Tag: cybercrime
-
Russian bulletproof hosting provider sanctioned over ransomware ties
Today, the United States, the United Kingdom, and Australia announced sanctions targeting Russian bulletproof hosting (BPH) providers that have supported ransomware gangs and other cybercrime operations. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/us-sanctions-russian-bulletproof-hosting-provider-media-land-over-ransomware-ties/
-
Eternidade Stealer Trojan Fuels Aggressive Brazil Cybercrime
Trustwave SpiderLabs has observed new banking Trojan Eternidade Stealer targeting Brazil using WhatsApp for propagation and data theft First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/eternidade-stealer-trojan-brazil/
-
50,000 CCTVs Hacked in India: Intimate Hospital Footage Sold Online
A disturbing case of hacking CCTV systems in India has exposed a widespread cybercrime racket through which intimate videos from a maternity ward were stolen and sold online. Police in Gujarat state say the discovery has raised concern for surveillance practices in a country where cameras are routinely placed across public and private spaces. First…
-
Authorities Dismantle Thousands of Servers from Illicit Hosting Company Linked to Cyberattacks
In a landmark operation targeting cybercriminal infrastructure, the East Netherlands cybercrime team conducted a major takedown of a rogue hosting company suspected of facilitating a broad spectrum of malicious activities. During the coordinated enforcement action on November 12th, law enforcement seized approximately 250 physical servers located in data centers across The Hague and Zoetermeer. The…
-
Australian cybercrime portal exploited by scammers
First seen on scworld.com Jump to article: www.scworld.com/brief/australian-cybercrime-portal-exploited-by-scammers
-
The Quantum Future Is Coming Hackers Are Already Preparing
In 2025 we’re not just fighting today’s headline-grabbing cyber threats, but we’re also preparing for tomorrow’s. Technology is evolving at a pace that is both fuelling progress for defenders and powering new tools for bad actors. The same advances that drive discovery and innovation also give cybercriminals new ways to attack faster, more broadly and…
-
Schlag gegen Cybercrime: Hunderte Server von Bulletproof-Hoster beschlagnahmt
Tags: cybercrimeStrafverfolger haben in den Niederlanden eine Razzia veranstaltet. 250 für Cybercrime-Aktivitäten genutzte Server wurden vom Netz genommen. First seen on golem.de Jump to article: www.golem.de/news/schlag-gegen-cybercrime-hunderte-server-von-bulletproof-hoster-beschlagnahmt-2511-202304.html
-
Dutch police takes down bulletproof hosting hub linked to 80+ cybercrime cases
Dutch police seized 250 servers running a bulletproof hosting service tied to cybercriminals and linked to over 80 investigations since 2022. Dutch police Politie, seized 250 servers running an unnamed bulletproof hosting service used solely by cybercriminals. Active since 2022, it appeared in over 80 cybercrime investigations. >>In an investigation into a rogue hosting company,…
-
Dutch police takes down bulletproof hosting hub linked to 80+ cybercrime cases
Dutch police seized 250 servers running a bulletproof hosting service tied to cybercriminals and linked to over 80 investigations since 2022. Dutch police Politie, seized 250 servers running an unnamed bulletproof hosting service used solely by cybercriminals. Active since 2022, it appeared in over 80 cybercrime investigations. >>In an investigation into a rogue hosting company,…
-
Jaguar Land Rover Hack Cost $260 Million
Carmaker Resumes Full Production. The September cyberattack on Jaguar Land Rover resulted in a company loss of roughly $260 million, the British carmaker reported Friday while also announcing a resumption of normal production. Cybercrime group Scattered Lapsus$ Hunters took responsibility for the hack. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/jaguar-land-rover-hack-cost-260-million-a-30051
-
Logitech discloses data breach after Clop claims
The filing comes one week after the Clop cybercriminal organization claimed it stole information from Logitech through a zero-day vulnerability in Oracle’s E-Business Suite tool. First seen on therecord.media Jump to article: therecord.media/logitech-discloses-data-breach-clop
-
Dutch police seizes 250 servers used by “bulletproof hosting” service
The police in the Netherlands have seized around 250 physical servers powering a bulletproof hosting service in the country used exclusively by cybercriminals for providing complete anonymity. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/dutch-police-seizes-250-servers-used-by-bulletproof-hosting-service/
-
KI Kriminalität: Wenn der Betrug auf Autopilot läuft
Künstliche Intelligenz ermöglicht eine neue Form der Cyberkriminalität, die auf Autopilot läuft. Die Täter brauchen kein Fachwissen mehr. First seen on tarnkappe.info Jump to article: tarnkappe.info/artikel/it-sicherheit/online-betrug/ki-kriminalitaet-wenn-der-betrug-auf-autopilot-laeuft-323097.html
-
The Human Perimeter: How the COM Became a Cybercrime Powerhouse
The COM’s rise highlights how attackers increasingly exploit identity and trust to drive modern cybercrime. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/the-human-perimeter-how-the-com-became-a-cybercrime-powerhouse/
-
The Human Perimeter: How the COM Became a Cybercrime Powerhouse
