Tag: cybercrime
-
Hackers pose as e-sports gamers online to steal cryptocurrency from Counter-Strike fans
Cybercriminals are exploiting major e-sports tournaments to target players of the popular video game Counter-Strike 2 (CS2), researchers have found. First seen on therecord.media Jump to article: therecord.media/hackers-pose-as-esports-gamers-to-steal-crypto-from-fans
-
Leaked Black Basta Chats Expose Ransomware Secrets Infighting
Leaked Black Basta chat logs expose ransomware secrets, key members, and internal conflicts, revealing new insights into cybercrime operations. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/cybersecurity/black-basta-ransomware-leak-chat-logs/
-
Cybercriminals Impersonate Windows >>Commander Tool<< to Launch LummaC2 Malware Attack
The AhnLab Security Intelligence Center (ASEC) has uncovered a new cyberattack campaign leveraging the LummaC2 malware, which is being distributed under the guise of a cracked version of Total Commander. Total Commander is a widely used Windows file management tool offering features like advanced search, folder synchronization, and FTP/SFTP support. While the legitimate software provides…
-
Thailand Targets Cyber Sweatshops to Free 1,000s of Captives
Thai police said it was expecting to soon welcome 7,000 human trafficking victims, forced to work on cybercrime scams in call centers in Mynmar, in a first wave of people being freed from captivity. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/thailand-cyber-sweatshops-free-captives
-
Conducting Security Audits in Supply Chain Management
Cyberattacks against supply chains have risen recently, but many risks go unnoticed and unaddressed. As cybercrime grows, supply chain professionals must embrace regular security audits. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/02/conducting-security-audits-in-supply-chain-management/
-
GitVenom Campaign: Malicious GitHub Repositories Target Crypto and Credentials
Security researchers at Kaspersky Labs have uncovered a large-scale cybercrime campaign, dubbed GitVenom, that targets GitHub users by First seen on securityonline.info Jump to article: securityonline.info/gitvenom-campaign-malicious-github-repositories-target-crypto-and-credentials/
-
GhostSocks Malware Uses SOCKS5 Proxy to Evade Detection Systems
GhostSocks, a Golang-based SOCKS5 backconnect proxy malware, has emerged as a significant threat within the cybercrime ecosystem. First identified in October 2023 on Russian-language forums, its distribution expanded to English-speaking criminal platforms by mid-2024. This malware operates as part of a Malware-as-a-Service (MaaS) model, allowing threat actors to exploit compromised systems for financial gain. Its…
-
ScreamedJungle Campaign Steals Browser Fingerprints from 115+ Sites
A new report from Group-IB exposes a growing cybersecurity threat: browser fingerprint theft. Cybercriminals are using sophisticated techniques First seen on securityonline.info Jump to article: securityonline.info/screamedjungle-campaign-steals-browser-fingerprints-from-115-sites/
-
Investigators Link $1.4B Bybit Hack to North Korea’s Lazarus Group
Investigators link the $1.4B Bybit hack to North Korea’s Lazarus Group, exposing a major crypto heist tied to state-backed cybercrime and money laundering. First seen on hackread.com Jump to article: hackread.com/investigators-link-bybit-hack-north-korea-lazarus-group/
-
Bloody Wolf Cybercrime Group Evolves Tactics, Expands Targets
The BI.ZONE Threat Intelligence team has released a new report detailing the evolution of the Bloody Wolf cybercrime First seen on securityonline.info Jump to article: securityonline.info/bloody-wolf-cybercrime-group-evolves-tactics-expands-targets/
-
Cybercriminals Can Now Clone Any Brand’s Site in Minutes Using Darcula PhaaS v3
The threat actors behind the Darcula phishing-as-a-service (PhaaS) platform appear to be readying a new version that allows prospective customers and cyber crooks to clone any brand’s legitimate website and create a phishing version, further bringing down the technical expertise required to pull off phishing attacks at scale.The latest iteration of the phishing suite “represents…
-
Ghost Ransomware Targets Orgs in 70+ Countries
The China-backed threat group often acts swiftly, going from initial access to compromise in just one day, a behavior atypical of cybercriminal groups. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/ghost-ransomware-targets-orgs-70-countries
-
New Darcula 3.0 Tool Generates Phishing Kits to Mimic Global Brands
The cybercriminal group behind the notorious >>darcula-suite>Phishing-as-a-Service
-
Adversarythe-Middle Hackers Exploit Vulnerabilities to Deploy Advanced Malware
Tags: authentication, credentials, cyber, cybercrime, exploit, finance, hacker, malware, mfa, phishing, service, threat, vulnerabilityCybercriminals are increasingly leveraging sophisticated Adversary-in-the-Middle (AiTM) phishing techniques, enabled by the rise of Phishing-as-a-Service (PhaaS) ecosystems. These operations target financial institutions globally, bypassing multi-factor authentication (MFA) by intercepting live authentication sessions. Threat actors use reverse proxy servers to relay user inputs to legitimate websites, capturing credentials and session cookies in real time. This allows…
-
Der Mittelstand im Visier: Fünf essenzielle Strategien im Kampf gegen Cybercrime
Cyberangriffe nehmen weiterhin zu und rücken zunehmend auch mittelständische Unternehmen ins Visier von Hackern. Und doch sind viele Betriebe immer noch unzureichend geschützt oft, weil sie die digitale Bedrohungslage unterschätzen. Anouck Teiller, Chief Strategy Officer bei HarfangLab, stellt fünf Maßnahmen vor, mit denen Mittelständler ihre Cybersicherheit verbessern können. Die Digitalisierung bietet viele Chancen, erhöht… First…
