Tag: cybercrime
-
Paraguay Suffered Data Breach: 7.4 Million Citizen Records Leaked on Dark Web
Resecurity researchers found 7.4 million records containing personally identifiable information (PII) of Paraguay citizens on the dark web. Resecurity has identified 7.4 million records containing personally identifiable information (PII) of Paraguayan citizens leaked on the dark web today. Last week, cybercriminals have offered information about all citizens of Paraguay for sale, demanding $7.4 million in…
-
INTERPOL-Led Effort Dismantles Infostealer Malware Network in 26 Countries Across Asia-Pacific Region
INTERPOL partnered with Group-IB, Kaspersky, and Trend Micro to take down a cybercrime network. They alerted more than 216,000 individuals and organizations that were possible victims. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-interpol-operation-secure-cybercrime-asia-pacific/
-
Dutch police identify users as young as 11-year-old on Cracked.io hacking forum
Dutch police have announced that they have identified 126 individuals linked to the now dismantled Cracked.io cybercrime forum. First seen on bitdefender.com Jump to article: www.bitdefender.com/en-us/blog/hotforsecurity/dutch-police-cracked-io-hacking-forum
-
INTERPOL-Led Effort Dismantles Infostealer Malware Network in 26 Countries Across Asia-Pacific Region
INTERPOL partnered with Group-IB, Kaspersky, and Trend Micro to take down a cybercrime network. They alerted more than 216,000 individuals and organizations that were possible victims. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-interpol-operation-secure-cybercrime-asia-pacific/
-
Paraguay is Being Targeted by Cybercriminals – 7.4 Million Citizen Records for Sale
Tags: cybercrimeFirst seen on resecurity.com Jump to article: www.resecurity.com/blog/article/paraguay-is-being-targeted-by-cybercriminals-74-million-citizen-records-for-sale
-
Fog Ransomware Uses Pentesting Tools to Steal Data and Launch Attacks
Tags: attack, breach, cyber, cybercrime, cybersecurity, data, data-breach, finance, hacker, monitoring, network, open-source, penetration-testing, ransomware, software, tactics, toolFog ransomware incidents in recent years have exposed a dangerous new trend in cybercrime: hackers are using open-source penetration testing tools and genuine staff monitoring software to breach networks, steal confidential data, and initiate ransomware attacks. This unprecedented blend of tactics has targeted major financial institutions, raising alarms among cybersecurity professionals. Unprecedented Toolset in a…
-
Malware attack disguises itself as DeepSeek installer
Cybercriminals are exploiting the growing interest in open source AI models by disguising malware as a legitimate installer for DeepSeek. First seen on grahamcluley.com Jump to article: grahamcluley.com/malware-attack-disguises-itself-as-deepseek-installer/
-
JSFireTruck Obfuscation Helps Cybercriminals Hijack Trusted Sites with Malicious JavaScript
A sophisticated and extensive cyber attack campaign has been uncovered, in which threat actors are compromising legitimate websites to inject highly obfuscated JavaScript code. Dubbed “JSFireTruck,” this obfuscation technique enables cybercriminals to quietly redirect unsuspecting visitors to malicious sites capable of delivering malware, executing exploits, and serving unwanted advertisements. The campaign, detected across over 200,000…
-
Cybercrime Risiko Index warnt vor Cyberangriffen: Deutsche Verbraucher und KMU stark betroffen
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/cybercrime-risiko-index-warnung-cyberangriffe-deutschland-verbraucher-kmu
-
Cybercriminals Exploiting Expired Discord Invite Links to Deploy Multi-Stage Malware
Security researchers have uncovered a sophisticated malware campaign exploiting a little-known flaw in Discord’s invitation system, enabling cybercriminals to hijack expired or deleted invite links and redirect unsuspecting users to malicious servers. This attack chain, discovered by Check Point Research, leverages trusted cloud services and advanced evasion techniques to deliver powerful malware, with a particular…
-
WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network
The threat actors behind the VexTrio Viper Traffic Distribution Service (TDS) have been linked to other TDS services like Help TDS and Disposable TDS, indicating that the sophisticated cybercriminal operation is a sprawling enterprise of its own that’s designed to distribute malicious content.”VexTrio is a group of malicious adtech companies that distribute scams and harmful…
-
Windows Defender Bypass Using PowerShell and Registry Edits in CyberEYE RAT
A newly discovered remote access trojan (RAT) named CyberEye is making waves in the cybersecurity community for its sophisticated capabilities and its reliance on Telegram, the popular messaging platform, as its command-and-control (C2) infrastructure. First detected in the wild in May 2025, CyberEye is distributed under various names, including TelegramRAT, and is rapidly gaining traction among cybercriminals…
