Tag: cybercrime
-
Tycoon2FA Launches Nearly 1 Million Attacks Targeting Office 365 Accounts
Tycoon2FA, a sophisticated phishing-as-a-service platform tracked by Microsoft as Storm-1747, has emerged as the dominant threat targeting Office 365 accounts throughout 2025. The cybercriminal operation has launched an aggressive campaign involving nearly one million attacks, establishing itself as the most prolific phishing platform observed by security researchers this year. In October 2025 alone, Microsoft Defender…
-
Saturday Security: Zero-Day Logitech Breach Exposes 1.8TB of Data
Logitech, a prominent PC accessories brand, has recently confirmed a major data breach after cybercriminals exploited a zero-day vulnerability in a third-party platform. While Logitech assures that exposed data was limited and credit card numbers, as well as national IDs, were not stored on the impacted systems, the situation remains concerning. The notorious Clop ransomware……
-
Saturday Security: Zero-Day Logitech Breach Exposes 1.8TB of Data
Logitech, a prominent PC accessories brand, has recently confirmed a major data breach after cybercriminals exploited a zero-day vulnerability in a third-party platform. While Logitech assures that exposed data was limited and credit card numbers, as well as national IDs, were not stored on the impacted systems, the situation remains concerning. The notorious Clop ransomware……
-
Cybersecurity Snapshot: Global Agencies Target Criminal “Bulletproof” Hosts, as CSA Unveils Agentic AI Risk Framework
Tags: access, advisory, ai, android, apple, attack, banking, breach, browser, chrome, cisa, ciso, cloud, compliance, control, credentials, credit-card, crypto, cve, cyber, cybercrime, cybersecurity, data, defense, detection, endpoint, extortion, finance, firewall, firmware, flaw, framework, google, governance, government, group, guide, Hardware, ibm, identity, infection, infrastructure, international, Internet, law, linux, malicious, malware, microsoft, mobile, monitoring, network, open-source, oracle, password, phishing, radius, ransomware, rat, resilience, risk, risk-assessment, risk-management, russia, scam, service, software, switch, technology, threat, tool, update, vulnerability, windowsCyber agencies call on ISPs to help combat “bulletproof” internet hosts that shield cybercriminals. Meanwhile, the CSA introduced a new methodology to assess the risks of autonomous AI. Plus, get the latest on the CIS Benchmarks, drone-detection systems, and malware infections. Key takeaways Crackdown on “bulletproof” hosting: International cyber agencies are urging ISPs and network…
-
Hackerangriff auf Music Store
Das Google-Ads-Konto des Musikzubehörfachhändlers Music Store wurde gehackt. Der Music Store mit Sitz in Köln zählt zu den größten Musikbedarffachhändlern in Europa. Derzeit steht das Unternehmen jedoch vor großen Schwierigkeiten: Berichten zufolge wurde das Google-Ads-Konto des Einzel- und Versandhändlers am 19. Oktober 2025 von Cyberkriminellen übernommen.Nach Angaben der regionalen Boulevardzeitung Express haben die Angreifer bereits…
-
Hackerangriff auf Music Store
Das Google-Ads-Konto des Musikzubehörfachhändlers Music Store wurde gehackt. Der Music Store mit Sitz in Köln zählt zu den größten Musikbedarffachhändlern in Europa. Derzeit steht das Unternehmen jedoch vor großen Schwierigkeiten: Berichten zufolge wurde das Google-Ads-Konto des Einzel- und Versandhändlers am 19. Oktober 2025 von Cyberkriminellen übernommen.Nach Angaben der regionalen Boulevardzeitung Express haben die Angreifer bereits…
-
Root causes of security breaches remain elusive, jeopardizing resilience
Tags: attack, breach, business, ciso, cyber, cybercrime, cybersecurity, data, detection, framework, governance, incident response, intelligence, lessons-learned, monitoring, resilience, security-incident, service, siem, skills, software, strategy, tactics, technology, threat, tool, training, update, vpn, vulnerabilityTracing an attack path: Preparation is key, so businesses need to have dedicated tools and skills for digital forensics in place before an incident occurs through technologies such as security incident and event management (SIEM).SIEM devices are important because, for example, many gateway and VPN devices have a local storage that overwrites itself within hours.”If…
-
Two suspected Scattered Spider hackers plead not guilty over Transport for London cyberattack
Two U.K. teenagers pleaded not guilty to hacking the Transport for London agency in 2024, an attack attributed to the Scattered Spider cybercrime group. First seen on therecord.media Jump to article: therecord.media/transport-for-london-hack-scattered-spider-suspects-plead-not-guilty
-
2025 Formula 1 Las Vegas Grand Prix Faces Rising Cybercrime Threats, Experts Caution
