Tag: cybercrime
-
Medusa Ransomware Disables Anti-Malware Tools with Stolen Certificates
Cybercriminals exploit AbyssWorker driver to disable EDR systems, deploying MEDUSA ransomware with revoked certificates for stealthy attacks. First seen on hackread.com Jump to article: hackread.com/medusa-ransomware-anti-malware-tools-stolen-certificates/
-
300 Arrested in Crackdown on Cybercrime Rings in Africa
Authorities in seven African countries arrested 300 suspects in an international crackdown on cybercriminal networks targeting businesses. The post 300 Arrested in Crackdown on Cybercrime Rings in Africa appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/300-arrested-in-crackdown-on-cybercrime-rings-in-africa/
-
Marktanalyse im Bereich IT-Sicherheit: Strategische Entscheidungen durch professionelle Analysen absichern
Tags: cybercrimeAngesichts steigender Investitionen, zunehmender Cyberkriminalität und rasanter technologischer Entwicklungen sollten Unternehmen die Expertise erfahrener Analysten nutzen First seen on infopoint-security.de Jump to article: www.infopoint-security.de/marktanalyse-im-bereich-it-sicherheit-strategische-entscheidungen-durch-professionelle-analysen-absichern/a40229/
-
INTERPOL Arrests 306 Suspects, Seizes 1,842 Devices in Cross-Border Cybercrime Bust
Law enforcement authorities in seven African countries have arrested 306 suspects and confiscated 1,842 devices as part of an international operation codenamed Red Card that took place between November 2024 and February 2025.The coordinated effort “aims to disrupt and dismantle cross-border criminal networks which cause significant harm to individuals and businesses,” INTERPOL said, adding it…
-
FBI Warns Against Using Unsafe File Converter Tools
The FBI Denver Field Office has sounded the alarm about a burgeoning scam involving purportedly free online document converter tools. This scam, which has gained traction globally, sees cybercriminals harnessing these tools to spread malware, leading to severe consequences such as ransomware attacks. The FBI is urging the public to remain vigilant and report any…
-
Semrush Impersonation Scam Targets Google Ads
Cybercriminals are increasingly targeting online marketing and advertising tools to leverage them in their malicious campaigns. A recent First seen on securityonline.info Jump to article: securityonline.info/semrush-impersonation-scam-targets-google-ads/
-
Over 300 arrested in international crackdown on cyber scams
Law enforcement agencies in seven African countries arrested over 300 suspected cybercriminals involved in mobile banking, investment and messaging app scams, according to a statement on Monday by Interpol. First seen on therecord.media Jump to article: therecord.media/300-arrested-africa-crackdown-cyber-scams
-
Four Members of Hacker Group Behind 90 Worldwide Data Breaches Exposed
A recent investigation by Group-IB has shed light on a notorious cybercriminal operating under multiple aliases, including ALTDOS, DESORDEN, GHOSTR, and 0mid16B. This individual was responsible for over 90 data breaches globally, primarily targeting companies in Asia and other regions. The threat actor’s modus operandi involved compromising internet-facing Windows servers, exfiltrating sensitive data, and extorting…
-
VanHelsingRaaS Expands Rapidly in Cybercrime Market
VanHelsingRaaS, a new ransomware-as-a-service program, infected three victims within two weeks of release, demanding ransoms of $500,000 First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/vanhelsing-raas-expands-rapidly/
-
Police arrests 300 suspects linked to African cybercrime rings
African law enforcement authorities have arrested 306 suspects as part of ‘Operation Red Card,’ an INTERPOL-led international crackdown targeting cross-border cybercriminal networks. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/police-arrests-300-suspects-linked-to-african-cybercrime-rings/
-
Authorities Seize 1842 Devices in Africa’s Cybercrime Crackdown
Tags: cybercrimeAuthorities in seven African countries have arrested 306 suspects and seized 1842 devices in Operation Red Card First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/interpol-seize-1842-devices-africa/
-
VanHelsingRaaS Emerges, Targeting Linux, BSD, ARM, and ESXi Systems
VanHelsingRaaS, a newly launched ransomware-as-a-service (RaaS) program, has quickly gained traction in the cybercrime ecosystem. Introduced on March 7, 2025, this RaaS platform offers affiliates a cross-platform ransomware tool capable of targeting diverse systems, including Linux, BSD, ARM architectures, and VMware ESXi environments. Its rapid adoption underscores its appeal to both seasoned cybercriminals and newcomers.…
-
The Role of AI in Cybersecurity: Boon or Threat?
