Remove 2019 Remove Cybercrime Remove Information Security Remove System Administration
article thumbnail

Meet the Administrators of the RSOCKS Proxy Botnet

Krebs on Security

.” The DOJ’s statement doesn’t mention that RSOCKS has been in operation since 2014, when access to the web store for the botnet was first advertised on multiple Russian-language cybercrime forums. A copy of the passport for Denis Kloster, as posted to his Vkontakte page in 2019. info , allproxy[.]info

article thumbnail

A member of the FIN7 group was sentenced to 10 years in prison

Security Affairs

The Ukrainian national Fedir Hladyr (35), aka “das” or “AronaXus,” was sentenced to 10 years in prison for having served as a manager and systems administrator for the financially motivated group FIN7 , aka Carbanak. companies, predominantly in the restaurant, gambling, and hospitality industries.” ” concludes DoJ.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Caketap, a new Unix rootkit used to siphon ATM banking data

Security Affairs

Mandiant researchers discovered a new Unix rootkit named Caketap, which is used to steal ATM banking data, while investigating the activity of the LightBasin cybercrime group (aka UNC1945 ). CrowdStrike researchers reported that at least 13 telecommunication companies were compromised by the group since 2019.

Banking 133
article thumbnail

Dissecting the malicious arsenal of the Makop ransomware gang

Security Affairs

The Makop criminals were recently using version 2.5.3869 of the tool, which dates back to 2019. In fact, Makop criminals are still using tools built back in 2019 and 2020 to compromise small and medium enterprises around the world. Advanced_Port_Scanner_2.5.3869.exe Everything is freeware software maintained by Voidtools.

article thumbnail

Exclusive: Lighting the Exfiltration Infrastructure of a LockBit Affiliate (and more)

Security Affairs

Our investigation revealed that this remote endpoint is associated with criminal activities dating back to 2019, indicating that these hosts were likely under the control of the same technical administration. For instance: In September 2019, Cybereason found this hostname in old LockBit 2.0

Scams 128
article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Here are the top Twitter accounts to follow for the latest commentary, research, and much-needed humor in the ever-evolving information security space. lazydocker : A simple terminal UI for both docker and docker-compose : [link] pic.twitter.com/HsK17rzg8m — Binni Shah (@binitamshah) July 1, 2019. Denial-of-Suez attack.

article thumbnail

Updates from the MaaS: new threats delivered through NullMixer

Security Affairs

The Originating Malvertising Campaign According to CTI investigation on the adversary infrastructure, we were able to identify an ongoing campaign luring system administrators to install the malicious code into their machines.

Malware 89