Tag: cybercrime
-
Unbefugter Zugriff bei einer Justizbehörde in Australien
Cybercrime detectives investigating data breach – Strike Force Pardey First seen on police.nsw.gov.au Jump to article: www.police.nsw.gov.au/news/news
-
Cybercrime ring previously assisted by DOGE staffer
Tags: cybercrimeFirst seen on scworld.com Jump to article: www.scworld.com/brief/cybercrime-ring-previously-assisted-by-doge-staffer
-
DOGE Staffer Previously Assisted a Cybercrime Ring
Tags: cybercrimeFirst seen on scworld.com Jump to article: www.scworld.com/brief/doge-staffer-previously-assisted-a-cybercrime-ring
-
Malicious AI tools, AI jailbreaks increasingly sought by cybercriminals
First seen on scworld.com Jump to article: www.scworld.com/brief/malicious-ai-tools-ai-jailbreaks-increasingly-sought-by-cybercriminals
-
Security shop pwns ransomware gang, passes insider info to authorities
Researchers say ‘proactive’ approach is needed to combat global cybercrime First seen on theregister.com Jump to article: www.theregister.com/2025/03/27/security_shop_pwns_ransomware_gang/
-
Fake DeepSeek Ads Spread Malware to Google Users
Popularity of the generative AI platform makes it an obvious choice for cybercriminals abusing Google-sponsored search results, according to researchers. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/fake-deepseek-ads-spread-malware-google
-
Russia arrests three for allegedly creating Mamont malware, tied to over 300 cybercrimes
Russian authorities said they arrested three people and seized hardware in an operation against Mamont malware, which specializes in stealing money from Android device users. First seen on therecord.media Jump to article: therecord.media/mamont-banking-malware-arrests-russia
-
Crooks target DeepSeek users with fake sponsored Google ads to deliver malware
Cybercriminals are exploiting the popularity of DeepSeek by using fake sponsored Google ads to distribute malware. While DeepSeek is rising in popularity, threat actors are attempting to exploit it by using fake sponsored Google ads to distribute malware, Malwarebytes researchers warn. Crooks are using DeepSeek as a lure to trap unsuspecting Google searchers. >>Unfortunately, we…
-
Massive Data Breach Hits NSW Online Registry: 9,000+ Files Stolen
A major cybersecurity incident has struck the New South Wales court system, as cybercrime detectives investigate a significant data breach affecting the Department of Communities and Justice (DCJ). The breach targeted the NSW Online Registry Website (ORW), a critical platform that houses sensitive information related to both civil and criminal cases across the state. The…
-
Lucid PhAAS Platform Uses RCS and iMessage to Evade Detection
The cybersecurity landscape has been disrupted by the emergence of Lucid, a sophisticated Phishing-as-a-Service (PhAAS) platform developed by Chinese-speaking threat actors. This advanced toolkit enables cybercriminals to conduct large-scale phishing campaigns, targeting 169 entities across 88 countries globally. Lucid’s innovation lies in its exploitation of Rich Communication Services (RCS) and Apple’s iMessage protocol to circumvent…
-
Malicious Google Ads Target DeepSeek Users to Spread Malware
Cybersecurity threats continue to evolve, with malicious actors exploiting popular platforms like Google Ads to spread malware. Recently, a sophisticated campaign targeting DeepSeek users has been uncovered, highlighting the ongoing risks associated with sponsored search results. The Threat Landscape DeepSeek, a rising platform, has become a lure for cybercriminals who are using fake sponsored Google…
-
12 Cybercriminals Arrested After Ghost Communication Platform Shutdown
Law enforcement agencies have successfully dismantled a clandestine communication platform known as >>Ghost,
-
Thousands of NSW court files including AVOs leaked in ‘major data breach’
Investigation under way after around 9,000 documents including sensitive affidavits exposed<ul><li><a href=”https://www.theguardian.com/australia-news/live/2025/mar/27/australia-politics-live-fuel-excise-cost-of-living-tax-cuts-salmon-election-anthony-albanese-peter-dutton-ntwnfb”>Follow our Australia news live blog for latest updates</li><li>Get our <a href=”https://www.theguardian.com/email-newsletters?CMP=cvau_sfl”>breaking news email, <a href=”https://app.adjust.com/w4u7jx3″>free app or <a href=”https://www.theguardian.com/australia-news/series/full-story?CMP=cvau_sfl”>daily news podcast</li></ul>About 9,000 court files, including sensitive documents such as apprehended violence orders and affidavits, have been leaked in a data breach of the…
-
Malicious Android Apps Evade Detection: McAfee
Cybersecurity Firm Finds Rash of Apps Coded With Microsoft .NET MAUI. Cybercriminals are using a Microsoft cross-platform app development framework to create Android malware that bypasses security measures, evades detection and steals user data. Malicious apps spotted by McAfee researchers aren’t traditional Android malware. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/malicious-android-apps-evade-detection-mcafee-a-27836
-
‘Lucid’ Phishing-as-a-Service Exploits Faults in iMessage, Android RCS
