Tag: cybercrime
-
New Malware-as-a-Service ‘Olymp Loader’ Emerges on Hacker Forums With Advanced Anti-Analysis Features
Olymp Loader has emerged as a sophisticated Malware-as-a-Service (MaaS) platform since its public debut in June 2025, quickly establishing itself as a notable threat across underground cybercriminal forums and Telegram channels. Marketed under the alias >>OLYMPO,
-
AI Cybercriminals Target Black Friday and Cyber Monday
AI-enabled cybercriminals are exploiting the holiday shopping season with precision phishing, account takeovers, payment skimming and ransomware, forcing retailers to adopt real-time, adaptive defenses to keep pace. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/11/ai-cybercriminals-target-black-friday-and-cyber-monday/
-
Alliances between ransomware groups tied to recent surge in cybercrime
Tags: access, attack, awareness, backup, business, cloud, cybercrime, cybersecurity, data, encryption, exploit, extortion, group, healthcare, incident response, intelligence, law, leak, monitoring, ransom, ransomware, saas, service, software, tactics, theft, threat, vpn, vulnerability, zero-dayRansomware groups change tactics to evade law enforcement: The latest quarterly study from Rapid7 also found that newly forged alliances are leading to a spike in ransomware activity while adding that tactical innovations, from refined extortion to double extortion and use of zero day, are also playing a part in increased malfeasance.The quarter also saw…
-
AI Cybercriminals Target Black Friday and Cyber Monday
AI-enabled cybercriminals are exploiting the holiday shopping season with precision phishing, account takeovers, payment skimming and ransomware, forcing retailers to adopt real-time, adaptive defenses to keep pace. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/11/ai-cybercriminals-target-black-friday-and-cyber-monday/
-
FBI Reports $262M in ATO Fraud as Researchers Cite Growing AI Phishing and Holiday Scams
The U.S. Federal Bureau of Investigation (FBI) has warned that cybercriminals are impersonating financial institutions with an aim to steal money or sensitive information to facilitate account takeover (ATO) fraud schemes.The activity targets individuals, businesses, and organizations of varied sizes and across sectors, the agency said, adding the fraudulent schemes have led to more than…
-
FBI: bank impersonators fuel $262M surge in account takeover fraud
Cybercriminals posing as banks drove a major spike in account takeover fraud this year, stealing over $262 million, the FBI warned. The FBI warns of a surge in account takeover fraud, with criminals posing as financial institutions and stealing over $262M since January 2025. Cybercriminals breach online financial, payroll, or health-savings accounts to steal money…
-
FBI: Cybercriminals stole $262M by impersonating bank support teams
The FBI warns of a surge in account takeover (ATO) fraud schemes and says that cybercriminals impersonating various financial institutions have stolen over $262 million in ATO attacks since the start of the year. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/fbi-cybercriminals-stole-262-million-by-impersonating-bank-support-teams-since-january/
-
Russia arrests young cybersecurity entrepreneur on treason charges
Details of the case are classified, but Russian media say Timur Kilin may have drawn official ire after publicly criticizing the state-owned messaging app Max and the government’s anti-cybercrime legislation. First seen on therecord.media Jump to article: therecord.media/russia-arrests-tech-entrepreneur-treason
-
Geopolitik und Hacktivismus als ein Trend der Cyberkriminalität
Bitdefender hat eine Analyse von Ransomware-Angriffen auf Unternehmen im südkoreanischen Finanzmarkt vorgestellt. Urheber der Angriffe ist die normalerweise wirtschaftlich motiviert agierende Ransomware-as-a-Service-Gruppe Qilin. Möglicherweise arbeitete Qilin diesmal mit Moonstone Sleet, einer Gruppe aus Nordkorea mit Regierungshintergrund, zusammen. Die Angreifer gingen dabei den Weg über die Supply-Chain und nutzen Schwachstellen von Serviceanbietern als Eintrittstor für ihre…
-
Dark Web: Reverse Engineers verdienen über 5.000 Dollar
Im Verborgenen hat sich ein eigener Arbeitsmarkt entwickelt, der vor allem Tätigkeiten aus dem Umfeld der Cyberkriminalität bündelt. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/wachsender-schatten-jobmarkt-dark-web
-
Dark Web: Reverse Engineers verdienen über 5.000 Dollar
Im Verborgenen hat sich ein eigener Arbeitsmarkt entwickelt, der vor allem Tätigkeiten aus dem Umfeld der Cyberkriminalität bündelt. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/wachsender-schatten-jobmarkt-dark-web
