Tag: cybercrime
-
Investigators Link $1.4B Bybit Hack to North Korea’s Lazarus Group
Investigators link the $1.4B Bybit hack to North Korea’s Lazarus Group, exposing a major crypto heist tied to state-backed cybercrime and money laundering. First seen on hackread.com Jump to article: hackread.com/investigators-link-bybit-hack-north-korea-lazarus-group/
-
Bloody Wolf Cybercrime Group Evolves Tactics, Expands Targets
The BI.ZONE Threat Intelligence team has released a new report detailing the evolution of the Bloody Wolf cybercrime First seen on securityonline.info Jump to article: securityonline.info/bloody-wolf-cybercrime-group-evolves-tactics-expands-targets/
-
Cybercriminals Can Now Clone Any Brand’s Site in Minutes Using Darcula PhaaS v3
The threat actors behind the Darcula phishing-as-a-service (PhaaS) platform appear to be readying a new version that allows prospective customers and cyber crooks to clone any brand’s legitimate website and create a phishing version, further bringing down the technical expertise required to pull off phishing attacks at scale.The latest iteration of the phishing suite “represents…
-
Ghost Ransomware Targets Orgs in 70+ Countries
The China-backed threat group often acts swiftly, going from initial access to compromise in just one day, a behavior atypical of cybercriminal groups. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/ghost-ransomware-targets-orgs-70-countries
-
New Darcula 3.0 Tool Generates Phishing Kits to Mimic Global Brands
The cybercriminal group behind the notorious >>darcula-suite>Phishing-as-a-Service
-
Adversarythe-Middle Hackers Exploit Vulnerabilities to Deploy Advanced Malware
Tags: authentication, credentials, cyber, cybercrime, exploit, finance, hacker, malware, mfa, phishing, service, threat, vulnerabilityCybercriminals are increasingly leveraging sophisticated Adversary-in-the-Middle (AiTM) phishing techniques, enabled by the rise of Phishing-as-a-Service (PhaaS) ecosystems. These operations target financial institutions globally, bypassing multi-factor authentication (MFA) by intercepting live authentication sessions. Threat actors use reverse proxy servers to relay user inputs to legitimate websites, capturing credentials and session cookies in real time. This allows…
-
Der Mittelstand im Visier: Fünf essenzielle Strategien im Kampf gegen Cybercrime
Cyberangriffe nehmen weiterhin zu und rücken zunehmend auch mittelständische Unternehmen ins Visier von Hackern. Und doch sind viele Betriebe immer noch unzureichend geschützt oft, weil sie die digitale Bedrohungslage unterschätzen. Anouck Teiller, Chief Strategy Officer bei HarfangLab, stellt fünf Maßnahmen vor, mit denen Mittelständler ihre Cybersicherheit verbessern können. Die Digitalisierung bietet viele Chancen, erhöht… First…
-
Cracked Games, Cryptojacked PCs: The StaryDobry Campaign
On December 31, cybercriminals launched a mass infection campaign, dubbed StaryDobry, leveraging the holiday season’s increased torrent traffic First seen on securityonline.info Jump to article: securityonline.info/cracked-games-cryptojacked-pcs-the-starydobry-campaign/
-
Career Spotlight: Cloud Security Specialist
Demand for Cloud Security Skills Is Growing, Offering Good Pay and New Challenges Cloud services support a wide range of applications from finance to healthcare systems and have become prime targets for cybercriminals, making cloud security a major concern for cybersecurity organizations. The need to secure the cloud is driving demand for skilled cloud security…
-
New FrigidStealer infostealer infects Macs via fake browser updates
The FakeUpdate malware campaigns are increasingly becoming muddled, with two additional cybercrime groups tracked as TA2726 and TA2727, running campaigns that push a new macOS infostealer malware called FrigidStealer. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/new-frigidstealer-infostealer-infects-macs-via-fake-browser-updates/
-
Russian CryptoBytes Hackers Target Windows Machines with UxCryptor Ransomware
Tags: cyber, cybercrime, data-breach, group, hacker, malware, ransomware, russia, threat, tool, windowsThe SonicWall Capture Labs threat research team has identified continued activity from the Russian cybercriminal group CryptoBytes, which has been active since at least 2023. This financially motivated group is leveraging a ransomware strain named UxCryptor, which has gained notoriety for its reliance on leaked ransomware builders. These tools lower the technical barrier for malware…
-
Next Wave of ‘Scam-Yourself’ Attacks Leverages AI-Generated Deepfake Videos
Cybersecurity experts have uncovered a new wave of >>Scam-Yourself
-
CaaS Surges in 2025, Along With RATs, Ransomware
Cybercrime-as-a-Service (CaaS) now accounts for 57% of all cyberthreats, marking a 17% increase from the first half of 2024, according to Darktrace’s Annual Threat Report. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/02/caas-surges-in-2025-along-with-rats-ransomware/
