Manuel Bissey · @mbissey
30 followers · 462 posts · Server cyberplace.social

A group calling itself Diicot is performing mass SSH brute-force scanning and deploying a variant of the Mirai IoT botnet on compromised devices, according to researchers. The group also deploys a mining payloadโ˜๏ธ๐Ÿค–

csoonline.com/article/3700170/

#cybercriminal #cryptocurrency

Last updated 1 year ago

Stuurbaard · @stuurbaard
9 followers · 60 posts · Server mastodon.nl
PrivacyDigest · @PrivacyDigest
256 followers · 861 posts · Server mas.to

Attacks Have Entered a โ€˜Heinousโ€™ New Phase

With victims refusing to pay, gangs are now releasing stolen photos of cancer patients and sensitive student records.

wired.com/story/ransomware-tac

#cybercriminal #ransomware

Last updated 2 years ago

georgia fan club · @gayposter
0 followers · 1 posts · Server toot.cat

fedi.cybercriminal.eu
THIS SUPPORTS ABKHAZ INDEPENDENCE, WHICH ISN'T A REAL COUNTRY AND IS PART OF GEORGIA
I'M PLEDGING MY to and I DEMAND THAT GETS A LIFETIME from the !

#fediblock #chud #instance #ALlegiance #georgia #cybercriminal #fedinuke #fediverse

Last updated 2 years ago

Highlights from the New U.S.
โ€™s new strategy envisions a more active role by cloud providers and the military in disrupting infrastructure, and it names as the single biggest to U.S. interests.
krebsonsecurity.com/2023/03/hi

#cybersecuritystrategy #whitehouse #cybersecurity #cybercriminal #China #cyberthreat

Last updated 2 years ago

Exactly one year since the start of the invasion, this new report by my colleagues looks into how โ€™s war against has disrupted the cybercriminal ecosystem, including the impact of Russiaโ€™s IT โ€œbrain drainโ€on the decentralization of landscape and how crowdsourced will likely create a new generation of non-state threat actors: recordedfuture.com/russias-war

#russia #ukraine #cybercriminal #threat #hacktivism

Last updated 2 years ago

Eugene McParland · @EugeneMcParland
2750 followers · 2800 posts · Server mastodon.ie

One year after the russian invasion of
Google TAG, with additional research from Mandiant and Trust & Safety, provide insights into changes in the cyber threat landscape triggered by the war.

The report encompasses new findings, and retrospective insights, across government-backed attackers, information operations (IO) and ecosystem threat actors. It also includes threat actor deep dives focused on specific campaigns from 2022.

Read it here๐Ÿ”— blog.google/threat-analysis-gr

#ukraine #cybercriminal

Last updated 2 years ago

ericWadeFord · @ericWadeFord
0 followers · 2 posts · Server infosec.exchange

OneNote Attachment Used to Deliver New Variant of

Source: blog.cyble.com/2023/02/02/new-

Targeted Industries: Manufacturing, Retail Trade; Potential to target all industries

Cyble recently observed a using a OneNote attachment (.one) in spam emails to deliver a .bat file that exhibits the same behavior as a new variant of . Deepwatch has observed cybercriminals using OneNote attachments to deliver ATI's Cyber Threat Intel team cannot find any reference to BatLoader being sold or offered through publicly available sources, which may suggest that a single cybercriminal or group operates BATLoader; this may indicate that the cybercriminal behind the phishing campaign is the same cybercriminal behind BATLoader. Cybercriminals using OneNote attachments could be an emerging trend. However, as of yet, it appears to be an isolated usage and not a widespread threat and may indicate that cybercriminals are testing out this distribution method.

#batloader #cybercriminal #qakbot #malwarere #cti #threatintelligence #threatintel

Last updated 2 years ago

Dissent Doe :cupofcoffee: · @PogoWasRight
1067 followers · 134 posts · Server infosec.exchange
Rhombus Ticks · @rticks
133 followers · 891 posts · Server universeodon.com
DomainTools · @DomainTools
80 followers · 21 posts · Server infosec.exchange

With the continued evolution of activity, supporting services become important to understand. In our latest blog post, we explore and the demand for malicious services. Read more here:
domaintools.com/resources/blog

#cybercriminal #blackproxies #proxy

Last updated 2 years ago

Laith Alkhouri โœ… · @MENAanalyst
79 followers · 39 posts · Server ioc.exchange

โ€œA growing number of groups are turning to an information stealer named Aurora, which is based on the Go open source programming language, to target data from browsers, cryptocurrency wallets, and local systems.โ€

darkreading.com/threat-intelli

#cybercriminal

Last updated 2 years ago

Bob Young :verified: · @fifonetworks
86 followers · 102 posts · Server infosec.exchange

The 's List:

Unpatched

Older operating systems

Companies with no commitment to Awareness Training

Companies that haven't implemented

Users that don't activate 2FA

Users that over share personal details on social media

Weak policies

Single Sign-On for lateral movement

data storage

Saved credentials

who say no to the 's budget requests

Understaffed security departments

#cybercriminal #thanksgiving #servers #cybersecurity #2fa #password #centralized #rdp #ceos #ciso

Last updated 2 years ago

ITSEC News · @itsecbot
856 followers · 32557 posts · Server schleuss.online
DavidV.TV Social ยฎ · @DavidVTV
86 followers · 13753 posts · Server masthead.social

| Lawmakers Probe Early Release of Top RU Cybercrook | Russian Hacker RELEASE??

, a who long operated two of โ€™s most exclusive forums, was in 2015 by authorities.

Burkov was sent to America, pleaded guilty, and was sentenced to years in .

But a little more than a year later, he was ?? and back to Russia??

?

krebsonsecurity.com/2022/03/la

Disclaim..

#why #Deported #quietly_released #prison #nine #israeli #arrested #underground_hacking #russia #cybercriminal #Aleksei_Burkov #INTERNATIONAL_TECH_NEWS

Last updated 3 years ago