Tag: cybercrime
-
World Economic Forum Annual Meeting 2025: Takeaways, reflections, and learnings for the future
Tags: attack, best-practice, ceo, cyber, cyberattack, cybercrime, cybersecurity, finance, fortinet, group, intelligence, international, law, lessons-learned, mitigation, open-source, organized, risk, strategy, tactics, technology, threatIncreasingly sophisticated threat actors in the evolving cybersecurity landscape In a world where cybercriminals often operate with a level of efficiency mirroring that of Fortune 500 companies, it is essential that we look to ways we can better collaborate to counter them. Unfortunately, there is still a lot of room for improvement; in 2023, 87%…
-
Hackers Exploit Valentine’s Day Domains for Sneaky Cyber Attacks
Cybercriminals are capitalizing on the season of love to launch sneaky and deceptive cyberattacks. According to the whoisxmlapi shared on the X, there has been a surge in the registration of Valentine’s Day-themed domains, many of which are likely being used to perpetrate phishing schemes and online fraud. Valentine’s Day is a time when individuals…
-
Top 5 ways attackers use generative AI to exploit your systems
Tags: access, ai, attack, authentication, awareness, banking, captcha, chatgpt, china, control, cyber, cybercrime, cybersecurity, defense, detection, exploit, extortion, finance, flaw, fraud, group, hacker, intelligence, LLM, malicious, malware, network, phishing, ransomware, resilience, service, spam, tactics, theft, threat, tool, vulnerability, zero-dayFacilitating malware development: Artificial intelligence can also be used to generate more sophisticated or at least less labour-intensive malware.For example, cybercriminals are using gen AI to create malicious HTML documents. The XWorm attack, initiated by HTML smuggling, which contains malicious code that downloads and runs the malware, bears the hallmarks of development via AI.”The loader’s…
-
The Rise of Phishing-as-a-Service: How Cybercriminals are Outsourcing Attacks
Phishing attacks are no longer the domain of elite hackers. With the rise of Phishing-as-a-Service (PhaaS), cybercriminals of First seen on securityonline.info Jump to article: securityonline.info/the-rise-of-phishing-as-a-service-how-cybercriminals-are-outsourcing-attacks/
-
Gmail Under Siege: FBI Warns of Unusual AI-Driven Phishing Attacks
FBI warns of AI-driven Gmail phishing attacks as cybercriminals exploit advanced tactics. Strengthen your defenses against these emerging threats. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/trends/fbi-warns-about-gmail-phishing-attacks/
-
XE Group shifts from credit card skimming to exploiting zero-days
The cybercrime group XE Group exploited a VeraCore zero-day to deploy reverse shells, web shells in recent attacks. A recent investigation by researchers from Intezer and Solis Security shed light on the recent operations of the XE Group. Active since at least 2013, XE Group is a cybercriminal group focused on credit card skimming and…
-
NetSupport RAT Grant Attackers Full Access to Victims Systems
The eSentire Threat Response Unit (TRU) has reported a significant rise in incidents involving the NetSupport Remote Access Trojan (RAT) since January 2025. This malicious software, originally designed as a legitimate IT support tool, has been weaponized by cybercriminals to gain full control over victim systems. Attackers leveraging NetSupport RAT can monitor screens, control input…
-
NanoCore RAT Attack Windows Using Task Scheduler to Captures keystrokes, screenshots
NanoCore, a notorious Remote Access Trojan (RAT), continues to pose a significant threat to Windows systems. This malware, known for its espionage capabilities and modular design, is being leveraged by cybercriminals to exfiltrate sensitive data, control infected systems, and maintain persistence using advanced techniques. A recent analysis of a NanoCore sample (MD5 hash: 18B476D37244CB0B435D7B06912E9193) sheds…
-
Hackers Exploiting Google Tag Managers to Steal Credit Card from eCommerce Sites
In a concerning development, cybercriminals are leveraging Google Tag Manager (GTM), a legitimate tool widely used by eCommerce websites, to deploy malicious scripts designed to steal credit card information. This attack vector, often referred to as Magecart or e-skimming, has been observed targeting platforms like Magento, WordPress, and OpenCart, among others. The abuse of GTM…
-
âš¡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [10 February]
In cybersecurity, the smallest crack can lead to the biggest breaches. A leaked encryption key, an unpatched software bug, or an abandoned cloud storage bucket”, each one seems minor until it becomes the entry point for an attack.This week, we’ve seen cybercriminals turn overlooked weaknesses into major security threats, proving once again that no system…
-
Fortifying cyber security: What does secure look like in 2025?