-
Attackers Swap ‘m’ with ‘rn’ in Microsoft.com to Trick Users
A sophisticated phishing campaign is currently exploiting a subtle typographical illusion to deceive users into surrendering sensitive login credentials. Cybercriminals have registered the domain >>rnicrosoft.com,
-
Salesforce Details Supply Chain Attack Targeting Gainsight
Cybercrime Group ShinyHunters Claims to Steal Data From 300 Organizations. The attack that targeted customer data management tool Gainsight resulted in the theft of information from approximately 300 Salesforce-using firms, the Scattered Lapsus$ Hunters subgroup ShinyHunters has claimed. Salesforce and Gainsight have shared more details as their investigation continues. First seen on govinfosecurity.com Jump to…
-
Operation Endgame disrupts Rhadamanthys information-stealing malware
International cybercrime-fighting agencies, co-ordinated by Europol, took down over 1000 servers and seized 20 domains earlier this month as part of Operation Endgame 3.0. First seen on bitdefender.com Jump to article: www.bitdefender.com/en-us/blog/hotforsecurity/operation-endgame-disrupts-rhadamanthys-information-stealing-malware
-
Operation Endgame disrupts Rhadamanthys information-stealing malware
International cybercrime-fighting agencies, co-ordinated by Europol, took down over 1000 servers and seized 20 domains earlier this month as part of Operation Endgame 3.0. First seen on bitdefender.com Jump to article: www.bitdefender.com/en-us/blog/hotforsecurity/operation-endgame-disrupts-rhadamanthys-information-stealing-malware
-
‘Scamming became the new farming’: inside India’s cybercrime villages podcast
How did an obscure district in a neglected state become India’s byword for digital deceit?By Snigdha Poonam. Read by Mikhail Sen <a href=”https://www.theguardian.com/news/audio/2025/nov/24/scamming-became-the-new-farming-inside-indias-cybercrime-villages-podcast”>Continue reading… First seen on theguardian.com Jump to article: www.theguardian.com/news/audio/2025/nov/24/scamming-became-the-new-farming-inside-indias-cybercrime-villages-podcast
-
Tycoon2FA Launches Nearly 1 Million Attacks Targeting Office 365 Accounts
Tycoon2FA, a sophisticated phishing-as-a-service platform tracked by Microsoft as Storm-1747, has emerged as the dominant threat targeting Office 365 accounts throughout 2025. The cybercriminal operation has launched an aggressive campaign involving nearly one million attacks, establishing itself as the most prolific phishing platform observed by security researchers this year. In October 2025 alone, Microsoft Defender…
-
Saturday Security: Zero-Day Logitech Breach Exposes 1.8TB of Data
Logitech, a prominent PC accessories brand, has recently confirmed a major data breach after cybercriminals exploited a zero-day vulnerability in a third-party platform. While Logitech assures that exposed data was limited and credit card numbers, as well as national IDs, were not stored on the impacted systems, the situation remains concerning. The notorious Clop ransomware……
-
Saturday Security: Zero-Day Logitech Breach Exposes 1.8TB of Data
Logitech, a prominent PC accessories brand, has recently confirmed a major data breach after cybercriminals exploited a zero-day vulnerability in a third-party platform. While Logitech assures that exposed data was limited and credit card numbers, as well as national IDs, were not stored on the impacted systems, the situation remains concerning. The notorious Clop ransomware……
-
2025 Formula 1 Las Vegas Grand Prix Faces Rising Cybercrime Threats, Experts Caution
As anticipation builds for the 2025 Formula 1 season, cybersecurity professionals are cautioning that the excitement surrounding the Las Vegas Grand Prix extends far beyond the racetrack. The event, scheduled for November 22, 2025, will mark the twenty-second round of the 2025 Formula One World Championship at the Las Vegas Strip Circuit in Paradise, Nevada.…
-
Hackers Adopt Matrix Push C2 for Browser-Based Malware and Phishing Attacks
A new breed of browser-based cyberattack is sweeping the threat landscape, as BlackFog researchers have uncovered. Dubbed Matrix Push C2, this command-and-control framework arms cybercriminals with the means to launch fileless malware and phishing campaigns that exploit web browsers as their delivery vehicle. By abusing browser push notifications a legitimate, built-in feature spanning Windows, Mac,…
-
UNC2891 Hackers Use Raspberry Pi and Fake Cards to Steal ATM Cash
