Tag: cybercrime
-
Lerneffekte aus der aktuell effektivsten Ransomware Qilin
Qilin zählt inzwischen zu den aktivsten und wirkungsvollsten Ransomware-Operationen weltweit. Die Schadsoftware verbreitet sich zunehmend über etablierte Cybercrime-Netzwerke und spielt eine zentrale Rolle in aktuellen Bedrohungsmodellen. Die ersten Versionen wurden 2022 unter dem Namen “Agent” veröffentlicht und später vollständig in Rust neu entwickelt. Ab Ende 2023 gewann die Gruppe durch gezielte Angriffe auf VMware-ESXi-Systeme an…
-
Internet users advised to change passwords after 16bn logins exposed
Tags: access, credentials, cybercrime, data, data-breach, google, Internet, login, malicious, password, softwareHacked credentials could give cybercriminals access to Facebook, Meta and Google accounts among othersInternet users have been told to change their passwords and upgrade their digital security after researchers claimed to have revealed the scale of sensitive information 16bn login records potentially available to cybercriminals.Researchers at Cybernews, an <a href=”https://cybernews.com/security/billions-credentials-exposed-infostealers-data-leak/”>online tech publication, said they had…
-
Aflac: ‘Cybercrime Campaign’ Is Targeting Insurance Industry
Experts Suspect Scattered Spider Is Behind Rash of Recent Insurer Breaches. Aflac is the latest insurance company dealing with a cyberattack. The company is investigating a cyber incident that did not involve ransomware encryption of its IT systems, but did potentially compromise data. Experts suspect Scattered Spider is behind the recent rash of insurance incidents.…
-
Hype Alert: ‘The Largest Data Breach in History’ That Wasn’t
Experts Debunk Legitimacy of Data Sets With 16 Billion Credentials Being Circulated News broke this week that a colossal set of data comprising 16 billion stolen login credentials has been circulating on the cybercrime underground, making it the largest data breach in history. Don’t believe the hype: experts say the numbers simply don’t add up,…
-
Qilin Ransomware Adds “Call Lawyer” Feature to Pressure Victims for Larger Ransoms
The threat actors behind the Qilin ransomware-as-a-service (RaaS) scheme are now offering legal counsel for affiliates to put more pressure on victims to pay up, as the cybercrime group intensifies its activity and tries to fill the void left by its rivals.The new feature takes the form of a “Call Lawyer” feature on the affiliate…
-
Aflac discloses cyber intrusion linked to wider crime spree targeting insurance industry
The breach marks the latest in a series of recent attacks linked to cybercrime group Scattered Spider. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/aflac-cyber-crime-spree-insurance/751175/
-
Aflac says it stopped attack launched by ‘sophisticated cybercrime group’
Insurance industry giant Aflac said it disrupted a cyberattack within hours of discovering it and is now working to determine how much data was potentially breached in the incident. First seen on therecord.media Jump to article: therecord.media/aflac-cyberattack-potential-data-breach
-
Aflac says it stopped ransomware attack launched by ‘sophisticated cybercrime group’
Insurance industry giant Aflac said it disrupted a cyberattack within hours of discovering it and is now working to determine how much data was potentially breached in the incident. First seen on therecord.media Jump to article: therecord.media/aflac-cyberattack-potential-data-breach
-
AntiDot 31 Android Botnet Malware Grants Attackers Full Control Over Victim Devices
A new Android botnet malware named AntiDot has emerged as a formidable threat, granting cybercriminals unprecedented control over infected devices. Operated and sold by LARVA-398 as a Malware-as-a-Service (MaaS) on underground forums like XSS, AntiDot is marketed as a >>3-in-1
-
Webinar: Stolen credentials are the new front door to your network
Cybercriminals no longer need zero-days to breach your systems”, these days, they just log in. Join BleepingComputer, SC Media, and Specops Software’s Darren Siegel on July 9 at 2:00 PM ET for a live webinar on how attackers are using stolen credentials to infiltrate networks and how you can stop them. First seen on bleepingcomputer.com…
-
Scammers Insert Fake Support Numbers on Real Apple, Netflix, PayPal Pages
Cybercriminals are injecting fake support phone numbers onto official sites like Bank of America and Netflix. Learn how ‘search parameter injection’ scams work and protect yourself now. First seen on hackread.com Jump to article: hackread.com/scammers-fake-support-numbers-real-apple-netflix-paypal/
-
Alleged Ryuk ransomware gang member arrested in Ukraine and extradited to US
A 33-year-old man arrested in Ukraine will face charges in the U.S. of working for the Ryuk cybercrime operation, known for high-profile targets and large ransom demands. First seen on therecord.media Jump to article: therecord.media/alleged-ryuk-member-arrest-ukraine-extradited-us
-
Fast 800 illegale Betrugs-Websites beschlagnahmt
Ermittlern ist es gelungen, sämtliche Online-Betrugsseiten abzuschalten.Baden-württembergische Ermittlungsbehörden haben fast 800 illegale Websites beschlagnahmt. Das Cybercrime-Zentrum bei der Generalstaatsanwaltschaft Karlsruhe und das Landeskriminalamt (LKA) Baden-Württemberg arbeiteten dafür mit der europäischen Polizeibehörde Europol und bulgarischen Strafverfolgungsbehörden zusammen. “Die beschlagnahmten Domains wurden auf eine vom Landeskriminalamt Baden-Württemberg gehostete Beschlagnahmeseite umgeleitet, und können nun nicht mehr zur Begehung von…
-
Indian Car-Sharing Firm Zoomcar Latest to Suffer Breach
The company acknowledged that cybercriminals had taken sensitive information on more than 8 million users, including names, phone numbers, car registration numbers, addresses, and emails. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/indian-car-sharing-firm-zoomcar-breach
-
Operation Endgame: Do Takedowns and Arrests Matter?
