Tag: cybercrime
-
Cybercriminals Target Gamers with Browserthe-Browser Phishing Attacks
A new phishing campaign employing sophisticated >>browser-in-the-browser
-
Over 300 African cybercriminals apprehended in global operation
Tags: cybercrimeFirst seen on scworld.com Jump to article: www.scworld.com/brief/over-300-african-cybercriminals-apprehended-in-global-operation
-
Cybercriminals Bypass Security Using Legitimate Tools Browser Extensions to Deliver Malware
In the second half of 2024, cybercriminals have increasingly leveraged legitimate Microsoft tools and browser extensions to bypass security measures and deliver malware, according to Ontinue’s latest Threat Intelligence Report. Threat actors are exploiting built-in Microsoft features like Quick Assist and Windows Hello to establish persistence and evade detection. Quick Assist, a remote access tool,…
-
New Malware Targets Android Users by Abusing Cross-Platform Framework for Evasion
A recent discovery by the McAfee Mobile Research Team has highlighted a new wave of Android malware campaigns that utilize the .NET MAUI cross-platform framework to evade detection. This framework, introduced by Microsoft as a replacement for Xamarin, allows developers to build applications for multiple platforms, including Android, iOS, Windows, and macOS. However, cybercriminals have…
-
Cybercriminals Use Atlantis AIO to Target 140+ Platforms
Cybercriminals are increasingly leveraging Atlantis AIO, which automates credential stuffing attacks across more than 140 platforms First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/cyber-criminals-atlantis-aio-140/
-
Meet the Low-Key Access Broker Supercharging Russian State Cybercrime
Raspberry Robin breaks into organizations and sells access to Russian threat actors, including the military cyber unit behind attempted coups, assassinations, and influence operations throughout Europe. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/access-broker-russian-state-cybercrime
-
Medusa Ransomware Disables Anti-Malware Tools with Stolen Certificates
Cybercriminals exploit AbyssWorker driver to disable EDR systems, deploying MEDUSA ransomware with revoked certificates for stealthy attacks. First seen on hackread.com Jump to article: hackread.com/medusa-ransomware-anti-malware-tools-stolen-certificates/
-
300 Arrested in Crackdown on Cybercrime Rings in Africa
Authorities in seven African countries arrested 300 suspects in an international crackdown on cybercriminal networks targeting businesses. The post 300 Arrested in Crackdown on Cybercrime Rings in Africa appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/300-arrested-in-crackdown-on-cybercrime-rings-in-africa/
-
Marktanalyse im Bereich IT-Sicherheit: Strategische Entscheidungen durch professionelle Analysen absichern
Tags: cybercrimeAngesichts steigender Investitionen, zunehmender Cyberkriminalität und rasanter technologischer Entwicklungen sollten Unternehmen die Expertise erfahrener Analysten nutzen First seen on infopoint-security.de Jump to article: www.infopoint-security.de/marktanalyse-im-bereich-it-sicherheit-strategische-entscheidungen-durch-professionelle-analysen-absichern/a40229/
-
INTERPOL Arrests 306 Suspects, Seizes 1,842 Devices in Cross-Border Cybercrime Bust
Law enforcement authorities in seven African countries have arrested 306 suspects and confiscated 1,842 devices as part of an international operation codenamed Red Card that took place between November 2024 and February 2025.The coordinated effort “aims to disrupt and dismantle cross-border criminal networks which cause significant harm to individuals and businesses,” INTERPOL said, adding it…
-
FBI Warns Against Using Unsafe File Converter Tools
The FBI Denver Field Office has sounded the alarm about a burgeoning scam involving purportedly free online document converter tools. This scam, which has gained traction globally, sees cybercriminals harnessing these tools to spread malware, leading to severe consequences such as ransomware attacks. The FBI is urging the public to remain vigilant and report any…
-
Semrush Impersonation Scam Targets Google Ads
Cybercriminals are increasingly targeting online marketing and advertising tools to leverage them in their malicious campaigns. A recent First seen on securityonline.info Jump to article: securityonline.info/semrush-impersonation-scam-targets-google-ads/
-
Over 300 arrested in international crackdown on cyber scams
Law enforcement agencies in seven African countries arrested over 300 suspected cybercriminals involved in mobile banking, investment and messaging app scams, according to a statement on Monday by Interpol. First seen on therecord.media Jump to article: therecord.media/300-arrested-africa-crackdown-cyber-scams
-
Four Members of Hacker Group Behind 90 Worldwide Data Breaches Exposed
A recent investigation by Group-IB has shed light on a notorious cybercriminal operating under multiple aliases, including ALTDOS, DESORDEN, GHOSTR, and 0mid16B. This individual was responsible for over 90 data breaches globally, primarily targeting companies in Asia and other regions. The threat actor’s modus operandi involved compromising internet-facing Windows servers, exfiltrating sensitive data, and extorting…