Tags: access, ai, attack, authentication, business, compliance, cyber, cybercrime, cybersecurity, deep-fake, exploit, finance, Hardware, intelligence, least-privilege, malware, mfa, nis-2, phishing, regulation, resilience, risk, risk-management, scam, software, threat, training, update, vulnerability, zero-trustThe evolving cybersecurity landscape has increased security pressures for IT leaders. With the World Economic Forum estimating, the global cost of cybercrime is projected to reach $10.5trillion annually in 2025, the situation is only escalating[1]. The rise of new technologies, such as Artificial Intelligence (AI), and the complexities introduced by flexible working have made IT…
-
Massive Brute Force Attack Launched With 2.8 Million IPs To Hack VPN Firewall Logins
Massive brute force attacks targeting VPNs and firewalls have surged in recent weeks, with cybercriminals using as many as 2.8 million unique IP addresses daily to conduct relentless login attempts. The Shadowserver Foundation, a nonprofit cybersecurity organization, has confirmed this alarming trend through data collected from its global honeypot infrastructure. These attacks primarily target devices…
-
New OG Spoof Toolkit Manipulates Social Media Links for Cybercrime
Cyble Research and Intelligence Labs (CRIL) highlighted the growing misuse of the Open Graph Spoofing Toolkit, a dangerous tool designed to manipulate Open Graph Protocol metadata to trick users into clicking on harmful links. This exploitation of OG tags is a serious concern, as it opens the door to a wide range of phishing attacks…
-
XE Hacker Group Exploits VeraCore Zero-Day to Deploy Persistent Web Shells
Threat actors have been observed exploiting multiple security flaws in various software products, including Progress Telerik UI for ASP.NET AJAX and Advantive VeraCore, to drop reverse shells and web shells, and maintain persistent remote access to compromised systems.The zero-day exploitation of security flaws in VeraCore has been attributed to a threat actor known as XE…
-
KI revolutioniert die Cyberkriminalität
Der neueste ‘State of Malware 2025″-Report von Malwarebytes zeigt alarmierende Entwicklungen in der Cyberbedrohungslandschaft. Besonders auffällig ist die zunehmende Nutzung von KI-gesteuerten Angriffen durch Cyberkriminelle. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/ki-revolutioniert-die-cyberkriminalitaet
-
KI-Agenten werden im Jahr 2025 Cyberkriminalität revolutionieren
Cyberkriminelle entwickeln ihre Taktiken kontinuierlich weiter und werden 2025 zu einem Rekordjahr für Ransomware machen. Künstliche Intelligenz (KI) verändert die Bedrohungslandschaft durch erhöhte Skalierbarkeit und Effizienz. Malwarebytes hat seinen »State of Malware 2025«-Report veröffentlicht [1]. Der Report bietet Einblicke in die wichtigsten Cyberbedrohungen und Taktiken von Cyberkriminellen im Jahr 2025, darunter die vermehrte Nutzung… First…
-
Was ist ein Infostealer?
