menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Crime News

Cyber Crime News

source image

Securityaffairs

4w

read

324

img
dot

Image Credit: Securityaffairs

Microsoft disrupted a global cybercrime ring abusing Azure OpenAI Service

  • Microsoft exposed four individuals behind an Azure Abuse scheme using unauthorized GenAI access to create harmful content.
  • Microsoft is taking legal action against these defendants and dismantling their operation.
  • The four individuals are Arian Yadegarnia aka “Fiz” of Iran, Alan Krysiak aka “Drago” of United Kingdom, Ricky Yuen aka “cg-dot” of Hong Kong, China, and Phát Phùng Tấn aka “Asakuri” of Vietnam.
  • The investigation, led by Microsoft's Digital Crimes Unit, resulted in the seizure of key infrastructure and disrupted the operations of the cybercriminal group.

Read Full Article

like

19 Likes

source image

Pymnts

4w

read

378

img
dot

Image Credit: Pymnts

Former CFPB Chief Technologist Tells Court Agency Cuts Put Data at Risk

  • Former Consumer Financial Protection Bureau (CFPB) Chief Technologist Erie Meyer filed court documents expressing concern about the cancellation of cybersecurity contracts at the agency, potentially putting sensitive data at risk.
  • The CFPB has canceled 32 cybersecurity contracts as part of recent cutbacks, risking the availability of crucial data used to identify consumer fraud victims, provide relief, track financial information, and stabilize financial markets.
  • Erie Meyer's filing was included in a lawsuit by the National Treasury Employees Union (NTEU), which is related to the firing of CFPB employees and alleges plans to wind down the agency and retain only five statutorily mandated positions.
  • The NTEU argues that a CFPB shutdown would violate the separation of powers, as the agency was created by Congress.

Read Full Article

like

22 Likes

source image

TechCrunch

4w

read

294

img
dot

Image Credit: TechCrunch

The biggest data breaches of 2025 — so far

  • 2025 has already witnessed significant data breaches affecting millions of individuals, ranging from student records to health information.
  • PowerSchool, a leading edtech provider, experienced a breach impacting over 62 million students and 9.5 million teachers in the U.S.
  • Sensitive personal information like grades, medical records, and Social Security numbers were compromised.
  • Elon Musk's DOGE initiative accessed federal government data on an unprecedented scale, leading to legal action from states and officials.
  • Community Health Center reported a cyberattack exposing data of more than a million patients, including addresses, medical records, and Social Security numbers.
  • Stalkerware apps Cocospy, Spyic, and Spyzie were found to have a security vulnerability exposing messages, photos, and call logs of millions of users.
  • DISA, a screening service provider, disclosed a breach affecting over 3.3 million individuals, compromising Social Security numbers and other sensitive data.

Read Full Article

like

17 Likes

source image

Securityaffairs

4w

read

374

img
dot

Image Credit: Securityaffairs

Enhanced capabilities sustain the rapid growth of Vo1d botnet

  • Operators behind the Vo1d botnet have enhanced its capabilities, enabling rapid growth in recent months.
  • The Vo1d botnet infected nearly 1.3 million Android-based TV boxes in 197 countries, acting as a backdoor for downloading and installing third-party software.
  • The infections were most prevalent in Brazil, Morocco, Pakistan, Saudi Arabia, Russia, Argentina, Ecuador, Tunisia, Malaysia, Algeria, and Indonesia.
  • The Vo1d botnet has improved its stealth and resilience, utilizing RSA encryption, hardcoded and DGA-based Redirector C2s, and optimized payload delivery for harder detection.

Read Full Article

like

22 Likes

source image

TechCrunch

4w

read

71

img
dot

Image Credit: TechCrunch

Belgium investigating alleged cyberattack on intelligence agency by China-linked hackers

  • Belgium is investigating an alleged data breach of its state security service (VSSE) by Chinese government hackers.
  • The breach occurred through the exploitation of a vulnerability in Barracuda's Email Security Gateway (ESG) appliance.
  • China-backed hackers exfiltrated 10% of the Belgian intelligence service's emails and accessed personal data of half of VSSE's employees.
  • VSSE has discontinued the use of Barracuda's products following the cyberattack.

