menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Crime News

Cyber Crime News

source image

Securityaffairs

3w

read

45

img
dot

Image Credit: Securityaffairs

Security Affairs newsletter Round 500 by Pierluigi Paganini – INTERNATIONAL EDITION

  • 15 SpyLoan Android apps found on Google Play had over 8 million installs
  • Notorious ransomware programmer Mikhail Pavlovich Matveev arrested in Russia
  • Phishing-as-a-Service Rockstar 2FA continues to be prevalent
  • Zello urges users to reset passwords following a cyber attack

Read Full Article

like

2 Likes

source image

Securityaffairs

3w

read

0

img
dot

Image Credit: Securityaffairs

Hackers stole millions of dollars from Uganda Central Bank

  • Financially-motivated threat actors hacked Uganda's central bank system, stealing millions of dollars.
  • Government officials confirmed the security breach and the investigation is underway.
  • The hackers compromised central bank accounts and transferred funds to Japan and the UK.
  • UK authorities froze $7M, while Uganda's central bank recovered over half of the stolen money.

Read Full Article

like

Like

source image

Securityaffairs

3w

read

330

img
dot

Image Credit: Securityaffairs

15 SpyLoan Android apps found on Google Play had over 8 million installs

  • 15 SpyLoan apps with a combined total of 8M+ installs were found on Google Play, targeting users in South America, Southeast Asia, and Africa.
  • SpyLoan apps exploit social engineering to gain sensitive user data and excessive permissions, leading to extortion, harassment, and financial loss.
  • The researchers reported the apps to Google who notified the developers that their apps violate Google Play policies. Some apps were suspended by Google from Google Play while others were updated by the developers.
  • SpyLoan activity has surged, with malicious apps and infected devices increasing over 75% from Q2 to Q3 2024, highlighting their growing mobile threat presence.

Read Full Article

like

19 Likes

source image

Secureerpinc

3w

read

356

img
dot

Image Credit: Secureerpinc

Mobile Phishing Attacks on Businesses Surge to New Highs

  • Mobile phishing attacks on businesses are on the rise.
  • Mobile devices are an easy target for hackers due to lack of defenses and user caution.
  • Phishing attacks exploit perceived legitimacy, making it harder to detect.
  • Phishing-as-a-service platforms like Darcula enable undetectable attacks through encrypted messages.

Read Full Article

like

21 Likes

source image

Securityaffairs

3w

read

171

img
dot

Image Credit: Securityaffairs

Notorious ransomware programmer Mikhail Pavlovich Matveev arrested in Russia

  • Russian authorities arrested a ransomware affiliate, Mikhail Matveev, aka Wazawaka, for developing malware and ties to hacking groups.
  • The man was arrested in Kaliningrad, Russia, links to Lockbit, Conti, and BABUK operations were found.
  • Matveev faces charges under Russian law for creating malicious programs.
  • In May 2023, Matveev was charged by the US Justice Department for his alleged role in multiple ransomware attacks.

Read Full Article

like

10 Likes

source image

TechJuice

3w

read

290

img
dot

Image Credit: TechJuice

Dewan Farooque Motors Hit by Cyberattack, Data Corrupted

  • Dewan Farooque Motors postponed its Board of Directors meeting due to a severe cyberattack.
  • IT servers crashed and data was corrupted, particularly affecting financial data and systems.
  • Restoration of financial and information systems will take time, delaying the announcement of a new meeting date.
  • The incident was reported to the Securities and Exchange Commission, causing a drop in DFML's share price.

Read Full Article

like

17 Likes

source image

Medium

3w

read

57

img
dot

Image Credit: Medium

Operation Undercut and Other Cybersecurity Threats: A Deep Dive into the Evolving Landscape

  • Operation Undercut is a new AI-powered disinformation campaign designed to weaken Western support for Ukraine and influence global political outcomes.
  • APT28, also known as GruesomeLarch, is a Russian cyber espionage group that recently launched a 'nearest neighbor' attack, demonstrating the evolving sophistication of cyberattacks.
  • Staying informed about the latest cybersecurity developments is crucial as threats continue to evolve.
  • State-sponsored groups like APT28 and Russian-backed disinformation operations pose a significant cybersecurity threat, emphasizing the importance of prioritizing cybersecurity measures.

