Cyber Crime

COVID-19 themed attacks December 6 – December 19, 2020

This post includes the details of the COVID-19 themed attacks launched from December 6 – December 19, 2020. December 6…

5 years ago

FBI and Interpol shut down some servers of Joker’s Stash carding marketplace

Joker's Stash, the largest carding marketplace online, was shut down by a coordinated operation conducted by the FBI and the…

5 years ago

Fake mobile version of Cyberpunk 2077 spreads ransomware

A threat actor is spreading ransomware dubbed CoderWare that masquerades as Windows and Android versions of the recent Cyberpunk 2077.…

5 years ago

DoppelPaymer ransomware gang now cold-calling victims, FBI warns

FBI says DoppelPaymer ransomware gang is harassing victims who refuse to pay, threatening to send individuals to their homes. FBI…

5 years ago

Digging the recently leaked Chinese Communist Party database

KELA researchers analyzed a database recently leaked online that contains data for 1.9 million Chinese Communist Party members in Shanghai.…

5 years ago

Norwegian cruise company Hurtigruten was hit by a ransomware

Norwegian cruise company Hurtigruten disclosed a cyber attack that impacted its entire worldwide digital infrastructure. The Norwegian cruise company Hurtigruten…

5 years ago

PgMiner botnet exploits disputed CVE to hack unsecured PostgreSQL DBs

Researchers have discovered a botnet dubbed PgMiner that targets PostgreSQL databases running on Linux servers to install a cryptocurrency miner.…

5 years ago

Threat actors target K-12 distance learning education, CISA and FBI warn

The US Cybersecurity Infrastructure and Security Agency and the FBI warned about the increase in ransomware attacks targeting the US…

5 years ago

Adrozek malware silently inject ads into search results in multiple browsers

Microsoft warns of a new malware named Adrozek that infects devices and hijacks Chrome, Edge, and Firefox browsers by changing…

5 years ago

njRAT RAT operators leverage Pastebin C2 tunnels to avoid detection

Threat actors behind the njRAT Remote Access Trojan (RAT) are leveraging active Pastebin Command and Control Tunnels to avoid detection.…

5 years ago

This website uses cookies.