Read Full Article

like

4 Likes

source image

Securityaffairs

4w

read

312

img
dot

Image Credit: Securityaffairs

China-linked threat actors stole 10% of Belgian State Security Service (VSSE)’s staff emails

  • Chinese hackers have breached Belgium's State Security Service (VSSE), stealing 10% of emails between 2021 and May 2023.
  • Investigators are looking into the security breach by China-linked threat actors on the VSSE.
  • The hackers exploited a vulnerability in the Barracuda Email Security Gateway Appliance used by VSSE and others.
  • 10% of the VSSE's incoming and outgoing emails were compromised, exposing personal data of staff and applicants.
  • No classified information was affected, and no stolen data has been found on the dark web.
  • The Chinese embassy in Belgium has not yet commented on the accusation.
  • Mandiant researchers linked China-linked threat actors to similar attacks exploiting the Barracuda ESG zero-day vulnerability globally.
  • Barracuda warned customers of the zero-day flaw (CVE-2023-2868) exploited in May and provided patches.
  • The flaw was exploited to deploy malware providing persistent backdoor access.
  • The attackers used malware families like SALTWATER, SEASPY, and SEASIDE to exploit the vulnerability.

Read Full Article

like

18 Likes

source image

Silicon

4w

read

187

img
dot

Image Credit: Silicon

Ransomware Attacks Reach Record-Breaking Levels In 2024 – BlackFog

  • In 2024, BlackFog's State of Ransomware Report highlighted a significant increase in data exfiltration, accounting for 94% of all attacks.
  • LockBit and RansomHub were the dominant ransomware variants, affecting a large number of victims in 2024.
  • LockBit remained active, with May 2024 being particularly busy, while RansomHub emerged as a threat in February 2024.
  • Various sectors, such as healthcare, government, and education, were heavily targeted by ransomware attacks.
  • Ransom demands by financially motivated groups like Medusa exceeded $40 million, highlighting the financial impact of attacks.
  • Data exfiltration reached an all-time high, with attackers increasingly combining encryption with data theft to demand ransoms.
  • Ransomware incidents led to growing financial and reputational damage for organizations in high-value sectors.
  • BlackFog emphasized the importance of proactive strategies to mitigate ransomware and data exfiltration in the evolving threat landscape.
  • Retail, services, and finance sectors experienced significant rises in disclosed ransomware attacks in 2024.
  • Critical Infrastructure, including energy companies, remained a key target for ransomware attacks.

Read Full Article

like

11 Likes

source image

Securityaffairs

4w

read

174

img
dot

Image Credit: Securityaffairs

FBI: North Korea-linked TraderTraitor is responsible for $1.5 Billion Bybit hack

  • The FBI confirmed that North Korea is responsible for the record-breaking cyber heist at the crypto exchange Bybit.
  • Last week, the crypto exchange Bybit suffered a sophisticated cyberattack, with hackers stealing over $1.5 billion worth of ETH and stETH.
  • Bybit's security team is investigating the breach, while cybersecurity firms attribute the attack to the Lazarus APT group.
  • The FBI published a Public Service Announcement attributing the heist to the North Korea-linked group TraderTraitor and provided a list of related Ethereum addresses.

Read Full Article

like

10 Likes

source image

Unite

4w

read

0

img
dot

Image Credit: Unite

AI Has Joined the Fight Against Dark Web Crime

  • The dark web, a hidden marketplace for criminal activities, poses significant risks with large-scale fraud and stolen personal information.
  • Criminals on the dark web use un-indexed forums and marketplaces, making it challenging for law enforcement to catch them, as they can easily evade detection.
  • The dark web operates globally, making it difficult for any single police force to combat the crimes effectively as criminals constantly evolve their methods.
  • Cybercrime has become more democratized with easy access to tools and services on the dark web, leading to a surge in attacks during the pandemic.
  • AI is being utilized to monitor dark web activities, analyze threats, and provide valuable insights to enhance cybersecurity defenses proactively.
  • AI aids in credential monitoring, account access surveillance, network vulnerability detection, and historical breach analysis, empowering organizations to strengthen their security measures.
  • Organizations equipped with AI-driven security tools are now able to stay ahead of cybercriminals by identifying emerging threats and taking preventive actions in real-time.
  • The integration of artificial intelligence in cybersecurity operations is transforming the fight against dark web crime, providing defenders with advanced capabilities to combat evolving tactics.
  • AI serves as a valuable ally in the ongoing battle against dark web crime, enabling organizations to protect their digital assets and safeguard sensitive information amidst a constantly evolving threat landscape.
  • With AI in the arsenal, organizations stand a better chance at defending against cyber threats on the dark web and ensuring the security of their data and customers' information.