A secretive cybercrime group called UNC2891 has been quietly draining ATMs across Southeast Asian banks for years, using an ingenious combination of custom malware and hidden hardware. Recent research from Group-IB reveals how this financially motivated threat actor has maintained invisible access to dozens of banking systems since 2017, employing techniques that blend digital hacking…
-
Cybercriminals Exploit Browser Push Notifications to Deliver Malware
Researchers at BlackFrog have uncovered Matrix Push C2, a malicious command-and-control system that abuses web browser push notifications to deliver malware First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/browser-push-notifications-deliver/
-
Cybersecurity Snapshot: Global Agencies Target Criminal “Bulletproof” Hosts, as CSA Unveils Agentic AI Risk Framework
Tags: access, advisory, ai, android, apple, attack, banking, breach, browser, chrome, cisa, ciso, cloud, compliance, control, credentials, credit-card, crypto, cve, cyber, cybercrime, cybersecurity, data, defense, detection, endpoint, extortion, finance, firewall, firmware, flaw, framework, google, governance, government, group, guide, Hardware, ibm, identity, infection, infrastructure, international, Internet, law, linux, malicious, malware, microsoft, mobile, monitoring, network, open-source, oracle, password, phishing, radius, ransomware, rat, resilience, risk, risk-assessment, risk-management, russia, scam, service, software, switch, technology, threat, tool, update, vulnerability, windowsCyber agencies call on ISPs to help combat “bulletproof” internet hosts that shield cybercriminals. Meanwhile, the CSA introduced a new methodology to assess the risks of autonomous AI. Plus, get the latest on the CIS Benchmarks, drone-detection systems, and malware infections. Key takeaways Crackdown on “bulletproof” hosting: International cyber agencies are urging ISPs and network…
-
Cybersecurity Snapshot: Global Agencies Target Criminal “Bulletproof” Hosts, as CSA Unveils Agentic AI Risk Framework
Tags: access, advisory, ai, android, apple, attack, banking, breach, browser, chrome, cisa, ciso, cloud, compliance, control, credentials, credit-card, crypto, cve, cyber, cybercrime, cybersecurity, data, defense, detection, endpoint, extortion, finance, firewall, firmware, flaw, framework, google, governance, government, group, guide, Hardware, ibm, identity, infection, infrastructure, international, Internet, law, linux, malicious, malware, microsoft, mobile, monitoring, network, open-source, oracle, password, phishing, radius, ransomware, rat, resilience, risk, risk-assessment, risk-management, russia, scam, service, software, switch, technology, threat, tool, update, vulnerability, windowsCyber agencies call on ISPs to help combat “bulletproof” internet hosts that shield cybercriminals. Meanwhile, the CSA introduced a new methodology to assess the risks of autonomous AI. Plus, get the latest on the CIS Benchmarks, drone-detection systems, and malware infections. Key takeaways Crackdown on “bulletproof” hosting: International cyber agencies are urging ISPs and network…
-
Hackerangriff auf Music Store
Das Google-Ads-Konto des Musikzubehörfachhändlers Music Store wurde gehackt. Der Music Store mit Sitz in Köln zählt zu den größten Musikbedarffachhändlern in Europa. Derzeit steht das Unternehmen jedoch vor großen Schwierigkeiten: Berichten zufolge wurde das Google-Ads-Konto des Einzel- und Versandhändlers am 19. Oktober 2025 von Cyberkriminellen übernommen.Nach Angaben der regionalen Boulevardzeitung Express haben die Angreifer bereits…
-
Hackerangriff auf Music Store
Das Google-Ads-Konto des Musikzubehörfachhändlers Music Store wurde gehackt. Der Music Store mit Sitz in Köln zählt zu den größten Musikbedarffachhändlern in Europa. Derzeit steht das Unternehmen jedoch vor großen Schwierigkeiten: Berichten zufolge wurde das Google-Ads-Konto des Einzel- und Versandhändlers am 19. Oktober 2025 von Cyberkriminellen übernommen.Nach Angaben der regionalen Boulevardzeitung Express haben die Angreifer bereits…
-
Root causes of security breaches remain elusive, jeopardizing resilience
Tags: attack, breach, business, ciso, cyber, cybercrime, cybersecurity, data, detection, framework, governance, incident response, intelligence, lessons-learned, monitoring, resilience, security-incident, service, siem, skills, software, strategy, tactics, technology, threat, tool, training, update, vpn, vulnerabilityTracing an attack path: Preparation is key, so businesses need to have dedicated tools and skills for digital forensics in place before an incident occurs through technologies such as security incident and event management (SIEM).SIEM devices are important because, for example, many gateway and VPN devices have a local storage that overwrites itself within hours.”If…

