Category: Cybercrime

  • Operation Synergia II

    Operation Synergia II, led by INTERPOL in 2024, targeted cybercrime infrastructure across 95 countries. The operation focused on 22,000 IP addresses linked to criminal activities, including phishing, malware, and ransomware. Key outcomes included the dismantling of illegal networks, the seizure of 59 servers, 43 electronic devices, and the arrest of 41 suspects. Collaborative efforts between…

    Continue Reading

  • RansomHub

    RansomHub is a cybercriminal group operating a ransomware-as-a-service (RaaS) model that emerged in early 2024. It evolved from cybercriminal groups formerly known as Cyclops and Knight, and has recently attracted high-profile affiliates from other prominent variants such as LockBit and ALPHV. Here are some key points about the RansomHub cybercriminal group: RansomHub’s combination of sophisticated…

    Continue Reading

  • Almost 2.7 billion records of personal information for people in the United States were leaked from National Public Data

    In April 2024, National Public Data (NPD), a data provider company that performs background checks and fraud prevention, experienced a major data breach that exposed nearly 2.7 billion records. This breach compromised highly sensitive personal information, including full names, Social Security numbers, addresses, and dates of birth. The breach was initially reported when a hacker…

    Continue Reading

  • BlackBasta

    The BlackBasta cybercriminal group is a relatively new but rapidly evolving ransomware group that emerged in 2022. This group is known for its sophisticated attack methods and significant impact on various industries. Here are some precise details about the group: The BlackBasta group exemplifies the growing trend of ransomware-as-a-service (RaaS), where ransomware developers lease their…

    Continue Reading

  • SIM Swapping Attack

    A SIM swapping attack, also known as a SIM swap scam or SIM hijacking, is a form of identity theft in which an attacker manipulates a victim’s phone carrier into transferring the victim’s phone number to a SIM card controlled by the attacker. This malicious act is achieved through social engineering techniques or by exploiting…

    Continue Reading

  • eSIM Hijacking Attack

    An eSIM hijacking attack is a cybersecurity threat targeting devices equipped with an embedded SIM (eSIM). Unlike traditional SIM cards that can be physically swapped, an eSIM is built into the device and can be reprogrammed to change mobile network subscriptions. This type of attack involves unauthorized access and manipulation of an individual’s eSIM profile,…

    Continue Reading

  • LockBit cybercriminals returns to attack after operation Cronos

    LockBit, the infamous cybercriminal group, has returned to action after a brief disruption caused by Operation Cronos. Here are the key details: Operation Cronos: On February 20, 2024, The National Crime Agency (NCA) and the Federal Bureau of Investigation (FBI) and other law enforcement agencies seized operations of LockBit. The task force took down 34…

    Continue Reading

  • Operation Cronos

    Operation Cronos, a global law enforcement operation, has achieved a major breakthrough in the fight against cybercrime. Led by the UK’s National Crime Agency (NCA) and the Federal Bureau of Investigation (FBI), it successfully took down LockBit, one of the world’s most harmful ransomware groups. This group was notorious for high-profile cyber attacks on organizations…

    Continue Reading

  • LockBit

    LockBit is a cybercriminal group proposing ransomware as a service (RaaS), which means they provide their ransomware to other threat actors through an affiliate model. This allows different cybercriminals to use their ransomware toolkit in exchange for a percentage of the ransom payments. The group emerged around 2019 and has since gained notoriety for its…

    Continue Reading