Category: Cybercrime
-
Operation Synergia II
Operation Synergia II, led by INTERPOL in 2024, targeted cybercrime infrastructure across 95 countries. The operation focused on 22,000 IP addresses linked to criminal activities, including phishing, malware, and ransomware. Key outcomes included the dismantling of illegal networks, the seizure of 59 servers, 43 electronic devices, and the arrest of 41 suspects. Collaborative efforts between…
-
RansomHub
RansomHub is a cybercriminal group operating a ransomware-as-a-service (RaaS) model that emerged in early 2024. It evolved from cybercriminal groups formerly known as Cyclops and Knight, and has recently attracted high-profile affiliates from other prominent variants such as LockBit and ALPHV. Here are some key points about the RansomHub cybercriminal group: RansomHub’s combination of sophisticated…
-
Almost 2.7 billion records of personal information for people in the United States were leaked from National Public Data
In April 2024, National Public Data (NPD), a data provider company that performs background checks and fraud prevention, experienced a major data breach that exposed nearly 2.7 billion records. This breach compromised highly sensitive personal information, including full names, Social Security numbers, addresses, and dates of birth. The breach was initially reported when a hacker…
-
BlackBasta
The BlackBasta cybercriminal group is a relatively new but rapidly evolving ransomware group that emerged in 2022. This group is known for its sophisticated attack methods and significant impact on various industries. Here are some precise details about the group: The BlackBasta group exemplifies the growing trend of ransomware-as-a-service (RaaS), where ransomware developers lease their…
-
SIM Swapping Attack
A SIM swapping attack, also known as a SIM swap scam or SIM hijacking, is a form of identity theft in which an attacker manipulates a victim’s phone carrier into transferring the victim’s phone number to a SIM card controlled by the attacker. This malicious act is achieved through social engineering techniques or by exploiting…
-
eSIM Hijacking Attack
An eSIM hijacking attack is a cybersecurity threat targeting devices equipped with an embedded SIM (eSIM). Unlike traditional SIM cards that can be physically swapped, an eSIM is built into the device and can be reprogrammed to change mobile network subscriptions. This type of attack involves unauthorized access and manipulation of an individual’s eSIM profile,…
-
LockBit cybercriminals returns to attack after operation Cronos
LockBit, the infamous cybercriminal group, has returned to action after a brief disruption caused by Operation Cronos. Here are the key details: Operation Cronos: On February 20, 2024, The National Crime Agency (NCA) and the Federal Bureau of Investigation (FBI) and other law enforcement agencies seized operations of LockBit. The task force took down 34…
-
Operation Cronos
Operation Cronos, a global law enforcement operation, has achieved a major breakthrough in the fight against cybercrime. Led by the UK’s National Crime Agency (NCA) and the Federal Bureau of Investigation (FBI), it successfully took down LockBit, one of the world’s most harmful ransomware groups. This group was notorious for high-profile cyber attacks on organizations…
-
LockBit
LockBit is a cybercriminal group proposing ransomware as a service (RaaS), which means they provide their ransomware to other threat actors through an affiliate model. This allows different cybercriminals to use their ransomware toolkit in exchange for a percentage of the ransom payments. The group emerged around 2019 and has since gained notoriety for its…