Read Full Article

like

Like

source image

Securityaffairs

4w

read

147

img
dot

Image Credit: Securityaffairs

Criminal group UAC-0173 targets the Notary Office of Ukraine

  • Criminal group UAC-0173 is targeting the Notary Office of Ukraine.
  • The campaign, which started in mid-January 2025, uses the DCRat malware.
  • Phishing messages with malicious links are being sent to notaries in Ukraine.
  • CERT-UA has provided recommendations to enhance cybersecurity and prevent further attacks.

Read Full Article

like

8 Likes

source image

Securityaffairs

4w

read

258

img
dot

Image Credit: Securityaffairs

DragonForce Ransomware group is targeting Saudi Arabia

  • DragonForce ransomware has recently been reported to target organizations in the Kingdom of Saudi Arabia (KSA).
  • The attack is a part of the rising cyber threats facing the region, particularly against critical infrastructure and major corporations.
  • This is the first time the ransomware gang has targeted a large KSA enterprise entity, with over 6 TB of data being exfiltrated.
  • The targeting of KSA by ransomware groups raises concerns about the security of critical infrastructure in the region.

Read Full Article

like

15 Likes

source image

Siliconangle

4w

read

218

img
dot

Image Credit: Siliconangle

CrowdStrike report finds surge in malware-free cyberattacks and AI-driven threats in 2024

  • A new report by CrowdStrike highlights the evolving cyberthreat landscape in 2024.
  • Malware-free intrusions and AI-assisted social engineering saw a surge in cyberattacks.
  • China-backed cyber activity increased by 150%.
  • Cloud-focused vulnerabilities and software-as-a-service attacks also rose in 2024.

Read Full Article

like

13 Likes

source image

Guardian

4w

read

187

img
dot

Image Credit: Guardian

North Korea behind $1.5bn hack of crypto exchange ByBit, says FBI

  • North Korea is behind the theft of $1.5bn in virtual assets from the cryptocurrency exchange ByBit, according to the FBI.
  • This is being described as the biggest heist in history, surpassing Saddam Hussein's $1bn theft from Iraq's central bank.
  • The stolen assets, currently in bitcoin and virtual assets, are expected to be further laundered and converted into fiat currency.
  • North Korea, operating a cybercrime unit known as the Lazarus Group, has been linked to previous thefts that fund its nuclear and ballistic missile programs.

Read Full Article

like

11 Likes

source image

Pymnts

4w

read

370

img
dot

Image Credit: Pymnts

Bybit Begins Awarding Bounties for Tracing and Freezing Stolen Crypto

  • Cryptocurrency exchange Bybit has awarded $4.2 million to bounty hunters for tracing and freezing stolen funds from a hack on the exchange.
  • Bybit is offering a total bounty of $140 million, equivalent to 10% of the $1.4 billion stolen in the hack.
  • Bounties of 5% of the recovered funds are awarded to entities that froze the funds and contributors who helped trace the funds.
  • Bybit's website, Lazarusbounty, provides information on the hack and the bounty, ranking involved parties as 'good actors' or 'bad actors' based on their response time and cooperation.

Read Full Article

like

22 Likes

source image

Coinjournal

4w

read

402

img
dot

Image Credit: Coinjournal

Gotbit founder extradited to the US to face market manipulation charges

  • Gotbit founder and CEO Aleksei Andriunin has been extradited to the US to face market manipulation charges.
  • Andriunin, a 26-year old Russian national, manipulated crypto markets on behalf of client cryptocurrency companies.
  • He was arrested in October 2024 in Portugal and now faces charges of wire fraud and market manipulation in the US.
  • If found guilty, he could face up to 20 years in prison for wire fraud and up to 5 years for conspiracy to commit market manipulation and wire fraud.

Read Full Article

like

24 Likes

For uninterrupted reading, download the app