Tag: cybercrime
-
Microsoft Disrupts Storm-2139 for LLMjacking and Azure AI Exploitation
Microsoft exposes Storm-2139, a cybercrime network exploiting Azure AI via LLMjacking. Learn how stolen API keys enabled harmful… First seen on hackread.com Jump to article: hackread.com/microsoft-storm-2139-llmjacking-azure-ai-exploitation/
-
Microsoft continues cracks down on global generative AI cybercrime network
First seen on scworld.com Jump to article: www.scworld.com/brief/microsoft-continues-cracks-down-on-global-generative-ai-cybercrime-network
-
Microsoft Continues Crackdown On Global GenAI Cybercrime Network
First seen on scworld.com Jump to article: www.scworld.com/brief/microsoft-continues-crackdown-on-global-genai-cybercrime-network
-
Microsoft targets AI deepfake cybercrime network in lawsuit
Microsoft alleges that defendants used stolen Azure OpenAI API keys and special software to bypass content guardrails and generate illicit AI deepfakes for payment. First seen on techtarget.com Jump to article: www.techtarget.com/searchsecurity/news/366619781/Microsoft-targets-AI-deepfake-cybercrime-network-in-lawsuit
-
Microsoft files lawsuit against LLMjacking gang that bypassed AI safeguards
LLMjacking can cost organizations a lot of money: LLMjacking is a continuation of the cybercriminal practice of abusing stolen cloud account credentials for various illegal operations, such as cryptojacking, abusing hacked cloud computing resources to mine cryptocurrency. The difference is that large quantities of API calls to LLMs can quickly rack up huge costs, with…
-
ISMG Editors: Black Basta Falls, Is Ransomware on the Ropes?
Also: U.S. Health Data Privacy Crackdowns, Reality vs. Hype of LLMs in Security. In this week’s update, four editors with ISMG explore the crumbling state of ransomware group Black Basta and implications for other cybercrime gangs, the expanding impact of U.S. health data privacy laws, and whether large language models are truly what they seem.…
-
Inside the Minds of Cybercriminals: A Deep Dive into Black Basta’s Leaked Chats”¯
“¯ The leaked internal chat communications of the Black Basta ransomware group offer an unprecedented view into how cybercriminals operate, plan attacks, and evade detection. The Veriti Research team analyzed these chat logs, revealing our favorite exploits, security measures they bypass, and the defenses they fear most. Veriti Research analyzed these chat communications, exposing: “¯ Vulnerabilities……
-
Microsoft Names Suspects in Lawsuit Against AI Hackers
In a lawsuit targeting cybercriminals who abuse AI services, Microsoft has named individuals from Iran, the UK, China and Vietnam. The post Microsoft Names Suspects in Lawsuit Against AI Hackers appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/microsoft-names-suspects-in-lawsuit-against-ai-hackers/
-
How to Protect Your Digital Identity While Gaming Online
Playing games online provides entertainment but exposes you to specific dangers during gameplay. Hackers and scammers specifically target your personal data, payment specifics, and gaming account information. Cybercriminals steal money and account credentials through phishing attacks, malware, and unsecured systems. Gaming carelessly can lead to possible profile loss and the threat of identity theft. Protecting…
-
Hiding in Plain Sight: The Hidden Dangers of Geolocation in Cloud Security
One of the biggest challenges organizations face today is detecting malicious activity in cloud environments. As highlighted in MixMode’s latest Threat Research Report, cybercriminals are increasingly leveraging trusted cloud providers like AWS, Microsoft Azure, and Google Cloud to disguise their attacks, a strategy known as infrastructure laundering. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/02/hiding-in-plain-sight-the-hidden-dangers-of-geolocation-in-cloud-security-2/
-
DeepSeek Lure Using CAPTCHAs To Spread Malware
Tags: ai, attack, botnet, breach, captcha, cloud, control, credentials, crypto, cybercrime, data, detection, exploit, infrastructure, injection, international, login, malicious, malware, network, open-source, powershell, privacy, scam, service, technology, theft, threat, tool, windowsIntroductionThe rapid rise of generative AI tools has created opportunities and challenges for cybercriminals. In an instant, industries are being reshaped while new attack surfaces are being exposed. DeepSeek AI chatbot that launched on January 20, 2025, quickly gained international attention, making it a prime target for abuse. Leveraging a tactic known as brand impersonation,…
-
Understanding MFA Fatigue: Why Cybercriminals Are Exploiting Human Behaviour
The common maxim in cybersecurity is that the industry is always on the back foot. While cybersecurity practitioners build higher walls, adversaries are busy creating taller ladders. It’s the nature of the beast. A prime example is multi-factor authentication (MFA), a security process that requires users to verify their identity in two or more ways,…
-