Think about it everything’s online these days, right? Your photos, your bank stuff, your emails, and even your fridge probably connect to the internet now. It’s fantastic, but it also means there’s a whole bunch of sneaky folks out there cybercriminals trying to mess with it all. They want your data, your […] The post…
-
Unmasking ALTDOS, DESORDEN, GHOSTR, and Omid16B: The Saga of a Cybercriminal
In a four-year pursuit that spanned multiple aliases and continents, law enforcement has finally apprehended a notorious cybercriminal. First seen on securityonline.info Jump to article: securityonline.info/unmasking-altdos-desorden-ghostr-and-omid16b-the-saga-of-a-cybercriminal/
-
Microsoft Trusted Signing service abused to code-sign malware
Cybercriminals are abusing Microsoft’s Trusted Signing platform to code-sign malware executables with short-lived three-day certificates. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/microsoft-trusted-signing-service-abused-to-code-sign-malware/
-
VanHelsing, new RaaS in Town
ey Points VanHelsing RaaS In recent weeks, a new and rapidly expanding ransomware-as-a-service (RaaS) program called VanHelsingRaaS has been making waves in the cybercrime world. Launched on March 7, 2025, this service has already demonstrated its rapid growth and deadly potential, having infected three victims within just two weeks of its introduction. Reputable affiliates can…
-
How Cybercriminals Exploit Notification Channels
Cybercriminals are always looking for new ways to take advantage of people. One effective method they use is… First seen on hackread.com Jump to article: hackread.com/how-cybercriminals-exploit-notification-channels/
-
How Cybercriminals Exploit Public Info for Attacks: Understanding Risks and Prevention
Cybercriminals are skilled at using public information to their advantage. Knowing how they gather this data can help… First seen on hackread.com Jump to article: hackread.com/how-cybercriminals-exploit-public-info-attacks-risks-prevention/
-
Microsoft Trust Signing service abused to code-sign malware
Cybercriminals are abusing Microsoft’s Trusted Signing platform to code-sign malware executables with short-lived three-day certificates. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/microsoft-trust-signing-service-abused-to-code-sign-malware/
-
Researchers Uncover FIN7’s Stealthy Python-Based Anubis Backdoor
Researchers have recently discovered a sophisticated Python-based backdoor, known as the Anubis Backdoor, deployed by the notorious cybercrime group FIN7. This advanced threat actor, active since at least 2015, has been responsible for billions of dollars in damages globally, primarily targeting the financial and hospitality sectors. The Anubis Backdoor represents a significant evolution in FIN7’s…
-
VexTrio Using 20,000 Hacked WordPress Sites in Traffic Redirect Scheme
A massive cybercrime network known as VexTrio is using thousands of compromised WordPress sites to funnel traffic through a complex redirection scheme. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/vextrio-20000-hacked-wordpress-sites-traffic-redirect-scheme
-
Cybercriminals Exploit CheckPoint Antivirus Driver in Malicious Campaign
A security researcher has observed threat actors exploiting vulnerabilities in a driver used by CheckPoint’s ZoneAlarm antivirus to bypass Windows security measures First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/cybercriminals-exploit-checkpoint/
-
New KnowBe4 Report Reveals a Spike in Phishing Campaigns
KnowBe4, Security Awareness Training leader, today launched its Phishing Threat Trend Report, detailing key trends, new data, and threat intelligence insights surrounding phishing threats targeting organisations at the start of 2025. Based on data generated by KnowBe4 Defend, this edition highlights the growing threat of ransomware and explores how cybercriminals are using sophisticated tactics to…
-
Scammers cash in on tax season
AI-powered phishing emails, deepfake phone calls, and fake tax prep websites are making tax scams more convincing and costly than ever, according to McAfee. Cybercriminals are … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/03/21/tax-season-scams/
-
Infostealers Fuel 2.1B Credentials and 23M Host Infections
Cybercrime surged with a 33% spike in credential theft and 200 million credentials stolen in early 2025, signaling a daunting threat landscape for organizations. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/trends/infostealers-2-1b-credentials-23m-hosts/
-
New Arcane Stealer Spreads via YouTube, Stealing VPN and Browser Login Credentials
A new malware campaign has been uncovered, involving a sophisticated stealer known as Arcane, which is distributed through YouTube videos promoting game cheats. This campaign highlights the evolving tactics of cybercriminals, who continue to exploit popular platforms to spread malware. The Arcane stealer is notable for its extensive data collection capabilities, targeting a wide range…
-
Why rooting and jailbreaking make you a target
As cybercriminals have moved to a mobile-first attack strategy, rooting and jailbreaking mobile devices remain a powerful attack vector. Such mobile devices bypass critical … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/03/20/rooting-jailbreaking-threat/

