Security Awareness Training Blog

Cybercrime Blog

We report on the latest trends in cybercrime to help you stay informed and aware of what the current threat landscape looks like.

Banking Still a Major Target of Cybercrime

1950’s bank robber Willie Sutton was once—erroneously—quoted as saying “I rob banks because that’s where the money is.” Sutton never said it, a reporter made up the quote. However, cyber ...
Continue Reading

Leader of Carbanak Cybercrime Group Who Stole Over 1Billion Arrested in Spain [InfoGraphic]

March 26, 2018 -- Some good news for a change! Police in Spain have arrested an individual identified as Denis K. who is believed to be the mastermind behind the Carbanak (also known as ...
Continue Reading

Chinese Cybercrime Develops Lucrative Hacking Services

The McAfee blog gave an interesting perspective on an area we do not look at too closely normally.  Underground cybercrime profits in China have likely already exceeded US$15.1 billion ...
Continue Reading

Lower Cybercrime Costs! Attack Humans...

This could be a headline on a dark web site for cyber criminals. And it would be correct. Our colleagues at Wombat did some digging and came up with relevant research you should know ...
Continue Reading

The Hackers Smell Blood Now, Not Silicon

Steve Morgan wrote an excellent post with the Top 5 cybersecurity facts, figures and statistics for 2017 at the CSO site. These predictions and observations provide a 30,000-foot view of ...
Continue Reading

Two New Cybercrime-as-a-Service Platforms Discovered

There is a rising trend of cybercrime sites for wannabe "crims" that make malicious hacking a point-and-click exercise. A new report describes two more sites that were discovered by ...
Continue Reading

Vladimir Putin Approves Of Patriotic Russian Hackers

The WSJ just posted a very interesting article by Nathan Hodge confirming what we have been saying here for the last few years. Russian President Vladimir Putin suggested in St Petersburg ...
Continue Reading

Shadow Brokers Offer New SaaS 0-Day Threat Subscription Model

  The mysterious Shadow Brokers – the hackers who leaked the NSA SMB zero-day exploit that powered WanaCry into the world's worst ransomworm – are back, and could cause even more damage. ...
Continue Reading

NIST Releases Update to Cybersecurity Framework

The National Institute of Standards and Technology (NIST) has issued a draft update (PDF) to the Framework for Improving Critical Infrastructure Cybersecurity—also known as the ...
Continue Reading

Chinese Hackers Use Fake Cellphone Tower to Spread Android Banking Trojan

Check Point Software blogged about Chinese hackers who have taken smishing to the next level, using a rogue cell phone tower to distribute Android banking malware via spoofed SMS messages.
Continue Reading

Does DoubleAgent Turn Antivirus Into Malware? We Are Calling BS On That.

It was all over the press. Initially reported by Bleepingcomputer and picked up by sites like Endgadget, they all went gaga over a new technique that allows the bad guys to take over your ...
Continue Reading

Mandiant M-Trends 2017: "Cybercrime Skills Now On Par With Nation States"

There was some good news reported in Mandiant's M-Trends 2017 report, but this was heavily outweighed by a lot of very bad news. Mandiant, which is a Fireye company, found that in 2016 ...
Continue Reading

Former NSA Director Michael Hayden: "We have a Russia Problem"

I have been saying this here for the last few years, but if you get it confirmed by a former NSA director, that's nice to hear. The Wall Street Journal just reported that President Barack ...
Continue Reading

Russian Central Bank Loses 2 Billion Rubles in Cyberheist

Reuters reported that hackers stole more than 2 billion rubles ($31 million) from correspondent accounts at the Russian central bank, the bank said on Friday.  “We can’t say exactly when, ...
Continue Reading

The Top Five Names In Cybersecurity

Looking for the top names in cybersecurity? Look no further than the Cybersecurity 500 list of the world’s hottest and most innovative cybersecurity companies: ...
Continue Reading

10 Ways To Avoid Holiday Scams

With the biggest cybercriminal hacking holidays of the year upon us, it's time for a reminder of red flags to pay attention to when shopping either online or in brick-and-mortar stores. 
Continue Reading

New Version of iSpy Trojan Steals Your Software Licenses

Earlier this year we posted about Jsocket, a highly malicious Trojan that we spotted being delivered through phishing emails shared with us via the Phish Alert Button (PAB).   Although ...
Continue Reading

Coming Soon to an Inbox Near You: A New Type Of Tech Support Scam

By Eric Howes,  KnowBe4 Principal Lab Researcher. Yesterday we spotted an unusual phishing email that we'd like to share with readers. If nothing else, it tells us that the increased ...
Continue Reading

Cyber Attack Maps...Accurate Or Just Eye Candy?

Here are the top 5 Cyber Attack Maps found in Google. They all seem to show the cyber attacks in a slightly different perspective. This is the Norse attack map as an example:
Continue Reading

14 Ways A Cyberheist Hits Your Bottom Line: Total Cost Of A Hack

What is the true cost of a data breach? After analyzing a health plan breach, research firm Deloitte says the toll of a cyberheist is significantly underestimated. The firm in a report ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews