Security Awareness Training Blog

Cybercrime Blog

We report on the latest trends in cybercrime to help you stay informed and aware of what the current threat landscape looks like.

Warning: Cybercriminals Target Organizations Going Through M&A Activity

The changing of hands of significant amounts of money is enough reason to get the attention of cybercriminals. So, how can organizations prepare for what should be an expected series of ...
Continue Reading

U.K. Authorized Push Payment Scams Jump 71% in First Half of 2021, Taking in £355 Million

Surpassing credit card fraud in the U.K., scamming victims into sending money to a fraudulent bank account has taken the lead spot in fraud scams that could cost U.K. residents more than ...
Continue Reading

Europol: Italian Mafia Tied to Cybercriminals Responsible for €10 Million in Cyberattacks

The recent dismantling of a cybercriminal gang has uncovered ties to the Italian Mafia, demonstrating that even traditional organized crime is moving to cyber.
Continue Reading

Brute Force Attacks are on the Rise as June sees a 671% increase

With nearly one-third of all organizations targeted in a single week and just above one-quarter on the average, attempts to access externally facing resources is growing in popularity and ...
Continue Reading

Cybercriminals Are Growing More Organized

The cybercriminal underground is becoming increasingly organized, according to researchers at HP. The criminal underground functions like a regular economy, with people selling goods and ...
Continue Reading

U.S. State Department Issues a Reward for Information on Foreign Cybercriminals Targeting Critical Infrastructure

In the wake of cyberattacks targeting U.S. infrastructure organizations, the U.S. government is stepping up measures to identify foreign threat actors and bring them to justice.
Continue Reading

Mint Mobile, Porting Numbers, and Identity Theft

US telecommunications company Mint Mobile warned some users that their phone numbers had temporarily been ported to another carrier by an unauthorized individual, which allowed the ...
Continue Reading

The Cost and Impact of Cybercrime Can Now Be Measured in a Single Minute

With the number of threat actors growing rapidly, along with an increased frequency of attacks, RiskIQ has put together a sobering perspective of how cybercrime impacts us in just 60 ...
Continue Reading

[Eye Opener] The Biggest Bitcoin Heist Ever: A Whopping 3.6 Billion Dollars!

I'm not sure why this is not all over the press. Bloomberg picked up on this though. A pair of South African brothers have vanished, along with Bitcoin worth $3.6 billion from their ...
Continue Reading

Use of TLS to Obfuscate Malicious C2 Communications Doubles in the Last Year

With 98% of all web traffic going over HTTPS, the malicious use of TLS (transport layer security) helps the cybercriminal conceal their activity specifics while also potentially doing so ...
Continue Reading

Strange Chinese APT Interest in Buying Batches of AV Products

The Chinese military unit was recently accused of carrying out a years-long cyber espionage. The accusation from Japanese authorities was due to China's People Liberation Army buying ...
Continue Reading

Genesis Market: a Study in the C2C Economy

Researchers at Digital Shadows describe Genesis Market, a criminal-to-criminal marketplace that aggregates and sells digital fingerprints to facilitate cyberattacks. The researchers say ...
Continue Reading

FBI's Newly Release Internet Crime Report Shows Cybercrime has Ramped Up in 2020

The FBI's Internet Crime Complaint Center (IC3) released their annual report, and the number of complaints have skyrocketed in 2020.
Continue Reading

Not Your Father's Tech Support Scam

Over the past month or so customers using the Phish Alert Button (PAB) have been reporting a curious wave of what initially appeared to be run-of-the-mill tech support scam emails. As it ...
Continue Reading

Cybercrime Officially Has Its Own Global Ecosystem

From Services, to Distribution, to Monetization, cybercriminals are getting so organized, cybersecurity experts are now beginning to see how vast the relationships and connections really ...
Continue Reading

[THIS IS UGLY] A Hacker Got All My Texts for $16

VICE just revealed a 2FA hole you can drive a truck through. A gaping flaw in SMS lets hackers take over phone numbers in minutes by simply paying a company to reroute text messages. This ...
Continue Reading

The Evolving Cybercriminal Market Has Given Birth to Impersonation-as-a-Service as Attackers Seek to Impersonate at Scale

New research documents Impersonation-as-a-Service (IMPaaS) as an emerging threat where profiles of victim users are available to be used in campaigns where impersonation is critical.
Continue Reading

Microsoft Exchange Server hacks ‘doubling’ every two hours | ZDNet

Cyberattackers are taking full advantage of slow patch or mitigation processes on Microsoft Exchange Server with attack rates doubling every few hours.   According to Check Point ...
Continue Reading

Someone Hacked The Four Top Russian Cybercrime Forums In One Month

Intrepid investigative cyber security reporter Brian Krebs has some interesting news. He said: "Over the past few weeks, three of the longest running and most venerated Russian-language ...
Continue Reading

Dutch Intelligence Agencies Warn About Chinese and Russian Cyber Espionage

Chinese and Russian state hackers threaten the Dutch economy. Three Dutch intelligence agencies jointly sound the alarm about digital espionage in financial newspaper Het Financieele ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews