Cyber Crime Archives - GBHackers Security | #1 Globally Trusted Cyber Security News Platform https://gbhackers.com/category/cyber-crime/ GBhackers Offering Exclusive Cyber Security News Coverage, New Research papers & Technology Updates. Mon, 11 Nov 2024 11:11:47 +0000 en-US hourly 1 https://wordpress.org/?v=6.6.2 https://gbhackers.com/wp-content/uploads/2024/09/cropped-gbh-32x32.png Cyber Crime Archives - GBHackers Security | #1 Globally Trusted Cyber Security News Platform https://gbhackers.com/category/cyber-crime/ 32 32 Researchers Detailed Credential Abuse Cycle https://gbhackers.com/credential-abuse-cycle-research-2/ https://gbhackers.com/credential-abuse-cycle-research-2/#respond Mon, 11 Nov 2024 11:11:46 +0000 https://gbhackers.com/?p=114618 Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling them to gain unauthorized access. This can lead to data breaches, identity theft, and financial loss across diverse industries and geographic locations. Compromised credentials pose a significant security risk primarily due to data breaches and user negligence. In Q3 2024, they […]

The post Researchers Detailed Credential Abuse Cycle appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/credential-abuse-cycle-research-2/feed/ 0
Researchers Detailed Credential Abuse Cycle https://gbhackers.com/credential-abuse-cycle-research/ https://gbhackers.com/credential-abuse-cycle-research/#respond Wed, 06 Nov 2024 12:33:49 +0000 https://gbhackers.com/?p=114584 The United States Department of Justice has unsealed an indictment against Anonymous Sudan, a hacking group responsible for distributed denial-of-service attacks.  LameDuck, a new threat actor, has carried out several massive distributed denial of service (DDoS) attacks to affect critical infrastructure, cloud providers, and various industries.  The group leverages social media to amplify its impact […]

The post Researchers Detailed Credential Abuse Cycle appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/credential-abuse-cycle-research/feed/ 0
Rise Of Ransomware-As-A-Service Leads To Decline Of Custom Tools https://gbhackers.com/ransomware-as-a-service-decline-custom-tools/ https://gbhackers.com/ransomware-as-a-service-decline-custom-tools/#respond Wed, 06 Nov 2024 12:30:21 +0000 https://gbhackers.com/?p=114576 Ransomware-as-a-Service (RaaS) platforms have revolutionized the ransomware market. Unlike traditional standalone ransomware sales, RaaS offers a subscription-based model where attackers can access pre-built ransomware tools and infrastructure without significant upfront costs.  These platforms provide user-friendly dashboards, customization options, and ongoing support, lowering the barrier of entry for cybercriminals, which has made ransomware attacks more accessible […]

The post Rise Of Ransomware-As-A-Service Leads To Decline Of Custom Tools appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/ransomware-as-a-service-decline-custom-tools/feed/ 0
North Korean Hackers Employing New Tactic To Acruire Remote Jobs https://gbhackers.com/north-korean-hackers-remote-tactics/ https://gbhackers.com/north-korean-hackers-remote-tactics/#respond Wed, 06 Nov 2024 12:21:19 +0000 https://gbhackers.com/?p=114555 North Korean threat actors behind the Contagious Interview and WageMole campaigns have refined their tactics, enhancing the obfuscation of their scripts to evade detection.  InvisibleFerret now boasts a dynamic RMM configuration and OS-specific persistence mechanisms, while Contagious Interview has expanded its arsenal with macOS applications, targeting a wider victim pool.  These attacks have compromised over […]

The post North Korean Hackers Employing New Tactic To Acruire Remote Jobs appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/north-korean-hackers-remote-tactics/feed/ 0
HookBot Malware Use Overlay Attacks Impersonate As Popular Brands To Steal Data https://gbhackers.com/hookbot-malware-overlay-steals-data/ https://gbhackers.com/hookbot-malware-overlay-steals-data/#respond Wed, 06 Nov 2024 12:14:27 +0000 https://gbhackers.com/?p=114534 The HookBot malware family employs overlay attacks to trick users into revealing sensitive information by impersonating various brands and apps to gain trust. It also utilizes C2 servers to receive updates and evolve continuously.  A builder tool empowers threat actors to create custom HookBot apps as the malware is often distributed through Telegram, where it’s […]

