Researchers have demonstrated how crooks can make ATMs spit out thousands of dollars in cash in just a few minutes by using data stolen from EMV cards. When the EMV (Europay, MasterCard, and Visa) was introduced, the vast majority of security experts believed solved the problems caused by easy to clone magnetic stripe cards. EMV chip-equipped […]
Interpol arrested the Nigerian mastermind of an online fraud network. He will face charges of hacking, conspiracy and obtaining money under false pretences. The Interpol announced the arrest of a 40-year-old Nigerian national that the mastermind behind an online fraud network which made illegal profits worth more than $60 million (54 million euros). The Nigerian […]
The notorious hacker Peace is advertising 200 Million alleged Yahoo accounts on Dark Web, and the company is aware of the sale. Do you remember the notorious hacker Peace? He is the hacker that offered for sale the dumps of LinkedIn and MySpace, and now he has once again a surprise for the security experts. Peace is advertising […]
Experts from Proofpoint discovered that the Banking trojan Chthonic was distributed via ‘legitimate’ PayPal accounts by abusing the “money request” feature. The imagination of cyber criminals is a never-ending pit, according to the security firm Proofpoint, crooks are abusing PayPal to distribute the Chtonic banking trojan. Chtonic is a strain of the most notorious Zeus Trojan, the […]
Scammers exploit the recent a wave of attacks to trick victims with phishing offensive and steal sensitive data from the unaware users. Crooks always exploits the media attention on tragic events for their illegal activities and trick victims with social engineering techniques. Experts observed scammers in the past exploiting news like the crash of Malaysia Airlines […]
Security experts at DigitalShadow security firm published a detailed analysis that demonstrates Deer.io platform facilitates cybercrime activities. Security experts from Digital Shadows have conducted a deep analysis of the Russian cybercrime website Deer.io. The site aims to facilitate cyber criminal activities allowing even crooks without specific skills to become dangerous crooks. The barriers to entry in the […]
A new ransomware campaign relies on a Locky variant that is distributed through JavaScript that includes the binary of the threat itself. Locky is one of the most infamous threats of the ransomware family and according to the experts it is in continuous evolution. The threat has been using JavaScript attachments as a distribution mechanism, but most […]
Is it so easy to buy a weapon on the Dark Web? Access a dark net, buy a weapon, make a massacre. Is this the crime chain behind recent attacks? After mass shooting recently occurred in Germany the Dark Web monopolized the headlines. According to several German news outlets, the young man has bought the 9mm […]
O2 customer data that was reportedly first stolen from the gaming site XSplit in November 2013 are now offered for sale on the Dark Web. In the dark web it is possible to find any kind of illegal product and services, from weapons to payment card data, last disconcerting discovery is related to the availability of O2 customer data in the […]
David S., the Munich gunman has purchased the weapon on the Dark Web, sincerely I was waiting for this title in the headlines, but … In Germany, it is quite difficult to pay for weapons so how the Munich gunman got a 9mm Glock 17? According to several German news outlets, the young man has bought the 9mm […]