Cyber Crime

DirtyMoe botnet infected 100,000+ Windows systems in H1 2021

DirtyMoe is a Windows botnet that is rapidly growing, it passed from 10,000 infected systems in 2020 to more than…

5 years ago

Ragnar Locker ransomware leaked data stolen from ADATA chipmaker

The Taiwanese memory and storage chip maker ADATA was hit by the Ragnar Locker ransomware gang that also published more…

5 years ago

Cruise operator Carnival discloses a security breach

Carnival Corp. said that the data breach it has suffered in March might have impacted its customers and employees. Carnival…

5 years ago

Oleg Koshkin was convicted for operating a crypting service also used by Kelihos botnet

Russian national Oleg Koshkin was convicted for operating a “crypting” service used to obfuscate the Kelihos bot from antivirus software. Russian national Oleg…

5 years ago

UNC2465 cybercrime group launched a supply chain attack on CCTV vendor

UNC2465 cybercrime group that is affiliated with the Darkside ransomware gang has infected with malware the website of a CCTV…

5 years ago

An international joint operation resulted in the arrest of Clop ransomware members

Ukraine police arrested multiple individuals that are believed to be linked to the Clop ransomware gang as part of an…

5 years ago

Cyberium malware-hosting domain employed in multiple Mirai variants campaigns

A new variant of the Mirai botnet, tracked as Moobot, was spotted scanning the Internet for vulnerable Tenda routers. Researchers…

5 years ago

Fujifilm restores operations after recent ransomware attack

Japanese multinational conglomerate Fujifilm announced that it has restored operations following the recent ransomware attack. On June 4, the Japanese…

5 years ago

The source code of the Paradise Ransomware was leaked on XSS hacking forum

The source code for the Paradise Ransomware has been released on a hacking forum allowing threat actors to develop their…

5 years ago

Wear your MASQ! New Device Fingerprint Spoofing Tool Available in Dark Web

The MASQ tool could be used by attackers to emulate device fingerprints thus allowing them to bypass fraud protection controls The…

5 years ago

This website uses cookies.