underground

The millionaire business behind the use of Limitless and Predator Pain Keylogger/RATs in the criminal ecosystemsThe millionaire business behind the use of Limitless and Predator Pain Keylogger/RATs in the criminal ecosystems

The millionaire business behind the use of Limitless and Predator Pain Keylogger/RATs in the criminal ecosystems

Trend Micro issued a research paper on operations behind Predator Pain and Limitless keyloggers, both of which are easily obtainable…

10 years ago
Operation Onymous, the joint attack against dark markets in TorOperation Onymous, the joint attack against dark markets in Tor

Operation Onymous, the joint attack against dark markets in Tor

Operation Onymous - Law enforcement and judicial agencies around the globe conducted a joint action against dark markets on Tor…

11 years ago
Voxis, the platform for automating rogue credit card charges is available in the undergroundVoxis, the platform for automating rogue credit card charges is available in the underground

Voxis, the platform for automating rogue credit card charges is available in the underground

A group of cybercriminals is proposing in the underground an application for automating rogue credit card charges dubbed Voxis platform.…

11 years ago
RRVS, Facebook and Yahoo work to prevent identity theftRRVS, Facebook and Yahoo work to prevent identity theft

RRVS, Facebook and Yahoo work to prevent identity theft

Facebook and Yahoo have designed an SMTP extension dubbed RRVS, Require-Recipient-Valid-Since, to prevent illegal use of emails with a new…

11 years ago
Analyzing the HIGH-TECH CRIME TRENDS 2014 ReportAnalyzing the HIGH-TECH CRIME TRENDS 2014 Report

Analyzing the HIGH-TECH CRIME TRENDS 2014 Report

Group-IB published the annual HIGH-TECH CRIME TRENDS 2014 Report, a document focused on high-tech crimes associated with traditional computer crime.…

11 years ago
Ello Social Network knocked down by a cyber attackEllo Social Network knocked down by a cyber attack

Ello Social Network knocked down by a cyber attack

Ello, the new social network which is considered the anti-Facebook, was knocked down on Sunday by a distributed denial of…

11 years ago
Dyre Zeus variant malware used for corporate espionageDyre Zeus variant malware used for corporate espionage

Dyre Zeus variant malware used for corporate espionage

Security experts warn Dyre malware is being used by cyber criminals for corporate espionage instead harvest banking credentials. Dyre is the…

11 years ago
Chinese criminal underground is doubled between 2012 and 2013Chinese criminal underground is doubled between 2012 and 2013

Chinese criminal underground is doubled between 2012 and 2013

Expert at TrendMicro published a new chapter of the Cybercriminal Underground Economy Series in which analyzed the Chinese underground. Chinese…

11 years ago
Namecheap accounts compromised using the CyberVor’s archiveNamecheap accounts compromised using the CyberVor’s archive

Namecheap accounts compromised using the CyberVor’s archive

Hosting provider Namecheap warned its customers that hackers compromised some of its users' accounts using the CyberVor's archive of credentials.…

11 years ago
Malvertising campaign hit high profile websites including java_comMalvertising campaign hit high profile websites including java_com

Malvertising campaign hit high profile websites including java_com

A new malvertising campaign has been spotted by experts at Fox-IT, the researchers discovered malicious ads on high-profile websites including Java.com.…

11 years ago