Tags: cybercrimeCybercrime response needs more aggressive actions from those seeking to protect victims and pursue criminals. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/operation-endgame-takedowns-arrests-matter
-
Operation Endgame: Do Takedowns and Arrests Matter?
Tags: cybercrimeCybercrime response needs more aggressive actions from those seeking to protect victims and pursue criminals. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/operation-endgame-takedowns-arrests-matter
-
Google Warns of Scattered Spider Attacks Targeting IT Support Teams at U.S. Insurance Firms
The notorious cybercrime group known as Scattered Spider (aka UNC3944) that recently targeted various U.K. and U.S. retailers has begun to target major insurance companies, according to Google Threat Intelligence Group (GTIG).”Google Threat Intelligence Group is now aware of multiple intrusions in the U.S. which bear all the hallmarks of Scattered Spider activity,” John Hultquist,…
-
Hackers Manipulate Search Engines to Push Malicious Sites
A new wave of cybercrime is exploiting the very backbone of internet trust: search engines. Recent research by Netcraft has exposed a sophisticated and organized SEO poisoning operation, where hackers manipulate search engine algorithms to push malicious websites to the top of search results. At the heart of this campaign is a platform known as…
-
Backups Are Under Attack: How to Protect Your Backups
Ransomware has become a highly coordinated and pervasive threat, and traditional defenses are increasingly struggling to neutralize it. Today’s ransomware attacks initially target your last line of defense, your backup infrastructure. Before locking up your production environment, cybercriminals go after your backups to cripple your ability to recover, increasing the odds of a ransom payout.…
-
Hackers Weaponize Langflow Vulnerability to Launch Flodrix Botnet
Tags: ai, botnet, cve, cvss, cyber, cybercrime, exploit, flaw, framework, hacker, remote-code-execution, vulnerabilityA critical security flaw in Langflow, a widely adopted Python-based AI prototyping framework, is being actively exploited by cybercriminals to deploy the rapidly evolving Flodrix botnet. Security researchers have confirmed that attackers are exploiting CVE-2025-3248, a remote code execution (RCE) vulnerability rated 9.8 on the CVSS scale, to compromise unpatched Langflow servers and enlist them…
-
Report Links Los Pollos and RichAds to Malware Traffic Operations
New research by Infoblox Threat Intel exposes a hidden alliance between major cybercrime groups like VexTrio and seemingly… First seen on hackread.com Jump to article: hackread.com/report-links-los-pollos-richads-malware-traffic-op/
-
Cybercrime crackdown disrupts malware, infostealers, marketplaces across the globe
A burst of global law enforcement actions during the past few weeks marked by a flurry of successful takedowns gives cybercrime experts a jolt of hope. First seen on cyberscoop.com Jump to article: cyberscoop.com/cybercrime-crackdown-operation-endgame-operation-secure/
-
App Store Security Threats in 2025: Why Hackers Target Mobile Ecosystems
In 2025, app store security threats have reached unprecedented levels, driven by increasingly sophisticated cybercriminal tactics and expanding attack surfaces. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/06/app-store-security-threats-in-2025-why-hackers-target-mobile-ecosystems/
-
Operation Deep Sentinel: Authorities Shut Down Darknet Market Archetyp
In a major international law enforcement operation dubbed >>Operation Deep Sentinel,>Archetyp Market,
-
Hackers Compromise Discord Invite to Inject Malicious Links Delivering AsyncRAT
Threat actors have exploited Discord’s invite system to distribute malicious links, ultimately delivering AsyncRAT and other harmful payloads. Discord, a widely trusted platform for gamers, developers, and communities, has become a target for cybercriminals who abuse its infrastructure particularly the invite link and content delivery features to orchestrate phishing schemes and malware infections. This campaign,…
-
GrayAlpha Hackers Group Exploits Browser Updates to Deploy PowerNet Loader and NetSupport RAT
Tags: attack, cyber, cybercrime, exploit, finance, group, hacker, infrastructure, malware, powershell, rat, threat, updateA new infrastructure linked to GrayAlpha, a cybercriminal entity overlapping with the notorious FIN7 group, has been exposed. This financially motivated threat actor, active since at least 2013, is known for its sophisticated attacks targeting retail, hospitality, and financial sectors. Custom Malware Uncovered The latest findings reveal GrayAlpha’s use of custom malware, including a PowerShell…
-
Anubis Ransomware Introduces Irreversible File Destruction Feature
A new and menacing player has emerged in the cybercrime landscape with the introduction of Anubis, a Ransomware-as-a-Service (RaaS) operation that blends traditional file encryption with a devastating file destruction capability. Active since December 2024, Anubis has quickly gained notoriety in 2025 for its unique >>wipe mode
-
Unusual Toolset Behind Fog Ransomware Prompts Fresh Security Concerns
A newly discovered ransomware operation dubbed Fog is raising fresh concerns in the cybersecurity community after researchers found it leveraging a highly unusual mix of legitimate business software and open-source offensive security tools. The campaign, observed in June 2025, is part of a growing trend where cybercriminals are repurposing trusted programs to evade traditional detection…