-
Hackers Converting Stolen Payment Card Data into Apple Google Wallets
Cybercriminal groups, primarily based in China, are leveraging advanced phishing techniques and mobile wallet technologies to convert stolen payment card data into fraudulent Apple and Google Wallet accounts. This innovative approach has revitalized the underground carding industry, which had been weakened in recent years by the adoption of chip-based payment cards in the United States.…
-
Mehrheit der Deutschen fürchtet sich vor Cyberangriffen
Viele Deutsche fürchten sich vor gezielten Cyberangriffen, die von Staaten ausgehen.Eine deutliche Mehrheit der Menschen in Deutschland hat Angst vor Cyberangriffen oder gar einem Cyberkrieg. Bei einer repräsentativen Umfrage des Digitalverbandes Bitkom sagten 61 Prozent, dass sie Cyberangriffe durch Staaten befürchten, mit denen Infrastruktur, öffentliche Einrichtungen oder Unternehmen gezielt gestört, sabotiert oder zerstört werden sollen.…
-
Russian Government Proposes Stricter Penalties to Tackle Cybercrime
Tags: cyber, cybercrime, cybersecurity, framework, government, hacker, infrastructure, law, russia, threatThe Russian government has unveiled sweeping legislative reforms aimed at curbing cybercrime, introducing stricter penalties, expansive law enforcement powers, and novel judicial measures. Approved on February 10, 2025, the amendments seek to modernize the nation’s cybersecurity framework amid rising digital threats, targeting hackers, fraudsters, and infrastructure attackers with harsher punishments and strengthened investigative tools. The…
-
Threat Actors Trojanize Popular Games to Evade Security and Infect Systems
A sophisticated malware campaign was launched by cybercriminals, targeting users through trojanized versions of popular games. Exploiting the holiday season’s heightened torrent activity, the attackers distributed compromised game installers via torrent trackers. The campaign, which lasted for a month, primarily delivered the XMRig cryptominer to unsuspecting users in Russia, Brazil, Germany, Belarus, and Kazakhstan. Popular…
-
Cybercriminals shift focus to social media as attacks reach historic highs
A new report from Gen highlights a sharp rise in online threats, capping off a record-breaking 2024. Between October and December alone, 2.55 billion cyber threats were … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/02/18/cybercriminals-social-media-attacks/
-
Cybercriminals Embedded Credit Card Stealer Script Within <img> Tag
Cybersecurity researchers have uncovered a new MageCart malware campaign targeting e-commerce websites running on the Magento platform. This attack exploits <img> HTML tags to conceal malicious JavaScript skimmers, enabling cybercriminals to steal sensitive payment information while evading detection by security tools. MageCart, a term used to describe credit card skimming malware, has evolved with increasingly…
-
Got a Microsoft Teams invite? Storm-2372 gang exploit device codes in global phishing attacks
Security experts have warned that a cybercriminal group has been running a malicious and inventive phishing campaign since August 2024 to break into organizations across Europe, North America, Africa, and the Middle East. First seen on tripwire.com Jump to article: www.tripwire.com/state-of-security/microsoft-teams-storm-2372-exploit-device-codes
-
XCSSET macOS malware reappears with new attack strategies, Microsoft sounds alarm
Xcode developers targeted through infected projects: Microsoft reported that XCSSET continues to spread via compromised Xcode projects, a technique that has been in use since the malware’s discovery in 2020. Once an infected project is cloned or downloaded, the malware can embed itself within the developer’s system and further propagate when the infected code is…
-
Password managers under increasing threat as infostealers triple and adapt
Tags: access, attack, authentication, automation, breach, ceo, cloud, credentials, crypto, cyber, cybercrime, cybersecurity, dark-web, data, data-breach, defense, email, encryption, exploit, finance, hacker, identity, intelligence, least-privilege, login, malicious, malware, mfa, password, phishing, ransomware, risk, service, switch, tactics, theft, threat, tool, vulnerability, zero-trustMalware-as-a-service infostealers: For example, RedLine Stealer is specifically designed to target and steal sensitive information, including credentials stored in web browsers and other applications. It is often distributed through phishing emails or by tricking prospective marks into visiting booby-trapped websites laced with malicious downloaders.Another threat comes from Lumma stealer, offered for sale as a malware-as-a-service,…
-
Is Russia Reining In Ransomware-Wielding Criminals?