In der Cybercrime-Welt hat sich eine besonders heimtückische Form der Malware etabliert: der Infostealer. Diese spezialisierte Schadsoftware hat nur ein Ziel – das systematische Abgreifen sensibler Nutzerdaten. Was steckt dahinter First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/was-ist-ein-infostealer
-
Cybercriminals Target IIS Servers to Spread BadIIS Malware
Tags: china, cyber, cyberattack, cybercrime, exploit, group, india, Internet, malicious, malware, microsoft, service, threat, vulnerabilityA recent wave of cyberattacks has revealed the exploitation of Microsoft Internet Information Services (IIS) servers by threat actors deploying the BadIIS malware. This campaign, attributed to Chinese-speaking groups, leverages IIS vulnerabilities to manipulate search engine optimization (SEO) rankings and distribute malicious content. The attackers have targeted organizations across Asia, including India, Thailand, and Vietnam,…
-
Cybercrime Forces Local Law Enforcement to Shift Focus
Local law enforcement have to shift away from place-based policing when investigating cybercrime. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/cybercrime-forces-local-law-enforcement-to-shift-focus
-
Hackers Leveraging Image Video Attachments to Deliver Malware
Cybercriminals are increasingly exploiting image and video files to deliver malware, leveraging advanced techniques like steganography and social engineering. These methods allow attackers to embed malicious code within seemingly harmless multimedia files, bypassing traditional security measures and deceiving unsuspecting users. Hackers have used image-based malware to distribute tools like VIP Keylogger and 0bj3ctivity Stealer, which…
-
Hackers Exploit DeepSeek Qwen AI Models for Malware Development
Check Point Research (CPR) has revealed that cybercriminals are increasingly leveraging the newly launched AI models, DeepSeek and Qwen, to create malicious content. These models, which lack robust anti-abuse provisions, have quickly become a preferred choice for threat actors over more regulated platforms like ChatGPT. The exploitation of these tools highlights a concerning shift in…
-
Cybercriminals Weaponize Graphics Files in Phishing Attacks
Sophos has observed cybercriminals ramping up their use of graphics files as part of email phishing attacks to bypass conventional security protections First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/cybercriminals-graphics-files/
-
Police arrest teenager suspected of hacking NATO and numerous Spanish institutions
Spain’s National Police, in a joint operation with the Civil Guard, has arrested an 18-year-old suspected of being the hacker going by aliases including “Natohub,” and known for hacking the computer services of private companies and Spanish institutions such as the Civil Guard, the Ministry of Defense, the National Mint, and the Ministry of Education,…
-
Beware of Nova Stealer Malware Sold for $50 on Hacking Forums
The cybersecurity landscape faces a new challenge with the emergence of Nova Stealer, a malware marketed under the Malware-as-a-Service (MaaS) model. Priced as low as $50 for a 30-day license, this malicious tool has gained traction among cybercriminals for its affordability and effectiveness. Nova Stealer, a modified variant of the SnakeLogger malware, is designed to…
-
XE Hacker Group Exploiting Veracode 0-Day’s to Deploy Malware Steal Credit Card Details
Tags: access, credit-card, cve, cyber, cybercrime, exploit, group, hacker, malware, software, vulnerability, zero-dayThe XE Group, a sophisticated Vietnamese-origin cybercrime organization active since 2013, has escalated its operations by exploiting two zero-day vulnerabilities in VeraCore software, CVE-2024-57968 and CVE-2025-25181. These vulnerabilities, identified in a joint investigation by Intezer and Solis Security, have been used to deploy malware, steal sensitive information, and maintain long-term access to compromised systems. VeraCore…
-
Ransomware Extortion Drops to $813.5M in 2024, Down from $1.25B in 2023
Ransomware attacks netted cybercrime groups a total of $813.5 million in 2024, a decline from $1.25 billion in 2023.The total amount extorted during the first half of 2024 stood at $459.8 million, blockchain intelligence firm Chainalysis said, adding payment activity slumped after July 2024 by about 3.94%.”The number of ransomware events increased into H2, but…
-
Cybercriminals Abusing ScreenConnect RMM Tool for Persistent Access
Tags: access, cyber, cybercrime, cybersecurity, exploit, malicious, monitoring, software, threat, toolCybersecurity experts have identified an alarming trend of cybercriminals exploiting ConnectWise ScreenConnect, a widely-used Remote Monitoring and Management (RMM) tool, to establish persistent access to compromised systems. Threat Actors Exploit Legitimate Software for Malicious Gains Silent Push Threat Analysts and other researchers have observed a surge in the abuse of this legitimate software, leveraging its…

