menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Crime News

Cyber Crime News

source image

Securityaffairs

2w

read

245

img
dot

Image Credit: Securityaffairs

Mandiant devised a technique to bypass browser isolation using QR codes

  • Mandiant has revealed a technique to bypass browser isolation using QR codes.
  • Browser isolation separates web browsing from the user's device by running the browser in a secure environment.
  • Mandiant's technique involves embedding C2 data in a QR code displayed on a legitimate web page.
  • The implant captures a screenshot, decodes the QR code, and communicates with the attacker-controlled server.

Read Full Article

like

14 Likes

source image

TechJuice

2w

read

388

img
dot

Image Credit: TechJuice

First Cybercrime Case Filed Over Spreading Fake News in Pakistan

  • The Federal Investigation Agency (FIA) Cyber Crime Wing in Karachi has registered its first case against individuals for disseminating fabricated and misleading news online.
  • Saifur Rehman, a resident of Gulshan-e-Iqbal Block 1, is accused of using social media to disseminate propaganda during the Pakistan Tehreek-e-Insaf (PTI) demonstration in November.
  • On December 6, the federal administration resolved to crack down on anti-state propaganda, establishing joint teams of security agencies and the FIA cybercrime wing to investigate and arrest individuals involved in such crimes.
  • The amendments to the Prevention of Electronic Crimes Act (PECA) in Pakistan now allow for fines up to Rs1 million or imprisonment for up to five years for spreading fake news and other illegal content.

Read Full Article

like

23 Likes

source image

Securityaffairs

2w

read

0

img
dot

Image Credit: Securityaffairs

Security Affairs newsletter Round 501 by Pierluigi Paganini – INTERNATIONAL EDITION

  • RedLine info-stealer campaign targets Russian businesses through pirated corporate software
  • Romania’s election systems hit by 85,000 attacks ahead of presidential vote
  • Authorities shut down Crimenetwork, Germany’s largest crime marketplace
  • Cybercrime: INTERPOL financial crime operation makes record 5,500 arrests, seizures worth over USD 400 million

Read Full Article

like

Like

source image

Securityaffairs

2w

read

38

img
dot

Image Credit: Securityaffairs

8Base ransomware group hacked Croatia’s Port of Rijeka

  • The 8Base ransomware group attacked Croatia’s Port of Rijeka, stealing sensitive data, including contracts and accounting info.
  • The cyber attack was claimed by the 8Base ransomware group.
  • The Port of Rijeka is Croatia's largest dry cargo concessionaire and offers various economic services.
  • The ransomware gang claims to have stolen data such as accounting info and contracts.

Read Full Article

like

2 Likes

source image

Securityaffairs

2w

read

52

img
dot

Image Credit: Securityaffairs

New Atrium Health data breach impacts 585,000 individuals

  • Atrium Health disclosed a data breach affecting 585,000 individuals to the HHS, potentially linked to the use of online tracking tools.
  • The breach occurred on Atrium Health's MyAtriumHealth Patient Portal between January 2015 and July 2019.
  • Online tracking technologies on the portal may have transmitted personal information to third-party vendors.
  • The potentially exposed data includes IP addresses, third-party identifiers/cookies, and limited patient information.

Read Full Article

like

3 Likes

source image

Pymnts

2w

read

104

img
dot

Image Credit: Pymnts

Understanding the Shifting Anatomy of Next-Generation BEC Attacks

  • Business email compromise (BEC) attacks have evolved with a level of sophistication that is reshaping how companies must defend themselves.
  • Cybercriminals are exploiting newer top-level domains (gTLDs) like .shop, .top, .xyz to launch convincing phishing attacks.
  • Automation tools and AI-powered domain generation algorithms allow cybercriminals to set up multiple fraudulent sites and evade detection.
  • To combat BEC and domain-based fraud, organizations need a holistic approach integrating technology, processes, and employee training.

Read Full Article

like

6 Likes

source image

Securityaffairs

2w

read

0

img
dot

Image Credit: Securityaffairs

U.S. CISA adds CyberPanel flaw to its Known Exploited Vulnerabilities catalog

  • The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the CyberPanel flaw CVE-2024-51378 (CVSS score: 10.0) to its Known Exploited Vulnerabilities (KEV) catalog.
  • The getresetstatus vulnerability in CyberPanel allows remote attackers to bypass authentication and execute arbitrary commands by exploiting a flaw in secMiddleware.
  • The vulnerability impacted versions up to 2.3.6 and the unpatched 2.3.7, and was exploited in a large-scale hacking campaign targeting over 22,000 CyberPanel instances.
  • CISA has ordered federal agencies to fix this vulnerability by December 25, 2024.