As anticipation builds for the 2025 Formula 1 season, cybersecurity professionals are cautioning that the excitement surrounding the Las Vegas Grand Prix extends far beyond the racetrack. The event, scheduled for November 22, 2025, will mark the twenty-second round of the 2025 Formula One World Championship at the Las Vegas Strip Circuit in Paradise, Nevada.…
-
2025 Formula 1 Las Vegas Grand Prix Faces Rising Cybercrime Threats, Experts Caution
As anticipation builds for the 2025 Formula 1 season, cybersecurity professionals are cautioning that the excitement surrounding the Las Vegas Grand Prix extends far beyond the racetrack. The event, scheduled for November 22, 2025, will mark the twenty-second round of the 2025 Formula One World Championship at the Las Vegas Strip Circuit in Paradise, Nevada.…
-
Hackers Adopt Matrix Push C2 for Browser-Based Malware and Phishing Attacks
A new breed of browser-based cyberattack is sweeping the threat landscape, as BlackFog researchers have uncovered. Dubbed Matrix Push C2, this command-and-control framework arms cybercriminals with the means to launch fileless malware and phishing campaigns that exploit web browsers as their delivery vehicle. By abusing browser push notifications a legitimate, built-in feature spanning Windows, Mac,…
-
UNC2891 Hackers Use Raspberry Pi and Fake Cards to Steal ATM Cash
A secretive cybercrime group called UNC2891 has been quietly draining ATMs across Southeast Asian banks for years, using an ingenious combination of custom malware and hidden hardware. Recent research from Group-IB reveals how this financially motivated threat actor has maintained invisible access to dozens of banking systems since 2017, employing techniques that blend digital hacking…
-
Cybercriminals Exploit Browser Push Notifications to Deliver Malware
Researchers at BlackFrog have uncovered Matrix Push C2, a malicious command-and-control system that abuses web browser push notifications to deliver malware First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/browser-push-notifications-deliver/
-
Cybersecurity Snapshot: Global Agencies Target Criminal “Bulletproof” Hosts, as CSA Unveils Agentic AI Risk Framework
Tags: access, advisory, ai, android, apple, attack, banking, breach, browser, chrome, cisa, ciso, cloud, compliance, control, credentials, credit-card, crypto, cve, cyber, cybercrime, cybersecurity, data, defense, detection, endpoint, extortion, finance, firewall, firmware, flaw, framework, google, governance, government, group, guide, Hardware, ibm, identity, infection, infrastructure, international, Internet, law, linux, malicious, malware, microsoft, mobile, monitoring, network, open-source, oracle, password, phishing, radius, ransomware, rat, resilience, risk, risk-assessment, risk-management, russia, scam, service, software, switch, technology, threat, tool, update, vulnerability, windowsCyber agencies call on ISPs to help combat “bulletproof” internet hosts that shield cybercriminals. Meanwhile, the CSA introduced a new methodology to assess the risks of autonomous AI. Plus, get the latest on the CIS Benchmarks, drone-detection systems, and malware infections. Key takeaways Crackdown on “bulletproof” hosting: International cyber agencies are urging ISPs and network…
-
CISA Issues New Guidance on Bulletproof Hosting Threat
CISA launches guide to combat cybercrime via bulletproof hosting, recommending measures for ISPs First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/cisa-guidance-bulletproof-hosting/
-
Scam USPS and E-Z Pass Texts and Websites
Tags: banking, credit-card, cybercrime, google, government, group, password, phishing, scam, software, toolGoogle has filed a complaint in court that details the scam: In a complaint filed Wednesday, the tech giant accused “a cybercriminal group in China” of selling “phishing for dummies” kits. The kits help unsavvy fraudsters easily “execute a large-scale phishing campaign,” tricking hordes of unsuspecting people into “disclosing sensitive information like passwords, credit card…
-
Scam USPS and E-Z Pass Texts and Websites
Tags: banking, credit-card, cybercrime, google, government, group, password, phishing, scam, software, toolGoogle has filed a complaint in court that details the scam: In a complaint filed Wednesday, the tech giant accused “a cybercriminal group in China” of selling “phishing for dummies” kits. The kits help unsavvy fraudsters easily “execute a large-scale phishing campaign,” tricking hordes of unsuspecting people into “disclosing sensitive information like passwords, credit card…
-
The Rise of AI-Enhanced Cyber Scams: How GenAI Empowers Criminals
Generative artificial intelligence has fundamentally transformed the landscape of cybercriminal operations by eliminating what was once a critical barrier to entry: the quality of the scam itself. Where scammers previously relied on obvious spelling mistakes, grammatically incorrect text, and amateurish website designs that victims could easily identify, GenAI now enables criminals to produce content that…
-
NSA Issues New Guidance to Help ISPs and Defenders Stop Malicious Activity
