HackDig : Dig high-quality web security articles for hackers

REvil ransomware crew dangles $1,000,000 cybercrime carrot

byPaul DucklinSadly, we’ve written many times before about RaaS, short for Ransomware-as-a-Service:Satan ransomware: old name, new business modelThat’s where the crooks who actually write the ransomware keep themselves out of the limelight by hiring in other crooks to identify victims, get into their networks, spread the malware and trigger the d
Publish At:2020-09-30 10:45 | Read:195 | Comments:0 | Tags:Law & order Ransomware crimeware Cybercrime RaaC ransomware

Clever bank hack allowed crooks to make unlimited ATM withdrawals

To appreciate how malware targeting banks and other financial institutions is adopting sophisticated techniques once reserved for state-sponsored spies using so-called advanced persistent threats, consider the recently discovered Metel crimeware package.It contains more than 30 separate modules that can be tailored to the computer it's infecting. One of the
Publish At:2016-02-08 21:50 | Read:5158 | Comments:0 | Tags:Law & Disorder Risk Assessment Technology Lab banks crime Cr

Understanding Bitcoin - the virtual currency of choice for cybercriminals and terrorists

<p><img alt="bitcoin-accepted-here.png" src="http://info.phishlabs.com/hubfs/bitcoin-accepted-here.png" style="width: 223px; float: right;" title="bitcoin-accepted-here.png" width="724">Bitcoin is a decentralized, P2P network-based virtual currency that has only grown in popularity and controversy since its creation in 2008.&nbsp; It is belie
Publish At:2015-12-18 17:25 | Read:2428 | Comments:0 | Tags:DDoS Fraud Crimeware Ransomware Bitcoin

Updated Cryptowall Encrypts File Names, Mocks Victims

Cryptowall has gotten a minor, but important facelift that might make it more difficult for researchers to tear apart and for victims to recover their encrypted data without paying a ransom.Spotted two days ago, the latest update to the ransomware has begun not only encrypting data on victims’ machines, but also file names, a first according to indepen
Publish At:2015-11-06 03:50 | Read:3173 | Comments:0 | Tags:Cryptography Malware Privacy Ransomware Bleeping Computer Cr

Shifu Malware Analyzed: Behavior, Capabilities and Communications

A Look at Shifu – Behavior, Capabilities and Communications… As part of our normal course of operations as a cyber threat intelligence provider, we monitor the cyber crime underground and provide analysis to our clients on new and emerging threats. As you can imagine, we naturally run into large quantities of malware on a daily basis. From time t
Publish At:2015-10-31 06:55 | Read:12998 | Comments:0 | Tags:iSIGHT Partners crimeware cyber crime Cyber Crime Malware Cy

UK Banks Hit With New Zeus Sphinx Variant and Renewed Kronos Banking Trojan Attacks

Two recent discoveries by IBM Security X-Force researchers indicate that the U.K. is seeing an increased wave of banking Trojan attacks from two families linked with the Zeus Trojan: Sphinx and Kronos. In the first case, X-Force researchers are the first to confirm that beyond seeing underground posts of cybercriminals selling a new Zeus variant dubbed Sphin
Publish At:2015-10-02 08:05 | Read:4641 | Comments:0 | Tags:IBM X-Force Malware Banking Trojan crimeware Cybercrime IBM

Watering Holes and Malvertising: Uncovering the Root Cause of Compromise (Part 1)

So what is this all about?? As part of our normal course of operations as a cyber threat intelligence provider, we monitor the cyber crime underground and  the world of cyber espionage. We provide analysis to our clients on new and emerging threats as well as help them analyze artifacts found on their networks.  As you can imagine, we naturally run into larg
Publish At:2015-09-25 01:30 | Read:9196 | Comments:0 | Tags:iSIGHT Partners angler exploit kit crimeware cyber crime cyb

TeslaCrypt 2.0: Cyber Crime Malware Behavior, Capabilities and Communications

Monitoring TeslaCrypt… As part of our normal course of operations as a cyber threat intelligence provider, we monitor the cyber crime underground and provide analysis to our clients on new and emerging threats. As you can imagine, we naturally run into large quantities of malware on a daily basis. From time to time, we release findings to the public in
Publish At:2015-09-16 23:55 | Read:6651 | Comments:0 | Tags:iSIGHT Partners analysis of ransomware analysis of teslacryp

Password Manager Breach, Phone Scams on the Rise, Hijacked Medical Devices and more | TWIC - June 19, 2015

