menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Crime News

Cyber Crime News

source image

Bitcoinist

2d

read

178

img
dot

Image Credit: Bitcoinist

World’s Largest Crypto Crime Network Collapses After Telegram Crackdown

  • One of the world’s largest illicit crypto marketplace, Haowang Guarantee, has ceased operations following a major enforcement action by Telegram.
  • Elliptic confirmed that Haowang processed over $27 billion in transactions, primarily through the USDT stablecoin, making it the largest known illegal crypto market to date.
  • USDH, a stablecoin issued by the Huione Group, played a crucial role in evading sanctions and enabling high-volume transfers that were difficult to trace through traditional regulatory channels.
  • Telegram's crackdown extended to other platforms like Xinbi Guarantee, severely disrupting the two largest illicit marketplaces hosted on Telegram, which have processed a combined total of over $35 billion in USDT transactions.

Read Full Article

like

10 Likes

source image

TechDigest

2d

read

138

img
dot

Image Credit: TechDigest

M&S boss faces £1m pay cut following cyber attack, Spain hit by phone and internet blackouts

  • Logistics firm Peter Green Chilled, a distributor to UK's major supermarkets, is being held to ransom by cyber hackers, impacting deliveries and potentially leading to wastage of products.
  • M&S CEO Stuart Machin faces a £1.1m pay reduction due to a cyber attack that caused a 14% drop in the company's share price, affecting his performance share plan and deferred bonus.
  • A survey reveals almost half of young people prefer a world without the internet, with 70% feeling worse after social media use and many supporting restrictions on digital access.
  • Spain experienced phone and internet blackouts after a system upgrade by Telefonica, affecting emergency services, shortly after a recent power outage incident.

Read Full Article

like

8 Likes

source image

TechJuice

2d

read

118

img
dot

Image Credit: TechJuice

Hannibal Stealer Malware uses Military-Grade tactics to Evade Detection

  • Hannibal Stealer is a new, modular .NET-based information-stealing malware known for its military-grade tactics to evade detection and harvest sensitive information.
  • The malware leverages multi-layered obfuscation and stealth routines, dynamically downloads Merkle proofs, uses bespoke decryptors, and communicates through Telegram or dedicated C2 servers to steal data like application data, VPN setups, bitcoin accounts, and credentials.
  • The makers of Hannibal Stealer actively promote it on underground forums, fake customer reviews, and Google Ads campaigns, spending over $10 million on ads to direct victims to malicious landing pages.
  • The malware's modular architecture incorporates obfuscation techniques to protect its core logic, launch data theft capabilities from browsers and FTP clients, hijack cryptocurrency wallet addresses, target VPN credentials, and exfiltrate data using Telegram or dedicated C2 servers.

Read Full Article

like

7 Likes

source image

Pymnts

3d

read

91

img
dot

Image Credit: Pymnts

Crypto Firms Grapple With Bank-Like Risks, Without the Regulation

  • Crypto firms are facing bank-like risks without the regulation, leading to concerns about security vulnerabilities and potential breaches.
  • Recent incidents, such as the breach at Coinbase, highlight the risks associated with centralized crypto platforms holding vast amounts of customer data and assets.
  • Centralized crypto firms now handle money, identity, and financial services, amplifying the need for robust security measures and regulations.
  • Exchanges like Coinbase, Binance, and Kraken are at risk of social engineering attacks targeting employees and customer data.
  • Coinbase projected a cost of up to $400 million due to the recent breach and vowed to reimburse affected customers who sent funds to criminals.
  • Rapidly growing FinTechs and crypto firms face challenges in scaling their security programs, particularly in regulatory gray areas.
  • The breach at Coinbase exposed the vulnerability of centralized data storage, highlighting the need for enhanced security protocols.
  • As crypto firms evolve, they are resembling traditional banks in terms of services offered but lack the same regulatory oversight and security standards.
  • The concept of concentration of risk looms large as exchanges and custodians centralize critical functions, making them prime targets for cyberattacks.
  • Security experts emphasize the importance of addressing architectural issues in the crypto market to prevent severe attacks from threatening this growing asset class.

Read Full Article

like

5 Likes

source image

Medium

3d

read

220

img
dot

Image Credit: Medium

What Is Cyberbullying?