Tags: cisa, cyber, cybercrime, cybersecurity, data, extortion, finance, framework, infrastructure, international, Internet, malicious, network, ransomware, serviceThe National Security Agency (NSA), CISA, FBI, and international cybersecurity partners have released groundbreaking guidance to help internet service providers and network defenders combat bulletproof hosting providers. This new framework, published November 19, 2025, represents a coordinated effort to mitigate cybercriminal infrastructure that actively supports ransomware, data extortion, and other malicious activities targeting critical infrastructure and financial…
-
Sneaky2FA PhaaS kit now uses redteamers’ Browserthe-Browser attack
Sneaky2FA, a popular among cybercriminals phishing-as-a-service (PhaaS) kit, has added Browser-in-the-Browser (BitB) capabilities, giving “customers” the option to launch highly deceptive attacks. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/sneaky2fa-phaas-kit-now-uses-redteamers-browser-in-the-browser-attack/
-
US, allies sanction Russian bulletproof hosting services for ransomware support
A popular Russian bulletproof hosting service provider named Media Land was sanctioned by the U.S. Treasury and international partners for its alleged support of ransomware gangs and other cybercriminal operations. First seen on therecord.media Jump to article: therecord.media/bulletproof-hosting-sanctions-ransomware
-
US, Allies Sanction Russian Bulletproof Ransomware Host
Treasury Links Russian Bulletproof Host Network to Prolific Ransomware Operations. The U.S., U.K. and Australia sanctioned Russian bulletproof host Media Land for supporting major ransomware gangs like LockBit and Play, a move paired with new global guidance urging internet service providers to tighten access controls and disrupt cybercrime infrastructure. First seen on govinfosecurity.com Jump to…
-
Russian bulletproof hosting provider sanctioned over ransomware ties
Today, the United States, the United Kingdom, and Australia announced sanctions targeting Russian bulletproof hosting (BPH) providers that have supported ransomware gangs and other cybercrime operations. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/us-sanctions-russian-bulletproof-hosting-provider-media-land-over-ransomware-ties/
-
Eternidade Stealer Trojan Fuels Aggressive Brazil Cybercrime
Trustwave SpiderLabs has observed new banking Trojan Eternidade Stealer targeting Brazil using WhatsApp for propagation and data theft First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/eternidade-stealer-trojan-brazil/
-
50,000 CCTVs Hacked in India: Intimate Hospital Footage Sold Online
A disturbing case of hacking CCTV systems in India has exposed a widespread cybercrime racket through which intimate videos from a maternity ward were stolen and sold online. Police in Gujarat state say the discovery has raised concern for surveillance practices in a country where cameras are routinely placed across public and private spaces. First…
-
Authorities Dismantle Thousands of Servers from Illicit Hosting Company Linked to Cyberattacks
In a landmark operation targeting cybercriminal infrastructure, the East Netherlands cybercrime team conducted a major takedown of a rogue hosting company suspected of facilitating a broad spectrum of malicious activities. During the coordinated enforcement action on November 12th, law enforcement seized approximately 250 physical servers located in data centers across The Hague and Zoetermeer. The…
-
Australian cybercrime portal exploited by scammers
First seen on scworld.com Jump to article: www.scworld.com/brief/australian-cybercrime-portal-exploited-by-scammers
-
The Quantum Future Is Coming Hackers Are Already Preparing
In 2025 we’re not just fighting today’s headline-grabbing cyber threats, but we’re also preparing for tomorrow’s. Technology is evolving at a pace that is both fuelling progress for defenders and powering new tools for bad actors. The same advances that drive discovery and innovation also give cybercriminals new ways to attack faster, more broadly and…
-
Schlag gegen Cybercrime: Hunderte Server von Bulletproof-Hoster beschlagnahmt
Tags: cybercrimeStrafverfolger haben in den Niederlanden eine Razzia veranstaltet. 250 für Cybercrime-Aktivitäten genutzte Server wurden vom Netz genommen. First seen on golem.de Jump to article: www.golem.de/news/schlag-gegen-cybercrime-hunderte-server-von-bulletproof-hoster-beschlagnahmt-2511-202304.html
-
Dutch police takes down bulletproof hosting hub linked to 80+ cybercrime cases
Dutch police seized 250 servers running a bulletproof hosting service tied to cybercriminals and linked to over 80 investigations since 2022. Dutch police Politie, seized 250 servers running an unnamed bulletproof hosting service used solely by cybercriminals. Active since 2022, it appeared in over 80 cybercrime investigations. >>In an investigation into a rogue hosting company,…