-
Infostealer crackdown: Operation Secure takes down 20,000 malicious IPs and domains
More than 20,000 malicious IP addresses and domains used by information-stealing malware were taken down during an international cybercrime crackdown led by INTERPOL. Called … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/06/11/operation-secure-cybercrime-infostealer-crackdown/
-
Operation Secure: INTERPOL Disrupts 20,000 Infostealer Domains, 32 Arrested
INTERPOL disrupts 20,000 infostealer domains in major cybercrime crackdown across Asia-Pacific, 32 arrested, 216K victims notified in Operation Secure. First seen on hackread.com Jump to article: hackread.com/operation-secure-interpol-disrupts-infostealer-domains/
-
20,000 Asian IPs and Domains Dismantled in Infostealer Crackdown
Interpol-coordinated Operation Secure led to 32 arrests, including the suspected ringleader of a cybercriminal organization First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/interpol-operation-secure/
-
FIN6 cybercriminals pose as job seekers on LinkedIn to hack recruiters
FIN6, a financially motivated group tracked for years by cybersecurity researchers, is now lurking on sites such as LinkedIn and Indeed to spread malware, a new report says. First seen on therecord.media Jump to article: therecord.media/fin6-recruitment-scam-malware-campaign
-
Innovative Approaches to NHI Protection
Will Rising Cybercrimes Warrant a More Innovative Approach to NHI Protection? With the intensifying wave of cybercrimes, robust and innovative strategies are crucial in tackling these emerging threats. One area that is often overlooked yet holds immense potential for a more secure digital is the management of Non-Human Identities (NHIs) and Secrets. Are we ready……
-
Indian Authorities Bust Cybercriminals Posing as Microsoft Tech Support
India’s Central Bureau of Investigation (CBI), the nation’s federal law enforcement agency, launched a sweeping operation targeting cyber-enabled financial fraud networks. Raids at 19 locations across India dismantled a sophisticated tech support scam operation impersonating Microsoft, primarily victimizing older adults in Japan. Major Crackdown on Tech Support Fraud Networks The operation led to the arrest…
-
Cybercrime losses averted under GDPR rules
First seen on scworld.com Jump to article: www.scworld.com/brief/cybercrime-losses-averted-under-gdpr-rules
-
APT41 Hackers Leverage Google Calendar for Malware C2 in Attacks on Government Entities
The Chinese state-sponsored threat actor APT41, also known as BARIUM, Wicked Panda, and Brass Typhoon, has been reported to exploit Google Calendar as a command-and-control (C2) mechanism in a recent campaign targeting a Taiwanese government website. This sophisticated group, active since at least 2012, is notorious for blending cyber espionage with financially motivated cybercrime, hitting…
-
BadBox 2.0 botnet infects millions of IoT devices worldwide, FBI warns
BadBox 2.0 malware has infected millions of IoT devices globally, creating a botnet used for cyber criminal activities, the FBI warns. The FBI published a Public Service Announcement (PSA) to warn that cybercriminals are using the BADBOX 2.0 botnet to exploit IoT devices on home networks, like streaming devices, projectors, and infotainment systems, mostly made…
-
Cybercriminals turn to “residential proxy” services to hide malicious traffic
“You cannot technically distinguish which traffic in a node is bad and which traffic is good.” First seen on arstechnica.com Jump to article: arstechnica.com/security/2025/06/cybercriminals-turn-to-residential-proxy-services-to-hide-malicious-traffic/
-
Bundeslagebild Cybercrime 2024: BKA meldet zahlreiche Ermittlungserfolge bei anhaltend hoher Bedrohungslage
Tags: cybercrimeFirst seen on datensicherheit.de Jump to article: www.datensicherheit.de/bundeslagebild-cybercrime-2024-bka-ermittlungserfolge-bedrohungslage
-
The Dark Web’s Currency of Choice: Stolen Data
In the 19th century, opium was a highly sought-after commodity that fueled entire economies and conflicts. Today, data holds that same level of value, perhaps even more. It is the currency of power and influence wielded by governments, corporations, and cybercriminals alike. Whether used legitimately or illicitly, data’s worth remains undeniable. This article explores the…
-
Cybercriminals Are Hiding Malicious Web Traffic in Plain Sight
In an effort to evade detection, cybercriminals are increasingly turning to “residential proxy” services that cover their tracks by making it look like everyday online activity. First seen on wired.com Jump to article: www.wired.com/story/cybercriminals-are-hiding-malicious-web-traffic-in-plain-sight/