  • Cyberbullying is the act of harassing someone online by sending or posting mean messages, usually anonymously.
  • It can take different forms such as harsh text messages, rude comments on social media, and anonymous emails, impacting mental, physical, and emotional health.
  • Cyberbullying is discreet and often goes unnoticed, leading to increased rates of depression, anxiety, and decreased self-worth.
  • It is crucial to educate children about cyberbullying, help them recognize being a victim or perpetrator, and provide a safe environment for them to seek support.

Read Full Article

like

13 Likes

source image

Guardian

3d

read

92

img
dot

Image Credit: Guardian

How to protect your data after a cyber-attack

  • Recent cyber-attacks have compromised personal data of legal aid applicants, prompting concerns regarding data security.
  • Tips for protecting data after a cyber-attack include changing passwords, using unique passwords for each account, and enabling two-factor authentication.
  • Be cautious of unsolicited emails and messages, especially those referencing recent cyber-attacks to deceive individuals.
  • Monitoring credit records, being vigilant on social media, and keeping devices updated are essential steps in safeguarding personal information.

Read Full Article

like

5 Likes

source image

Cybersecurity-Insiders

3d

read

228

img
dot

Image Credit: Cybersecurity-Insiders

Criminal records exposed in cyber attack on Ministry of Justice

  • A recent cyber-attack on the UK’s Ministry of Justice exposed approximately 2.7 million sensitive records, including criminal records.
  • The attack occurred on April 23 and was publicly disclosed last week, prompting concerns about transparency and security measures.
  • The breach was caused by a combination of human error and system vulnerabilities, affecting the Legal Aid Agency and compromising personal data including criminal histories and sensitive personal information.
  • Collaborative efforts between the Ministry of Justice, National Crime Agency, and National Cyber Security Centre have been initiated to investigate the breach, believed to be part of a larger cyber-criminal campaign.

Read Full Article

like

13 Likes

source image

TechCrunch

3d

read

120

img
dot

Image Credit: TechCrunch

Pharma giant Regeneron to buy 23andMe and its customers’ data for $256M

  • Regeneron is set to acquire genetic testing company 23andMe for $256 million as part of a bankruptcy auction.
  • Regeneron plans to use 23andMe's genomics service and 15 million customers' data for drug discovery, ensuring privacy and ethical use.
  • 23andMe filed for bankruptcy after a data breach affecting 7 million customers, leading to decreased stock value and the resignation of its CEO.
  • Regeneron, as the buyer in the auction, aims to uphold privacy policies and laws regarding customer data as the bankruptcy court reviews the acquisition on June 17.

Read Full Article

like

7 Likes

source image

Silicon

3d

read

345

img
dot

Image Credit: Silicon

Coinbase Hit By $400m Crypto Scam

  • Cryptocurrency trading platform Coinbase faced a $400 million scam where criminals used customers' data to swindle funds.
  • Attackers obtained personal data on less than 1% of customers by bribing overseas Coinbase staff and contractors.
  • Rather than paying a $20 million ransom demand, Coinbase set up a reward fund for information leading to the criminals' arrest.
  • The incident highlights the crypto industry's vulnerability to theft, with Coinbase estimating costs between $179m to $400m for remediation and reimbursements.

Read Full Article

like

20 Likes

source image

Guardian

3d

read

152

img
dot

Image Credit: Guardian

If our destiny is cyber-attacks and empty shelves at the Co-op, here’s what we should do next | Hugh Muir

  • The Co-op faced empty shelves following a cyber-attack that disrupted its supply systems, signaling a concerning vulnerability in supply chains.
  • Amid threats of cyber-attacks and uncertain times, governments like Sweden have urged citizens to prepare for emergencies, emphasizing the need for water and non-perishable food.
  • Prepping for crises is becoming increasingly important, with residents of fire-prone areas like Los Angeles recognizing the value of having a go bag ready.
  • The UK also provides advice on emergency preparation, recommending essentials like water and ready-to-eat tinned food with a tin opener.
  • The necessity of emergency preparedness is gaining traction, with Popular Science magazine advocating that everyone should have some level of prepping.
  • The variety of items to include in a go bag can be influenced by cultural preferences, raising questions about what is essential versus a luxury, such as jerk chicken in a tin.
  • As the Co-op works to restock shelves post-cyber-attack, the importance of being prepared for disruptions in the way of life becomes evident.
  • The article serves as a reminder of the fragility of modern systems and the need for individuals to be ready for unexpected challenges.
  • Hugh Muir reflects on the current state of affairs, painting a picture of a potentially troubled world where preparedness can make a crucial difference.
  • The glimpse into the future offered by the depleted Co-op shelves underscores the significance of proactive readiness in the face of uncertainties.
  • As the world grapples with various threats, being equipped with essentials like water and non-perishable foods is increasingly being recognized as a prudent approach to safeguarding against potential crises.

