Cyber Crime

Aurora Stealer Malware is becoming a prominent threat in the cybercrime ecosystemAurora Stealer Malware is becoming a prominent threat in the cybercrime ecosystem

Aurora Stealer Malware is becoming a prominent threat in the cybercrime ecosystem

Researchers warn of threat actors employing a new Go-based malware dubbed Aurora Stealer in attacks in the wild. Aurora Stealer…

3 years ago
Two Estonian citizens arrested in $575M cryptocurrency fraud schemeTwo Estonian citizens arrested in $575M cryptocurrency fraud scheme

Two Estonian citizens arrested in $575M cryptocurrency fraud scheme

Two Estonian citizens were arrested in Tallinn for allegedly running a $575 million cryptocurrency fraud scheme. Two Estonian nationals were…

3 years ago
Emotet is back and delivers payloads like IcedID and BumblebeeEmotet is back and delivers payloads like IcedID and Bumblebee

Emotet is back and delivers payloads like IcedID and Bumblebee

The Emotet malware is back and experts warn of a high-volume malspam campaign delivering payloads like IcedID and Bumblebee. Proofpoint…

3 years ago
Google won a lawsuit against the Glupteba botnet operatorsGoogle won a lawsuit against the Glupteba botnet operators

Google won a lawsuit against the Glupteba botnet operators

Google won a lawsuit filed against two Russian nationals involved in the operations of the Glupteba botnet. This week, Google…

3 years ago
Octocrypt, Alice, and AXLocker Ransomware, new threats in the wildOctocrypt, Alice, and AXLocker Ransomware, new threats in the wild

Octocrypt, Alice, and AXLocker Ransomware, new threats in the wild

Experts from Cyble Research and Intelligence Labs (CRIL) discovered three new ransomware families: AXLocker, Octocrypt, and Alice Ransomware. Threat intelligence…

3 years ago
Black Friday and Cyber Monday, crooks are already at workBlack Friday and Cyber Monday, crooks are already at work

Black Friday and Cyber Monday, crooks are already at work

Every year during Black Friday and Cyber Monday, crooks take advantage of the bad habits of users with fraudulent schema.…

3 years ago
New improved versions of LodaRAT spotted in the wildNew improved versions of LodaRAT spotted in the wild

New improved versions of LodaRAT spotted in the wild

Cisco Talos spotted multiple updated versions of LodaRAT that were deployed alongside other malware families, including RedLine and Neshta. Researchers…

3 years ago
Hive Ransomware extorted over $100M in ransom payments from over 1,300 companiesHive Ransomware extorted over $100M in ransom payments from over 1,300 companies

Hive Ransomware extorted over $100M in ransom payments from over 1,300 companies

Hive ransomware operators have extorted over $100 million in ransom payments from over 1,300 companies worldwide as of November 2022.…

3 years ago
Ongoing supply chain attack targets Python developers with WASP StealerOngoing supply chain attack targets Python developers with WASP Stealer

Ongoing supply chain attack targets Python developers with WASP Stealer

A threat actor tracked as WASP is behind an ongoing supply chain attack targeting Python developers with the WASP Stealer.…

3 years ago
China-based Fangxiao group behind a long-running phishing campaignChina-based Fangxiao group behind a long-running phishing campaign

China-based Fangxiao group behind a long-running phishing campaign

A China-based financially motivated group, tracked as Fangxiao, is behind a large-scale phishing campaign dating back as far as 2019. Researchers…

3 years ago