The COM’s rise highlights how attackers increasingly exploit identity and trust to drive modern cybercrime. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/the-human-perimeter-how-the-com-became-a-cybercrime-powerhouse/
-
North Korean Hackers Breach 136 U.S. Companies, Earning $2.2 Million
The U.S. Justice Department has announced a significant crackdown on North Korean cybercrime operations, securing five guilty pleas and initiating civil forfeiture actions totaling over $15 million against schemes orchestrated by the Democratic People’s Republic of Korea (DPRK). The elaborate fraud network impacted more than 136 American companies, generating $2.2 million for the North Korean…
-
Document Tech Firm Hit as New Cyber Gang Expands Reach
Kazu Demands $200K Ransom, Begins Leaking 1.2M Stolen Patient Records. Kazu, a relative newcomer among cybercrime gangs, is threatening to post 353 gigabytes of data allegedly stolen in recent weeks from Doctor Alliance, a Texas-based company that provides document and billing management technology and services to physician practices. The attack appears to be the gang’s…
-
Western governments disrupt trifecta of cybercrime tools
Authorities seized more than 1,000 servers and 20 domains in the operation. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/operation-endgame-third-phase-infostealer-rat-botnet/805549/
-
CISA flags imminent threat as Akira ransomware starts hitting Nutanix AHV
Advisory updated as leading cybercrime crew opens up its target pool First seen on theregister.com Jump to article: www.theregister.com/2025/11/14/cisa_akira_ransomware/
-
Cybercriminals Use Fake Invoices to Deploy XWorm and Steal Login Credentials
Cybercriminals are deploying sophisticated phishing campaigns that weaponize seemingly legitimate invoice emails to distribute Backdoor.XWorm is a dangerous remote-access trojan (RAT) capable of stealing sensitive credentials, recording keystrokes, and installing ransomware. Security researchers have uncovered an active malware distribution operation using Visual Basic Script attachments disguised as routine business correspondence, representing a dangerous evolution of social…
-
Cybercriminals Use Fake Invoices to Deploy XWorm and Steal Login Credentials
Cybercriminals are deploying sophisticated phishing campaigns that weaponize seemingly legitimate invoice emails to distribute Backdoor.XWorm is a dangerous remote-access trojan (RAT) capable of stealing sensitive credentials, recording keystrokes, and installing ransomware. Security researchers have uncovered an active malware distribution operation using Visual Basic Script attachments disguised as routine business correspondence, representing a dangerous evolution of social…
-
Cybercriminals Use Fake Invoices to Deploy XWorm and Steal Login Credentials
Cybercriminals are deploying sophisticated phishing campaigns that weaponize seemingly legitimate invoice emails to distribute Backdoor.XWorm is a dangerous remote-access trojan (RAT) capable of stealing sensitive credentials, recording keystrokes, and installing ransomware. Security researchers have uncovered an active malware distribution operation using Visual Basic Script attachments disguised as routine business correspondence, representing a dangerous evolution of social…
-
Für Cybercrime-Forschung: Dienstleister spendet von Hackern gefordertes Lösegeld
Ein Cyberangriff hat den Zahlungsdienstleister Checkout.com getroffen. Dieser zahlt das Lösegeld – allerdings nicht an die Angreifer. First seen on golem.de Jump to article: www.golem.de/news/fuer-cybercrime-forschung-dienstleister-spendet-von-hackern-gefordertes-loesegeld-2511-202195.html
-
Analysis of Multi-Stage Phishing Kits Leveraging Telegram for Credential Theft and Evasion Techniques
Tags: automation, credentials, cyber, cybercrime, data, finance, framework, group, phishing, risk, service, theftResearchers at Group-IB have uncovered a sophisticated phishing framework that demonstrates how cybercriminals are industrializing credential theft through automation, evasion techniques, and Telegram-based data exfiltration. The kit targets explicitly Aruba S.p.A., an Italian IT services provider serving over 5.4 million customers, highlighting the significant financial and operational risks posed by modern phishing-as-a-service operations. The analyzed…
-
Clop claims it hacked ‘the NHS.’ Which bit? Your guess is as good as theirs
Cybercrime crew has ravaged multiple private organizations using Oracle EBS zero-day for months First seen on theregister.com Jump to article: www.theregister.com/2025/11/14/nhs_clop/
-
Malvertising-Netzwerk namens Payroll Pirates entdeckt
Ein Forschungsteam von Check Point Software Technologies hat ein weit verzweigtes Cybercrime-Netzwerk aufgedeckt, das legitime Online-Werbeplattformen gezielt missbraucht. Die Gruppe, die unter dem Namen ‘Payroll Pirates” bekannt ist, hat sich seit Mitte 2023 darauf spezialisiert, Gehalts- und Finanzsysteme zu manipulieren. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/malvertising-netzwerk-payroll-pirates
-
Checkout.com Suffers Data Breach as ShinyHunters Attack Cloud Storage
Payment processor Checkout.com recently experienced a data breach after being targeted by the cybercrime group “ShinyHunters.” The attackers accessed old data stored in a third-party cloud system. Luckily, Checkout.com’s live payment processing environment was not affected, and no merchant funds or card numbers were accessed. The company revealed that the breach happened last week when…

