
Operation Heracles strikes blow against massive network of fraudulent crypto trading sites
In a significant crackdown against online cybercriminals, German authorities have successfully dismantled a network of fraudulent cryptocurrency investment sites that has targeted millions of unsuspecting people across Europe. First seen on bitdefender.com Jump to article: www.bitdefender.com/en-us/blog/hotforsecurity/operation-heracles-strikes-blow-massive-network-fraudulent-crypto-trading-sites
-
US and UK Lead Record Cybercrime Operation in Southeast Asia
146 individuals and entities tied to the Prince Group TCO, led by Cambodian national Chen Zhi, were sanctioned. The post US and UK Lead Record Cybercrime Operation in Southeast Asia appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/cybercrime-operation-southeast-asia/
-
US and UK Lead Record Cybercrime Operation in Southeast Asia
146 individuals and entities tied to the Prince Group TCO, led by Cambodian national Chen Zhi, were sanctioned. The post US and UK Lead Record Cybercrime Operation in Southeast Asia appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/cybercrime-operation-southeast-asia/
-
Operation Herakles – Schlag gegen Cybercrime 1.406 Betrugs-Websites gesperrt
First seen on security-insider.de Jump to article: www.security-insider.de/erfolg-gegen-cyberkriminalitaet-illegale-internetseiten-gesperrt-a-a6bee36acef2a7bfb6b2e3a39616da26/
-
Operation Herakles – Schlag gegen Cybercrime 1.406 Betrugs-Websites gesperrt
First seen on security-insider.de Jump to article: www.security-insider.de/erfolg-gegen-cyberkriminalitaet-illegale-internetseiten-gesperrt-a-a6bee36acef2a7bfb6b2e3a39616da26/
-
Microsoft Halts Vanilla Tempest Cyberattack by Revoking Malicious Teams Installer Certificates
Microsoft has successfully disrupted a major cyberattack campaign orchestrated by the Vanilla Tempest threat group in early October 2025. The tech giant revoked over 200 fraudulent certificates that the cybercriminals had used to sign fake Microsoft Teams installation files, which were designed to deliver the Oyster backdoor and deploy Rhysida ransomware on victim systems. Discovery…
-
Microsoft Halts Vanilla Tempest Cyberattack by Revoking Malicious Teams Installer Certificates
Microsoft has successfully disrupted a major cyberattack campaign orchestrated by the Vanilla Tempest threat group in early October 2025. The tech giant revoked over 200 fraudulent certificates that the cybercriminals had used to sign fake Microsoft Teams installation files, which were designed to deliver the Oyster backdoor and deploy Rhysida ransomware on victim systems. Discovery…
-
Source code and vulnerability info stolen from F5 Networks
Tags: access, apt, attack, automation, best-practice, breach, ceo, ciso, control, credentials, crowdstrike, cybercrime, data, data-breach, detection, edr, endpoint, exploit, group, guide, incident response, infrastructure, intelligence, mitigation, monitoring, network, programming, risk, sans, software, threat, tool, update, vulnerabilityF5 mitigations: IT and security leaders should make sure F5 servers, software, and clients have the latest patches. In addition, F5 has added automated hardening checks to the F5 iHealth Diagnostics Tool, and also suggests admins refer to its threat hunting guide to strengthen monitoring, and its best practices guides for hardening F5 systems.As a…