<img alt="TWIC_branding" src="http://info.phishlabs.com/hs-fs/hub/326665/file-1326531266-png/TWIC_branding.png" style="width: 225px;" width="225"> <p><em>Each week, the PhishLabs team posts The Week in Cybercrime (TWIC) to recap noteworthy cybercrime articles and reports (open source).</em></p> <ul> <li> <
Publish At:2015-06-19 22:05 | Read:3312 | Comments:0 | Tags:Phishing The Week in Cybercrime Vishing Crimeware Data Breac

New Spear Phishing Protection, IE Patch, Data Breach Containment, and more | TWIC - June 12, 2015

<img alt="TWIC_branding" src="http://info.phishlabs.com/hs-fs/hub/326665/file-1326531266-png/TWIC_branding.png" style="width: 225px;" width="225"> <p><em>Each week, the PhishLabs team posts The Week in Cybercrime (TWIC) to recap noteworthy cybercrime articles and reports (open source).</em></p> <ul> <li> <
Publish At:2015-06-12 19:15 | Read:5167 | Comments:0 | Tags:Phishing Malware Vulnerability The Week in Cybercrime Crimew

U.S. Gov't Breach, Mac Zero-Day Bug, Dyre Infections Double, and more | TWIC - June 5, 2015

<img alt="TWIC_branding" src="http://info.phishlabs.com/hs-fs/hub/326665/file-1326531266-png/TWIC_branding.png" style="width: 225px;" width="225"> <p><em>Each week, the PhishLabs team posts The Week in Cybercrime (TWIC) to recap noteworthy cybercrime articles and reports (open source).</em></p> <ul> <li> <
Publish At:2015-06-05 17:25 | Read:3865 | Comments:0 | Tags:Phishing Malware Vulnerability The Week in Cybercrime Crimew

Counterfeit Coupon Business, Healthcare Company Hacked, Bold Phishing Gang and more | TWIC - May 29, 2015

<img alt="TWIC_branding" src="http://info.phishlabs.com/hs-fs/hub/326665/file-1326531266-png/TWIC_branding.png" style="width: 225px;" width="225"> <p><em>Each week, the PhishLabs team posts The Week in Cybercrime (TWIC) to recap noteworthy cybercrime articles and reports (open source).</em></p> <ul> <li> <
Publish At:2015-05-29 16:55 | Read:3352 | Comments:0 | Tags:Phishing Vulnerability The Week in Cybercrime Crimeware Data

USB Driver Exposes Routers, Healthcare Data Breach, Intelligence Sharing and more | TWIC - May 22, 2015

<img alt="TWIC_branding" src="http://info.phishlabs.com/hs-fs/hub/326665/file-1326531266-png/TWIC_branding.png" style="width: 225px;" width="225"> <p><em>Each week, the PhishLabs team posts The Week in Cybercrime (TWIC) to recap noteworthy cybercrime articles and reports (open source).</em></p> <ul> <li> <
Publish At:2015-05-22 16:30 | Read:3626 | Comments:0 | Tags:Phishing Malware Vulnerability The Week in Cybercrime Crimew

New Phishing Campaigns Target Yahoo and Dropbox, Fraudsters Prey on Starbucks Accounts and more | TWIC - May 15, 2015

<img alt="TWIC_branding" src="http://info.phishlabs.com/hs-fs/hub/326665/file-1326531266-png/TWIC_branding.png" style="width: 225px;" width="225"> <p><em>Each week, the PhishLabs team posts The Week in Cybercrime (TWIC) to recap noteworthy cybercrime articles and reports (open source).</em></p> <ul> <li> <
Publish At:2015-05-15 15:30 | Read:4158 | Comments:0 | Tags:Phishing Malware Vulnerability Adobe The Week in Cybercrime

Rombertik Malware, Retail Data Breach Investigation, PoS Vendor Breach and more | TWIC - May 8, 2015

<img alt="TWIC_branding" src="http://info.phishlabs.com/hs-fs/hub/326665/file-1326531266-png/TWIC_branding.png" style="width: 225px;" width="225"> <p><em>Each week, the PhishLabs team posts The Week in Cybercrime (TWIC) to recap noteworthy cybercrime articles and reports (open source).</em></p> <ul> <li> <
Publish At:2015-05-08 14:50 | Read:3509 | Comments:0 | Tags:Phishing Malware Vulnerability The Week in Cybercrime Crimew

Tools

Tag Cloud