Articles about cybercrime

Hot new application for blockchain: How does botnet control sound?

BSides Tel Aviv Blockchain technologies might be abused to create a takedown-resistant infrastructure for botnets. During a presentation at BSides Tel Aviv on Tuesday, security researcher Omer Zohar demonstrated proof-of-concept code for a fully functional command-and-control infrastructure built on top of the Ethereum network. Zohar was …
John Leyden, 20 Jun 2018

Hackers target payment transfer system at Chile's biggest bank, 'take $10m'

Banco de Chile has become the latest victim in a string of cyber attacks targeting the payment transfer systems of banks. The country's largest bank was hit on 24 May and thousands of workstations hobbled. The ransomware attack was well documented locally and the bank has apologised for disruptions, which ran into days. …
John Leyden, 11 Jun 2018
shutterstock_197065211

Dark web souks are so last year: Cybercrooks are switching to Telegram

Underground cybercrime marketplaces are in decline because cybercrooks have begun switching to chat channels to trade illegal goods, according to a new report. The climate of fear and mistrust following the AlphaBay and Hansa takedowns in July 2017 has resulted in crims switching tactics and using less convenient platforms, …
John Leyden, 7 Jun 2018
Amber Rudd

Rudd-y hell, dark web! Amber alert! UK Home Sec is on the war path for stealthy cyber-crims

Britain's Home Secretary Amber Rudd has launched a crackdown on criminals who exploit the dark web. As part of a £9m fund, law enforcement’s response will be ramped up to tackle those who use the darker recesses of the web for illegal activities, such as the selling of firearms, drugs, malware and people. More than £5m will …
John Leyden, 11 Apr 2018
still of Ian McKellan as magneto in the x-men movie

Badmins: Magento shops brute-forced to scrape card deets and install cryptominers

Hackers have compromised hundreds of e-commerce sites running the popular open-source Magento platform to scrape credit card numbers and install crypto-mining malware. The Magento sites are being compromised through brute-force attacks using common and known default Magento credentials, threat intel firm Flashpoint has warned …
John Leyden, 3 Apr 2018

Exploit kit development has gone to sh$t... ever since Adobe Flash was kicked to the curb

There was a big drop in exploit kit development last year, and experts have equated this to the phasing out of Adobe Flash. In 2017, exploit kit development declined 62 per cent, with only a few kits including AKBuilder, Disdain and Terror showing significant activity, according to a study by threat intel firm Recorded Future …
John Leyden, 27 Mar 2018
Hacker

Cash-machine-draining €1bn cybercrime kingpin suspect cuffed by plod

European cyber-cops have felt the collar of a bloke suspected of running a network of crims that used malware to pinch €1bn (£874.8m, $1.24bn) from cash machines and other banking systems. The crew developed the software nasty Anunak, later updated to Carbanak, as well as cyber-weapons based on Cobalt Strike's penetration …
Richard Speed, 27 Mar 2018
money laundering

Crooks opt for Monero as crypto of choice to launder ill-gotten gains

Crooks are increasingly turning to Monero over Bitcoin, according to a new study on the economics of cybercrime. "Platforms like Monero are designed to be truly anonymous, and tumbler services like CoinJoin can [further] obscure transaction origins," said Dr Mike McGuire, senior lecturer in criminology at Surrey University and …
John Leyden, 16 Mar 2018

Your entire ID is worth £820 to crooks on dark web black market

Fraudsters operating on the dark web could buy a person's entire identity ("fullz" in the cybercrook lingo) for just £820. Bank account details, Airbnb profiles and even Match.com logins are worth money to bidders that reside on the murkier side of the internet, a study by virtual private network comparison site Top10VPN.com …
John Leyden, 8 Mar 2018
Jigsaw puzzle of a desktop box

Got that itchy GandCrab feeling? Ransomware decryptor offers relief

White hats have released a free decryption tool for GandCrab ransomware, preventing the nasty spreaders of the DIY malware from asking their victims for money. GandCrab has been spreading since January 2018 via malicious advertisements that lead to the RIG exploit kit landing pages or via crafted email messages impersonating …
John Leyden, 28 Feb 2018
Jigsaw puzzle of a desktop box

Cryakl ransomware antidote released after servers seized

Free decryption keys for the Cryakl ransomware were released last Friday – the fruit of an ongoing cybercrime investigation. The keys were obtained during an ongoing investigation by Belgian cops, and shared with the No More Ransom project, an industry-led effort to combat the growing scourge of file-encrypting malware. The …
John Leyden, 12 Feb 2018

Unlucky 13 collared by cops hunting cyber-crew who stole up to $2.2bn

Thirteen out of 36 individuals indicted for their alleged involvement in a transnational cybercrime group know as Infraud have been arrested, the US Department of Justice announced on Wednesday. The Infraud Organization, according to prosecutors, coordinated various flavors of internet fraud including identity theft, bank …
guard dog

GCHQ unit claims it has 'objectively' made the UK a less desirable target to cybercrims

GCHQ's National Cyber Security Centre claims that its strategy of "actively defending" the UK against high-volume commodity attacks is working. The Active Cyber Defence (ACD) programme aims to "protect the majority of people in the UK from the majority of the harm, caused by the majority of the attacks, for the majority of the …
John Leyden, 5 Feb 2018

Scammers become the scammed: Ransomware payments diverted with Tor proxy trickery

Cybercriminals are using Tor proxies to divert ransomware payments to their own Bitcoin wallets. Ransomware scammers have long directed victims to payment portals on the Tor network. For those who do not want to or cannot install the Tor browser necessary to pay their ransoms, operators generally direct victims to a Tor proxy …
John Leyden, 30 Jan 2018
Money laundering

Barclays bank bod in the cooler for aiding Dridex money launderers

An employee of Barclays Bank who laundered thousands of pounds on behalf of Moldovan cybercriminals was yesterday sentenced to six years and four months behind bars in Blighty. According to the Crown Prosecution Service, Jinal Pethad, 29, from Edgware, London, UK, set up more than a hundred false accounts to launder money and …
Richard Priday, 13 Dec 2017

Russian hacker clan exposed: They're called MoneyTaker, and they're gonna take your money

Security researchers have lifted the lid on a gang of Russian-speaking cybercrooks, dubbed MoneyTaker. The group has conducted more than 20 successful attacks on financial institutions and legal firms in the USA, UK and Russia in the last two months alone, according to Russian incident response firm Group-IB. MoneyTaker has …
John Leyden, 11 Dec 2017

National Cyber Security Centre boss: For the love of $DEITY, use 2FA on your emails, peeps

The chief exec of the National Cyber Security Centre – a branch of the UK's spy nerve-centre GCHQ – has called on everyone to enable two-factor authentication for their emails. This follows revelations that almost the entire population's details are available for sale on the dark web. Speaking at the Parliament and Internet …
Kat Hall, 21 Nov 2017
Trojan horse photo via Shutterstock

New, revamped Terdot Trojan: It's so 2017, it even fake-posts to Twitter

Terdot, a banking Trojan that has been around since mid-2016, has been re-engineered with updated information and credential thievery as well as social media account monitoring functionality. Built on the Zeus framework, whose code was leaked in 2011, Terdot adds a number of novel techniques to the market, such as leveraging …
John Leyden, 16 Nov 2017

Create a news alert about cybercrime, or find more stories about cybercrime.

Biting the hand that feeds IT © 1998–2018