Read Full Article

like

3 Likes

source image

Socprime

3w

read

308

img
dot

Image Credit: Socprime

HATVIBE and CHERRYSPY Malware Detection: Cyber-Espionage Campaign Conducted by TAG-110 aka UAC-0063 Targeting Organizations in Asia and Europe

  • TAG-110 (UAC-0063) cyber-espionage campaign targets organizations in Asia and Europe
  • Adversaries use HATVIBE and CHERRYSPY malware tools to target state bodies, human rights organizations, and educational sector
  • TAG-110 group leverages Ukraine as a testing ground for new attack tactics before expanding to global targets
  • Organizations advised to patch security flaws, enforce multi-factor authentication, and improve cybersecurity awareness to mitigate threats

Read Full Article

like

18 Likes

source image

Schneier

3w

read

436

img
dot

Race Condition Attacks against LLMs

  • LLM Flowbreaking is identified as the third attack type against LLMs after jailbreaking and prompt injection.
  • The 'Second Thoughts' attack involves the LLM retracting and replacing offensive content or displaying an error message.
  • By pressing the Stop button while the LLM is generating an answer, users can bypass guardrails and receive a violating response.
  • The attack focuses on exploiting the application architecture components surrounding the LLM, rather than the model itself.

Read Full Article

like

26 Likes

source image

Kaspersky

3w

read

327

img
dot

Image Credit: Kaspersky

Telegram Premium gift subscription scam | Kaspersky official blog

  • Telegram Premium subscription is a gift that you can present to your friends.
  • Scammers are exploiting the Telegram Premium gift subscription feature by sending out fake gift subscriptions.
  • The scam starts with an innocent-looking Telegram message that contains a phishing link.
  • The phishing link leads to a fake Telegram login page that steals your login details.
  • The scammers display a congratulatory message on stealing your login credentials and start a 24-hour timer for activation of the subscription which never materializes.
  • Several similar scams have emerged, like-hosting a free raffle for Telegram Premium subscription and distributing APK files for supposedly "hacked" Telegram apps.
  • Scammers operate all over the world with the same schemes and, in case of doubt, only purchase subscriptions through official channels.
  • Enable two-factor authentication for secure login into the Telegram account.
  • Be cautious of alternative versions of apps and learn about the other ways scammers can steal your Telegram account.
  • Take your time, even if being pressurized by the scammers with timers. It is better to err on the side of excessive caution.

Read Full Article

like

19 Likes

source image

Medium

3w

read

340

img
dot

Image Credit: Medium

Your data is not safe! See how hackers steal it now

  • Data theft refers to the situation when cybercriminals steal sensitive information like your name, passwords, bank details, or even medical records.
  • Phishing is perhaps the most widely used hacking method where hackers use emails or messages to trick users into providing sensitive information.
  • Stolen data can be sold on the dark web, used for identity theft, or financial fraud.
  • It is important to be aware of these hacking methods and take necessary measures to protect personal information.

Read Full Article

like

20 Likes

source image

Bitcoinist

3w

read

274

img
dot

Image Credit: Bitcoinist

Ohio Man Loses Life Savings in $425K Crypto Scam—Here’s How It Went Down

  • An Ohio man lost his life savings of $425,000 in a cryptocurrency scam.
  • The man fell victim to a fraudulent pop-up window claiming his retirement account was compromised.
  • The scammers gained remote access to his computer and transferred the funds into cryptocurrency wallets.
  • Federal authorities traced and recovered the stolen cryptocurrency, seeking to provide compensation to the victim.

Read Full Article

like

16 Likes

source image

Pymnts

3w

read

252

img
dot

Image Credit: Pymnts

As Supply Chains Go Digital, Cybersecurity Must be Strongest Link

  • Supply chain management software provider Blue Yonder was hit by a ransomware attack, affecting large enterprise customers.
  • Cybersecurity issues in the supply chain have become a critical consideration for firms.
  • Digital platforms have revolutionized supply chain operations but come with risks.
  • Companies must strengthen cybersecurity without stifling innovation.

Read Full Article

like

15 Likes

source image

TechCrunch

3w

read

150

img
dot

Image Credit: TechCrunch

T-Mobile says telco hackers had ‘no access’ to customer call and text message logs

  • T-Mobile assures that hackers had no access to customer call and text message logs during the recent cyberattack.
  • The company detected attempts to infiltrate their systems, which originated from another telecoms company connected to T-Mobile's network. Connectivity with that provider's network was severed.
  • T-Mobile cannot definitively identify the hackers, but states that they do not see any attackers in their systems currently. Cybersecurity defenses prevented access to sensitive customer information.
  • Metadata about customer phone calls and text messages, such as caller information and communication details, were not accessed. T-Mobile invested in cybersecurity hardening due to previous data breaches.

Read Full Article

like

9 Likes

source image

Securityaffairs

3w

read

261

img
dot

Image Credit: Securityaffairs

Operation Serengeti: INTERPOL arrested 1,006 suspects in 19 African countries

  • Operation Serengeti, a joint law enforcement operation between INTERPOL and AFRIPOL, resulted in the arrest of 1,006 suspects across 19 African countries.
  • During the operation, 134,089 malicious infrastructures and networks were dismantled.
  • The operation targeted ransomware, business email compromise (BEC), digital extortion, and online scams.
  • The total financial losses caused by these cybercrimes amounted to USD 193 million.

Read Full Article

like

15 Likes

For uninterrupted reading, download the app