The post HookBot Malware Use Overlay Attacks Impersonate As Popular Brands To Steal Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/hookbot-malware-overlay-steals-data/feed/ 0
ToxicPanda Banking Malware Attacking Banking Users To Steal Logins https://gbhackers.com/toxicpanda-banking-malware-attack/ https://gbhackers.com/toxicpanda-banking-malware-attack/#respond Wed, 06 Nov 2024 12:11:04 +0000 https://gbhackers.com/?p=114510 Recent research has uncovered a new strain of malware developed for Android devices, initially misidentified as TgToxic.  Despite sharing some bot command similarities, this malware, now dubbed ToxicPanda, exhibits significant code divergence from its original source. It lacks key TgToxic capabilities and possesses placeholder commands without functional implementation.  The malware leverages Remote Access capabilities to […]

The post ToxicPanda Banking Malware Attacking Banking Users To Steal Logins appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/toxicpanda-banking-malware-attack/feed/ 0
Hackers Using AV/EDR Bypass Tool From Cybercrime Forums To Bypass Endpoints https://gbhackers.com/hackers-av-edr-bypass-cybercrime/ https://gbhackers.com/hackers-av-edr-bypass-cybercrime/#respond Tue, 05 Nov 2024 10:30:16 +0000 https://gbhackers.com/?p=114492 Researchers uncovered two previously unknown endpoints with older Cortex XDR agents that used to test an AV/EDR bypass tool were compromised, granting unauthorized access. The threat actor utilized a bypass tool, likely purchased from cybercrime forums, to compromise the system. Subsequent analysis of recovered files and digital footprints revealed the identity of one of the […]

The post Hackers Using AV/EDR Bypass Tool From Cybercrime Forums To Bypass Endpoints appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/hackers-av-edr-bypass-cybercrime/feed/ 0
Hackers Created 100+ Fake Web Stores To Steal Millions Of Dollars From Customers https://gbhackers.com/hackers-fake-stores-million-theft/ https://gbhackers.com/hackers-fake-stores-million-theft/#respond Tue, 05 Nov 2024 10:27:49 +0000 https://gbhackers.com/?p=114483 The Phish, ‘n’ Ships fraud operation leverages, compromised websites to redirect users to fake online stores, which, optimized for search engine visibility, trick victims into providing credit card details to third-party payment processors, resulting in financial loss without receiving any products.  Phishing attacks exploit consumer demand for hard-to-find items, redirecting victims to fake online stores. […]

The post Hackers Created 100+ Fake Web Stores To Steal Millions Of Dollars From Customers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/hackers-fake-stores-million-theft/feed/ 0
Singapore’s Government Directed ISPs To Block Access To Ten Inauthentic Websites https://gbhackers.com/singapore-blocks-fake-sites/ https://gbhackers.com/singapore-blocks-fake-sites/#respond Mon, 04 Nov 2024 11:48:17 +0000 https://gbhackers.com/?p=114039 Singapore’s government has instructed internet service providers to block access to websites deemed “inauthentic,” which are believed to be part of hostile information campaigns potentially targeting Singapore.  The government’s action is intended to combat the distribution of false information and disinformation on the Internet by using such strategies.  Recent reports have revealed a new tactic […]

The post Singapore’s Government Directed ISPs To Block Access To Ten Inauthentic Websites appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/singapore-blocks-fake-sites/feed/ 0
Dark Angels Ransomware Attacking Windows And Linux/ESXi Systems https://gbhackers.com/dark-angels-ransomware-attack/ https://gbhackers.com/dark-angels-ransomware-attack/#respond Wed, 09 Oct 2024 11:15:23 +0000 https://gbhackers.com/?p=113285 The sophisticated ransomware group Dark Angels, active since 2022, targets large companies for substantial ransom payments by employing third-party ransomware payloads like Babuk, RTM Locker, and RagnarLocker to encrypt files on Windows and Linux systems.  It employs ransomware in a strategic manner, taking into account the potential impact of file encryption, in order to minimize […]

The post Dark Angels Ransomware Attacking Windows And Linux/ESXi Systems appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/dark-angels-ransomware-attack/feed/ 0