Remove Cryptocurrency Remove Manufacturing Remove Phishing
article thumbnail

Authorities released free decryptor for Phobos and 8base ransomware

Security Affairs

Threat actors behind Phobos attacks were observed gaining initial access to vulnerable networks by leveraging phishing campaigns. The group has been active since March 2022, it focused on small and medium-sized businesses in multiple industries, including finance, manufacturing, business services, and IT. In February 2025, the U.S.

article thumbnail

Medusa ransomware hit over 300 critical infrastructure organizations until February 2025

Security Affairs

As of February 2025, Medusa developers and affiliates have impacted over 300 victims from a variety of critical infrastructure sectors with affected industries including medical, education, legal, insurance, technology, and manufacturing.” Victims can additionally pay $10,000 USD in cryptocurrency to add a day to the countdown timer.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top Cybersecurity Trends to Watch Out For in 2025

Centraleyes

We are seeing increased use of AI to automate attacks, including malware generation and phishing campaigns. Cyber-Physical System (CPS) Security As manufacturing, healthcare, and transportation industries become more digitized, the integration of cyber-physical systemslike smart grids, industrial control systems, and IoT devicesis growing.

article thumbnail

Cybercrime Soars: FBI's 2024 Report Reveals $16.6 Billion in Losses

SecureWorld News

Top cybercrime categories: Phishing/spoofing: 193,407 complaints Extortion: 86,415 complaints Personal data breaches: 64,882 complaints Cryptocurrency-related scams: Nearly 150,000 complaints involved cryptocurrency, accounting for $9.3 The IC3 received 859,532 complaints, with an average loss of $19,372 per complaint.

article thumbnail

Verizon's 2025 DBIR: Threats Are Faster, Smarter, and More Personal

SecureWorld News

As the report starkly states: "The three primary ways in which attackers access an organization are stolen credentials, phishing and exploitation of vulnerabilitiesacross every single industry." Phishing accounted for nearly 25% of all breaches. Threat actors aren't brute-forcing their way inthey're logging in through the front door.

article thumbnail

IT threat evolution Q3 2024

SecureList

The campaign, which we dubbed EastWind , used phishing emails with malicious shortcuts attached to deliver malware to target computers. The attack starts with phishing emails purporting to be a court order or summons from an institution in Colombia’s judicial system.

article thumbnail

Triada strikes back

SecureList

Specifically, they can modify cryptocurrency wallet addresses during transfer attempts, replace links in browsers, send arbitrary text messages and intercept replies, and steal login credentials for messaging and social media apps. The downloaded payload attempts to steal the victim’s cryptocurrency using various methods.