-
VanHelsingRaaS Expands Rapidly in Cybercrime Market
VanHelsingRaaS, a new ransomware-as-a-service program, infected three victims within two weeks of release, demanding ransoms of $500,000 First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/vanhelsing-raas-expands-rapidly/
-
Police arrests 300 suspects linked to African cybercrime rings
African law enforcement authorities have arrested 306 suspects as part of ‘Operation Red Card,’ an INTERPOL-led international crackdown targeting cross-border cybercriminal networks. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/police-arrests-300-suspects-linked-to-african-cybercrime-rings/
-
Authorities Seize 1842 Devices in Africa’s Cybercrime Crackdown
Tags: cybercrimeAuthorities in seven African countries have arrested 306 suspects and seized 1842 devices in Operation Red Card First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/interpol-seize-1842-devices-africa/
-
VanHelsingRaaS Emerges, Targeting Linux, BSD, ARM, and ESXi Systems
VanHelsingRaaS, a newly launched ransomware-as-a-service (RaaS) program, has quickly gained traction in the cybercrime ecosystem. Introduced on March 7, 2025, this RaaS platform offers affiliates a cross-platform ransomware tool capable of targeting diverse systems, including Linux, BSD, ARM architectures, and VMware ESXi environments. Its rapid adoption underscores its appeal to both seasoned cybercriminals and newcomers.…
-
The Role of AI in Cybersecurity: Boon or Threat?
Think about it everything’s online these days, right? Your photos, your bank stuff, your emails, and even your fridge probably connect to the internet now. It’s fantastic, but it also means there’s a whole bunch of sneaky folks out there cybercriminals trying to mess with it all. They want your data, your […] The post…
-
Unmasking ALTDOS, DESORDEN, GHOSTR, and Omid16B: The Saga of a Cybercriminal
In a four-year pursuit that spanned multiple aliases and continents, law enforcement has finally apprehended a notorious cybercriminal. First seen on securityonline.info Jump to article: securityonline.info/unmasking-altdos-desorden-ghostr-and-omid16b-the-saga-of-a-cybercriminal/
-
Microsoft Trusted Signing service abused to code-sign malware
Cybercriminals are abusing Microsoft’s Trusted Signing platform to code-sign malware executables with short-lived three-day certificates. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/microsoft-trusted-signing-service-abused-to-code-sign-malware/
-
VanHelsing, new RaaS in Town
ey Points VanHelsing RaaS In recent weeks, a new and rapidly expanding ransomware-as-a-service (RaaS) program called VanHelsingRaaS has been making waves in the cybercrime world. Launched on March 7, 2025, this service has already demonstrated its rapid growth and deadly potential, having infected three victims within just two weeks of its introduction. Reputable affiliates can…
-
How Cybercriminals Exploit Notification Channels
Cybercriminals are always looking for new ways to take advantage of people. One effective method they use is… First seen on hackread.com Jump to article: hackread.com/how-cybercriminals-exploit-notification-channels/
-
How Cybercriminals Exploit Public Info for Attacks: Understanding Risks and Prevention
Cybercriminals are skilled at using public information to their advantage. Knowing how they gather this data can help… First seen on hackread.com Jump to article: hackread.com/how-cybercriminals-exploit-public-info-attacks-risks-prevention/
-
Microsoft Trust Signing service abused to code-sign malware
Cybercriminals are abusing Microsoft’s Trusted Signing platform to code-sign malware executables with short-lived three-day certificates. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/microsoft-trust-signing-service-abused-to-code-sign-malware/
-
Researchers Uncover FIN7’s Stealthy Python-Based Anubis Backdoor
Researchers have recently discovered a sophisticated Python-based backdoor, known as the Anubis Backdoor, deployed by the notorious cybercrime group FIN7. This advanced threat actor, active since at least 2015, has been responsible for billions of dollars in damages globally, primarily targeting the financial and hospitality sectors. The Anubis Backdoor represents a significant evolution in FIN7’s…
-
VexTrio Using 20,000 Hacked WordPress Sites in Traffic Redirect Scheme
A massive cybercrime network known as VexTrio is using thousands of compromised WordPress sites to funnel traffic through a complex redirection scheme. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/vextrio-20000-hacked-wordpress-sites-traffic-redirect-scheme
-
Cybercriminals Exploit CheckPoint Antivirus Driver in Malicious Campaign
A security researcher has observed threat actors exploiting vulnerabilities in a driver used by CheckPoint’s ZoneAlarm antivirus to bypass Windows security measures First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/cybercriminals-exploit-checkpoint/