Flurry of Arrests a Potential Prelude to Russia-Ukraine Peace Negotiations Even before Donald Trump took office on Jan. 20, there were signs that Russian President Vladimir Putin ordered cybercriminals operating inside his country’s borders to be reined in, potentially as a bargaining chip in negotiations over Russia’s stalemated war of conquest against Ukraine. First seen…
-
Cybercriminals Exploit Onerror Event in Image Tags to Deploy Payment Skimmers
Cybersecurity researchers have flagged a credit card stealing malware campaign that has been observed targeting e-commerce sites running Magento by disguising the malicious content within image tags in HTML code in order to stay under the radar.MageCart is the name given to a malware that’s capable of stealing sensitive payment information from online shopping sites.…
-
Is Russia Reining-In Ransomware-Wielding Criminals?
Flurry of Arrests a Potential Prelude to Russia-Ukraine Peace Negotiations Even before Donald Trump took office on Jan. 20, there were signs that Russian President Vladimir Putin ordered cybercriminals operating inside his country’s borders to be reined in, potentially as a bargaining chip in negotiations over Russia’s stalemated war of conquest against Ukraine. First seen…
-
Nico Lange: ‘Cybersicherheit ist eine Frage der Verteidigung”
Tags: ai, china, conference, cyberattack, cybercrime, cyersecurity, germany, governance, government, infrastructure, iran, north-korea, risk, ukraine, usaMunich Security Conference Live Studio powered by APCO in Munich, Germany on February 15, 2025. (Photo by Christopher Pike / christopherpike.com) APCO.Welches sind laut dem Münchner Sicherheitsindex die größten Risiken für Europa im Jahr 2025?Nun, ich denke, das größte Risiko besteht in der sogenannten Multipolarisierung. Europa wird Schwierigkeiten haben, sein Geschäftsmodell fortzuführen, das auf den…
-
Die Angst vor Cyberangriffen und einem Cyberkrieg
7 von 10 sehen große Gefahr durch Cybercrime für Deutschland, 6 von 10 fürchten einen Cyberkrieg. Als größte Cyberbedrohung gelten Russland und China aber ein Drittel sieht auch die USA als Gefahr. Bitkom legt Cyberbilanz der Nationalen Sicherheitsstrategie anlässlich der Munich Cyber Security Conference vor. In Deutschland greift die Angst vor Cyberangriffen… First seen on…
-
Hacker attackieren Bundeswehr-Universität
Tags: access, bug, conference, cyber, cyberattack, cybercrime, google, governance, hacker, infrastructure, intelligence, mail, mitigation, password, service, threatDie Studierenden an der Universität der Bundeswehr dürften wenig begeistert darüber sein, dass Hacker ihre Daten abgegriffen haben.Universität der BundeswehrHacker haben die Universität der Bundeswehr in Neubiberg bei München angegriffen. Laut einem Bericht des Handelsblatts seien dabei auch sensible Daten abgeflossen. Die Attacke sei von verschiedenen Quellen aus Universitätskreisen bestätigt worden, hieß es. Demzufolge habe…
-
Police risk losing society’s trust in fight against cybercrime, warns Europol chief
Catherine De Bolle, the chief of Europol, said at the Munich Cyber Security Conference that societies must understand why law enforcement agencies need new powers to fight increasingly sophisticated cybercrime operations. First seen on therecord.media Jump to article: therecord.media/eurpol-chief-cybercrime-law-enforcement-powers-society-trust