Read Full Article

like

Like

source image

Securityaffairs

2w

read

261

img
dot

Image Credit: Securityaffairs

Operation Destabilise dismantled Russian money laundering networks

  • The U.K. National Crime Agency (NCA) has disrupted Russian money laundering networks linked to organized crime across multiple countries in an operation called 'Operation Destabilise.'
  • The NCA identified two Russian-speaking networks, Smart and TGR, collaborating at the heart of the criminal enterprise.
  • As a result of Operation Destabilise, the U.S. Treasury's Office of Foreign Assets Control (OFAC) sanctioned five individuals and four entities tied to the TGR Group for aiding Russian elites in sanctions evasion.
  • The NCA efforts led to 84 arrests, prison sentences, and the seizure of £20 million in both cash and cryptocurrency.

Read Full Article

like

15 Likes

source image

Socprime

2w

read

82

img
dot

Image Credit: Socprime

RevC2 and Venom Loader Detection: New Malware Strains Massively Deployed via MaaS in a Sophisticated Campaign

  • Security researchers have discovered two new malware strains called RevC2 and Venom Loader.
  • These malware strains have been distributed since the summer of 2024 using Venom Spider's Malware-as-a-Service (MaaS) platform.
  • RevC2 and Venom Loader can be detected and analyzed using SOC Prime Platform and Uncoder AI.
  • Organizations are advised to maintain cyber vigilance and utilize advanced threat detection solutions against these evolving threats.

Read Full Article

like

4 Likes

source image

Bitcoinist

2w

read

152

img
dot

Image Credit: Bitcoinist

Crypto Ponzi Scheme Exposed: IcomTech Leaders Sentenced to Decade Behind Bars

  • Two central figures behind the cryptocurrency Ponzi scheme known as IcomTech have been sentenced to substantial prison terms.
  • David Brend and Gustavo Rodriguez received prison sentences of 10 and 8 years, respectively, for conspiracy to commit wire fraud.
  • IcomTech masqueraded as a cryptocurrency mining and trading firm, defrauding investors out of millions of dollars.
  • The scheme collapsed in 2019, and both individuals will also face restitution and forfeiture determinations.

Read Full Article

like

9 Likes

source image

Siliconangle

2w

read

397

img
dot

Image Credit: Siliconangle

US urges use of encrypted messaging apps following Salt Typhoon hack

  • U.S. officials are urging Americans to use encrypted messaging apps to prevent correspondence from being hacked.
  • The guidance follows a large-scale cyberattack campaign against U.S. telecommunications companies by a Chinese state-backed hacking group.
  • Officials recommend using encryption for text messaging and encrypted voice communication to enhance security.
  • Other cybersecurity guidance includes implementing multifactor authentication and using devices with timely operating system updates.

Read Full Article

like

23 Likes

source image

Securityaffairs

2w

read

266

img
dot

Image Credit: Securityaffairs

Black Basta ransomware gang hit BT Group

  • BT Group's Conferencing division shut down some servers following a Black Basta ransomware attack.
  • The attack did not impact live BT Conferencing services.
  • Black Basta ransomware gang claimed to have stolen 500GB of data from BT Group.
  • Black Basta has targeted various critical infrastructure sectors and impacted over 500 organizations worldwide.

Read Full Article

like

16 Likes

source image

Securityaffairs

2w

read

231

img
dot

Image Credit: Securityaffairs

Authorities shut down Crimenetwork, the Germany’s largest crime marketplace

  • Germany’s largest crime marketplace, Crimenetwork, has been shut down, and an administrator has been arrested.
  • Crimenetwork facilitated the sale of illegal goods and services since 2012, serving as a hub for cybercriminal activities.
  • The police arrested the 29-year-old administrator and seized €1M in assets.
  • The operation was carried out by the Public Prosecutor’s Office, the Central Office for Combating Cybercrime, and the Federal Criminal Police Office.

Read Full Article

like

13 Likes

source image

Medium

2w

read

65

img
dot

Image Credit: Medium

The Art of Disappearing Online: Someone Is Always Watching

  • Using a virtual private network (VPN) is recommended for online privacy.
  • Delete your past and reduce your online presence, including cleaning up social media accounts.
  • Ensure encryption for advanced privacy and use unique names, emails, and passwords for each account.
  • To maintain high privacy, stay updated on operational security techniques and avoid common privacy mistakes.

Read Full Article

like

3 Likes

source image

TechCrunch

2w

read

358

img
dot

Image Credit: TechCrunch

FBI recommends encrypted messaging apps to combat Chinese hackers

  • The China-backed hacking group Salt Typhoon remains inside the networks of some of America's largest phone and internet providers, with unclear intentions.
  • The hackers have accessed real-time unencrypted calls, text messages, and metadata of targeted telecom companies, including AT&T, Verizon, and Lumen.
  • U.S. officials suspect the hacks are part of a wide-ranging spying operation by China, targeting U.S. officials and senior Americans.
  • To combat Chinese hackers, the FBI and CISA recommend using encrypted messaging apps like Signal and WhatsApp for secure communication.

Read Full Article

like

21 Likes

For uninterrupted reading, download the app