-
Cracked Games, Cryptojacked PCs: The StaryDobry Campaign
On December 31, cybercriminals launched a mass infection campaign, dubbed StaryDobry, leveraging the holiday season’s increased torrent traffic First seen on securityonline.info Jump to article: securityonline.info/cracked-games-cryptojacked-pcs-the-starydobry-campaign/
-
Career Spotlight: Cloud Security Specialist
Demand for Cloud Security Skills Is Growing, Offering Good Pay and New Challenges Cloud services support a wide range of applications from finance to healthcare systems and have become prime targets for cybercriminals, making cloud security a major concern for cybersecurity organizations. The need to secure the cloud is driving demand for skilled cloud security…
-
New FrigidStealer infostealer infects Macs via fake browser updates
The FakeUpdate malware campaigns are increasingly becoming muddled, with two additional cybercrime groups tracked as TA2726 and TA2727, running campaigns that push a new macOS infostealer malware called FrigidStealer. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/new-frigidstealer-infostealer-infects-macs-via-fake-browser-updates/
-
CaaS Surges in 2025, Along With RATs, Ransomware
Cybercrime-as-a-Service (CaaS) now accounts for 57% of all cyberthreats, marking a 17% increase from the first half of 2024, according to Darktrace’s Annual Threat Report. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/02/caas-surges-in-2025-along-with-rats-ransomware/
-
Hackers Converting Stolen Payment Card Data into Apple Google Wallets
Cybercriminal groups, primarily based in China, are leveraging advanced phishing techniques and mobile wallet technologies to convert stolen payment card data into fraudulent Apple and Google Wallet accounts. This innovative approach has revitalized the underground carding industry, which had been weakened in recent years by the adoption of chip-based payment cards in the United States.…
-
Russian CryptoBytes Hackers Target Windows Machines with UxCryptor Ransomware
Tags: cyber, cybercrime, data-breach, group, hacker, malware, ransomware, russia, threat, tool, windowsThe SonicWall Capture Labs threat research team has identified continued activity from the Russian cybercriminal group CryptoBytes, which has been active since at least 2023. This financially motivated group is leveraging a ransomware strain named UxCryptor, which has gained notoriety for its reliance on leaked ransomware builders. These tools lower the technical barrier for malware…
-
Next Wave of ‘Scam-Yourself’ Attacks Leverages AI-Generated Deepfake Videos
Cybersecurity experts have uncovered a new wave of >>Scam-Yourself
-
Mehrheit der Deutschen fürchtet sich vor Cyberangriffen
Viele Deutsche fürchten sich vor gezielten Cyberangriffen, die von Staaten ausgehen.Eine deutliche Mehrheit der Menschen in Deutschland hat Angst vor Cyberangriffen oder gar einem Cyberkrieg. Bei einer repräsentativen Umfrage des Digitalverbandes Bitkom sagten 61 Prozent, dass sie Cyberangriffe durch Staaten befürchten, mit denen Infrastruktur, öffentliche Einrichtungen oder Unternehmen gezielt gestört, sabotiert oder zerstört werden sollen.…
-
Russian Government Proposes Stricter Penalties to Tackle Cybercrime
Tags: cyber, cybercrime, cybersecurity, framework, government, hacker, infrastructure, law, russia, threatThe Russian government has unveiled sweeping legislative reforms aimed at curbing cybercrime, introducing stricter penalties, expansive law enforcement powers, and novel judicial measures. Approved on February 10, 2025, the amendments seek to modernize the nation’s cybersecurity framework amid rising digital threats, targeting hackers, fraudsters, and infrastructure attackers with harsher punishments and strengthened investigative tools. The…
-
Threat Actors Trojanize Popular Games to Evade Security and Infect Systems
A sophisticated malware campaign was launched by cybercriminals, targeting users through trojanized versions of popular games. Exploiting the holiday season’s heightened torrent activity, the attackers distributed compromised game installers via torrent trackers. The campaign, which lasted for a month, primarily delivered the XMRig cryptominer to unsuspecting users in Russia, Brazil, Germany, Belarus, and Kazakhstan. Popular…
-
Cybercriminals shift focus to social media as attacks reach historic highs
A new report from Gen highlights a sharp rise in online threats, capping off a record-breaking 2024. Between October and December alone, 2.55 billion cyber threats were … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/02/18/cybercriminals-social-media-attacks/
-
Cybercriminals Embedded Credit Card Stealer Script Within <img> Tag
Cybersecurity researchers have uncovered a new MageCart malware campaign targeting e-commerce websites running on the Magento platform. This attack exploits <img> HTML tags to conceal malicious JavaScript skimmers, enabling cybercriminals to steal sensitive payment information while evading detection by security tools. MageCart, a term used to describe credit card skimming malware, has evolved with increasingly…
-
Got a Microsoft Teams invite? Storm-2372 gang exploit device codes in global phishing attacks
Security experts have warned that a cybercriminal group has been running a malicious and inventive phishing campaign since August 2024 to break into organizations across Europe, North America, Africa, and the Middle East. First seen on tripwire.com Jump to article: www.tripwire.com/state-of-security/microsoft-teams-storm-2372-exploit-device-codes