Cybercriminals in China have figured out how to undermine the strengths of mobile messaging protocols. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/lucid-phishing-exploits-imessage-android-rcs
-
New Atlantis AIO platform automates credential stuffing on 140 services
A new cybercrime platform named ‘Atlantis AIO’ provides an automated credential stuffing service against 140 online platforms, including email services, e-commerce sites, banks, and VPNs. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/new-atlantis-aio-automates-credential-stuffing-on-140-services/
-
Threat Actors Use “Atlantis AIO” Tool to Automate Credential Stuffing Attacks
In a concerning development for cybersecurity professionals, threat actors are increasingly utilizing a powerful tool called Atlantis AIO to automate and scale credential stuffing attacks across more than 140 platforms. This multi-checker tool, designed to exploit stolen user credentials, has emerged as a formidable weapon in the cybercriminal arsenal, enabling attackers to test millions of…
-
B1ack’s Stash Marketplace Actors Set to Release 4 Million Stolen Credit Card Records for Free
In a significant escalation of illicit activities, B1ack’s Stash, a notorious dark web carding marketplace, has announced plans to release an additional 4 million stolen credit card records for free. This move is part of a broader strategy to attract cybercriminals and establish credibility within the underground economy. The marketplace first gained attention in April…
-
Public-Private Ops Net Big Wins Against African Cybercrime
Three cybersecurity firms worked with Interpol and authorities in Nigeria, South Africa, Rwanda, and four other African nations to arrest more than 300 cybercriminals. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/public-private-ops-big-wins-african-cybercrime
-
AI vs. Cybercriminals: Who Wins the Race in Next-Gen Threat Detection?
AI allows cybercriminals to circumvent traditional detection systems, and they continue to develop sophisticated methods to enable this. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/ai-vs-cybercriminals-who-wins-the-race-in-next-gen-threat-detection/
-
Hackers Using E-Crime Tool Atlantis AIO for Credential Stuffing on 140+ Platforms
Threat actors are leveraging an e-crime tool called Atlantis AIO Multi-Checker to automate credential stuffing attacks, according to findings from Abnormal Security.Atlantis AIO “has emerged as a powerful weapon in the cybercriminal arsenal, enabling attackers to test millions of stolen credentials in rapid succession,” the cybersecurity company said in an analysis.Credential stuffing is a First…
-
Understanding RDAP: The Future of Domain Registration Data Access
Tags: access, api, attack, authentication, china, compliance, control, cyber, cybercrime, cybersecurity, data, detection, exploit, framework, fraud, GDPR, incident response, infrastructure, intelligence, Internet, law, malicious, malware, phishing, privacy, regulation, service, threat, tool, vulnerability -
Cybercriminals Target Gamers with Browserthe-Browser Phishing Attacks
A new phishing campaign employing sophisticated >>browser-in-the-browser
-
Over 300 African cybercriminals apprehended in global operation
Tags: cybercrimeFirst seen on scworld.com Jump to article: www.scworld.com/brief/over-300-african-cybercriminals-apprehended-in-global-operation
-
Cybercriminals Bypass Security Using Legitimate Tools Browser Extensions to Deliver Malware
In the second half of 2024, cybercriminals have increasingly leveraged legitimate Microsoft tools and browser extensions to bypass security measures and deliver malware, according to Ontinue’s latest Threat Intelligence Report. Threat actors are exploiting built-in Microsoft features like Quick Assist and Windows Hello to establish persistence and evade detection. Quick Assist, a remote access tool,…
-
New Malware Targets Android Users by Abusing Cross-Platform Framework for Evasion
A recent discovery by the McAfee Mobile Research Team has highlighted a new wave of Android malware campaigns that utilize the .NET MAUI cross-platform framework to evade detection. This framework, introduced by Microsoft as a replacement for Xamarin, allows developers to build applications for multiple platforms, including Android, iOS, Windows, and macOS. However, cybercriminals have…
-
Cybercriminals Use Atlantis AIO to Target 140+ Platforms
Cybercriminals are increasingly leveraging Atlantis AIO, which automates credential stuffing attacks across more than 140 platforms First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/cyber-criminals-atlantis-aio-140/
-
Meet the Low-Key Access Broker Supercharging Russian State Cybercrime
Raspberry Robin breaks into organizations and sells access to Russian threat actors, including the military cyber unit behind attempted coups, assassinations, and influence operations throughout Europe. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/access-broker-russian-state-cybercrime
-
Medusa Ransomware Disables Anti-Malware Tools with Stolen Certificates
Cybercriminals exploit AbyssWorker driver to disable EDR systems, deploying MEDUSA ransomware with revoked certificates for stealthy attacks. First seen on hackread.com Jump to article: hackread.com/medusa-ransomware-anti-malware-tools-stolen-certificates/