Read Full Article

like

9 Likes

source image

Cybersecurity-Insiders

4d

read

40

img
dot

Image Credit: Cybersecurity-Insiders

Scam Messages and emails increase exponentially after M & S Cyber Attack

  • A cyberattack on Marks and Spencer compromised personal data of nearly 9.4 million customers, exploiting a vulnerability created by human error.
  • Hackers accessed sensitive information including order histories, dates of birth, and partial payment card details, but not complete card data.
  • M&S reassured customers that full payment card details were not accessed due to limited data storage, with potential impact on online ordering.
  • Increase in scam messages and emails reported by customers following the cyberattack, urging vigilance against potential spam campaigns using stolen information.

Read Full Article

like

2 Likes

source image

Guardian

4d

read

101

img
dot

Image Credit: Guardian

Investors await clues on fallout from M&S cyber-attack

  • Marks & Spencer is expected to provide more details on the impact of a recent cyber-attack, which forced the retailer to halt online operations and affected some in-store availability.
  • The financial results for the year up to March 29 will be released this week, with focus on the aftermath of the cyber-attack and its implications on the company's finances, particularly online clothing and home sales.
  • Analysts estimate the cyber-attack could cost M&S around £200m for the 2025/26 financial year, with potential insurance payouts expected to offset part of this cost.
  • Investors are keen to learn if M&S will provide financial guidance for the future or increase its shareholder dividend, as the cyber-attack has led to a significant drop in the company's market value.

Read Full Article

like

6 Likes

source image

Securityaffairs

4d

read

239

img
dot

Image Credit: Securityaffairs

Security Affairs newsletter Round 524 by Pierluigi Paganini – INTERNATIONAL EDITION

  • US Government officials targeted with texts and AI-generated deepfake voice messages impersonating senior U.S. officials
  • New botnet HTTPBot targets gaming and tech industries with surgical attacks
  • Google fixed a Chrome vulnerability that could lead to full account takeover
  • Coinbase disclosed a data breach after an extortion attempt

Read Full Article

like

14 Likes

source image

Livebitcoinnews

4d

read

248

img
dot

Image Credit: Livebitcoinnews

New Zealand Man Busted in $265M Crypto Scam

  • Authorities arrested a man from Wellington, New Zealand for his suspected involvement in a $265 million cryptocurrency fraud case.
  • FBI-led investigation targeted 13 suspects across New Zealand and the United States, with funds being used for luxury purchases like cars, handbags, and rentals.
  • The suspects manipulated seven victims to acquire cryptocurrency between March and August 2024, involving deceitful practices to hide the money trail.
  • The FBI-led global investigation uncovered a complex network using international links and cryptocurrencies, highlighting the importance of addressing cybercrime in the crypto space.

Read Full Article

like

14 Likes

source image

Securityaffairs

5d

read

135

img
dot

Image Credit: Securityaffairs

US Government officials targeted with texts and AI-generated deepfake voice messages impersonating senior U.S. officials

  • The FBI warns ex-government officials of being targeted with deepfake texts and AI-generated voice messages impersonating senior U.S. officials.
  • Threat actors have been using texts and AI voice messages since April 2025 to access personal accounts of officials and their contacts.
  • Malicious links are sent to officials posing as messaging platform invites, allowing threat actors to extract data or funds through impersonation.
  • To avoid falling for AI-powered scams, officials are advised to verify callers' identities, check for errors in messages, and avoid sharing sensitive information with unknown contacts.

Read Full Article

like

8 Likes

For uninterrupted reading, download the app