Hackers Exploiting Cisco Small Business Routers RCE Vulnerability Deploying Webshell
Tags: backdoor, business, cisco, cve, cyber, cybercrime, exploit, flaw, hacker, rce, remote-code-execution, router, vulnerabilityA critical remote code execution (RCE) vulnerability, CVE-2023-20118, affecting Cisco Small Business Routers, has become a focal point for cybercriminals deploying webshells and advanced backdoor payloads. The vulnerability, caused by improper input validation in the routers’ web-based management interface, allows unauthenticated attackers to execute arbitrary commands by sending specially crafted HTTP requests. This flaw has…
-
New Attack Hijacks Popular YouTube Gaming Channels to Steal Steam Accounts
Cybersecurity researchers at Bitdefender Labs have uncovered a sophisticated scam targeting the Counter-Strike 2 (CS2) gaming community. Cybercriminals are hijacking popular YouTube gaming channels to impersonate professional players and lure unsuspecting fans into fraudulent schemes. These scams, timed to coincide with major esports events like IEM Katowice 2025 and PGL Cluj-Napoca 2025, result in stolen…
-
5 Active Malware Campaigns in Q1 2025
The first quarter of 2025 has been a battlefield in the world of cybersecurity. Cybercriminals continued launching aggressive new campaigns and refining their attack methods.Below is an overview of five notable malware families, accompanied by analyses conducted in controlled environments.NetSupport RAT Exploiting the ClickFix TechniqueIn early 2025, threat actors began exploiting a technique First seen…
-
Dragos: Surge of new hacking groups enter ICS space as states collaborate with private actors
States are increasingly collaborating with cybercriminal groups to share resources and amplify attacks on critical infrastructure in rival nations, a new report finds. First seen on cyberscoop.com Jump to article: cyberscoop.com/dragos-ot-ics-annual-report-states-collaborating-with-private-hacking-groups/
-
Hackers pose as e-sports gamers online to steal cryptocurrency from Counter-Strike fans
Cybercriminals are exploiting major e-sports tournaments to target players of the popular video game Counter-Strike 2 (CS2), researchers have found. First seen on therecord.media Jump to article: therecord.media/hackers-pose-as-esports-gamers-to-steal-crypto-from-fans
-
Leaked Black Basta Chats Expose Ransomware Secrets Infighting
Leaked Black Basta chat logs expose ransomware secrets, key members, and internal conflicts, revealing new insights into cybercrime operations. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/cybersecurity/black-basta-ransomware-leak-chat-logs/
-
Cybercriminals Impersonate Windows >>Commander Tool<< to Launch LummaC2 Malware Attack
The AhnLab Security Intelligence Center (ASEC) has uncovered a new cyberattack campaign leveraging the LummaC2 malware, which is being distributed under the guise of a cracked version of Total Commander. Total Commander is a widely used Windows file management tool offering features like advanced search, folder synchronization, and FTP/SFTP support. While the legitimate software provides…
-
Thailand Targets Cyber Sweatshops to Free 1,000s of Captives
Thai police said it was expecting to soon welcome 7,000 human trafficking victims, forced to work on cybercrime scams in call centers in Mynmar, in a first wave of people being freed from captivity. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/thailand-cyber-sweatshops-free-captives
-
Conducting Security Audits in Supply Chain Management
Cyberattacks against supply chains have risen recently, but many risks go unnoticed and unaddressed. As cybercrime grows, supply chain professionals must embrace regular security audits. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/02/conducting-security-audits-in-supply-chain-management/
-
GitVenom Campaign: Malicious GitHub Repositories Target Crypto and Credentials
Security researchers at Kaspersky Labs have uncovered a large-scale cybercrime campaign, dubbed GitVenom, that targets GitHub users by First seen on securityonline.info Jump to article: securityonline.info/gitvenom-campaign-malicious-github-repositories-target-crypto-and-credentials/
-
GhostSocks Malware Uses SOCKS5 Proxy to Evade Detection Systems
GhostSocks, a Golang-based SOCKS5 backconnect proxy malware, has emerged as a significant threat within the cybercrime ecosystem. First identified in October 2023 on Russian-language forums, its distribution expanded to English-speaking criminal platforms by mid-2024. This malware operates as part of a Malware-as-a-Service (MaaS) model, allowing threat actors to exploit compromised systems for financial gain. Its…
-
ScreamedJungle Campaign Steals Browser Fingerprints from 115+ Sites
A new report from Group-IB exposes a growing cybersecurity threat: browser fingerprint theft. Cybercriminals are using sophisticated techniques First seen on securityonline.info Jump to article: securityonline.info/screamedjungle-campaign-steals-browser-fingerprints-from-115-sites/

