Remove Accountability Remove Consumer Services Remove Phishing
article thumbnail

The Original APT: Advanced Persistent Teenagers

Krebs on Security

The smash-and-grab attacks by LAPSUS$ obscure some of the group’s less public activities, which according to Microsoft include targeting individual user accounts at cryptocurrency exchanges to drain crypto holdings. The group of teenagers who hacked Twitter hailed from a community that traded in hacked social media accounts.

article thumbnail

NEW TECH: ‘Passwordless authentication’ takes us closer to eliminating passwords as the weak link

The Last Watchdog

Compromised logins continue to facilitate cyber attacks at all levels, from phishing ruses to credential stuffing to enabling hackers to probe deep inside of a breached network. The hitch, of course, is that password-enabled account logins are too deeply engrained in legacy network infrastructure.

article thumbnail

Ransomware world in 2021: who, how and why

SecureList

In most attacks there are a significant number of actors involved, and a key takeaway is that they supply services to each other through dark web marketplaces. Botmasters and account resellers are tasked with providing initial access inside the victim’s network.