Here come the vultures 😬 They'll be targeting small businesses, not the big enterprises.
--
#CrowdStrike warn of a 'likely #eCrime actor' targeting #CrowdStrike Latin America based customers
Here come the vultures 😬 They'll be targeting small businesses, not the big enterprises.
--
#CrowdStrike warn of a 'likely #eCrime actor' targeting #CrowdStrike Latin America based customers
What #macos #malware would folks prefer to read a breakdown about? #ecrime such as #lockbitransomware or #APT malware?
Delving into the wonderful world of MacOS malware, this time I'm analysing "PureLand" - an info stealer targeting crypto wallets on MacOS systems. Its the first attempt and we spend some time understanding the structure of MacOS applications. https://polaryse.github.io/posts/pureland_analysis/#MacOS #macmalware #malware #reverseengineering #malwareanalysis #ARM #infostealer #pureland #eCrime
The Evolution Of E-Crime: From Hacking To Cyberwarfare https://www.forensicfocus.com/articles/the-evolution-of-e-crime-from-hacking-to-cyberwarfare/ #DFIR #eCrime
It's been a minute, but here is my write up on WannaSmile ransomware. A nicely deobfuscated sample. I'll be updating this post soon with a decryptor written in python. https://polaryse.github.io/posts/wannasmile/
#reverseengineering #ransomware #malware #eCrime #YARA #dnSpy
Neo_Net runs #eCrime campaign targeting clients of banks globally
https://securityaffairs.com/148137/cyber-crime/neo_net-ecrime-campaign-targets-banks.html
#securityaffairs #hacking #Bitcoin #PolyNetwork
Are defender and security service pressures pushing #ransomware operations into the hands of an ever-smaller group of prime developers/affiliate programs (with multiple brand names), or are reactions to the ransomware epidemic disrupting established providers resulting in the creation of multiple, truly new/unique providers in the #eCrime space?
#Infosec #CTI #ThreatIntel
Unpopular opinion in #CTI #ThreatIntel: your painstaking tracking and identification of specific individuals involved in events - whether #ecrime or #APT - is completely fucking pointless unless they result in arrests, or _maybe_ sanctions.
Segnalo con piacere (anche perché è completamente gratuito*) il Quaderno di #CyberIntelligence realizzato da ICT Security Magazine e SOCINT, Società Italiana di #Intelligence.
(* No, non dovete compilare alcun form anti-#privacy per poter effettuare il download).
Si parla di #Cybersecurity, #CyberThreat intelligence, #rischio cibernetico, #CyberWarfare, #eCrime, #SocialEngineering, #Spoofing di istituzioni e #PA, nonché #Tor e #cifratura telescopica.
Clausurados los servidores de iSpoof, un servicio online ilegal dedicado a realizar llamadas suplantando un número de teléfono. Muy utilizado en fraudes bancarios. Miles de víctimas en todo el mundo #CAAS #Asterisk #Forensic #FakeCallerID #eCrime 💪👮💻 🔍
Ultimando los detalles del CTF al que se tendrán que enfrentar los compañeros del curso de investigación tecnológica para demostrar todo lo que han aprendido. Serán 35 #CiberRetos prácticos que resolverán por equipos realizando un investigación por todo el planeta. 🌍 #eCrime
Proud to announce that tomorrow I'll be presenting my work (coauthored with @securescientist) titled:
THREAT/crawl - a Trainable, Highly Reusable, and Extensible Automated Method and Tool to Crawl Criminal Underground Forums
at the AWPG eCrime 2022 online conference!
📄 Link to the paper 📄
https://michelecampobasso.github.io/assets/papers/threatcrawl.pdf
⬇️ Link to the event ⬇️
https://apwg.org/event/ecrime2022/
#ecrime #apwg #crawler #cybercrime #underground #monitoring #infosec #security #cybersecurity
@lippard Ooooh that's a good one - thank you for flagging that! Still seems like we're heavy on #ecrime and light on #apt (or #statesponsored) at the moment though!
There is growing awareness of how easily and frequently #cyber attackers can modify their infrastructure, and therefore how re-focusing defenses on adversaries' underlying behaviors can help narrow #security teams' focus
This doesn't mean #threat actors' tactics, techniques, & procedures are totally stagnant though. My latest piece highlights how notable adversaries like #QakBot operators & #ecrime actors are in fact demonstrating #TTP evolution at an alarming rate https://www.tidalcyber.com/blog/adversary-ttp-evolution-and-the-value-of-ttp-intelligence
Prisión para cuatro detenidos en San Fernando por estafas a través de internet.
Habían logrado que en los buscadores web saliera su número de teléfono como de la entidad bancaria para engañar más fácilmente a sus víctimas.
#ecrime
https://www.diariodecadiz.es/sanfernando/Prision-detenidos-San-Fernando-estafas-internet_0_1737126527.html