Remove Cybercrime Remove Hacking Remove Information Security Remove Penetration Testing
article thumbnail

TeamTNT cybercrime gang expands its arsenal to target thousands of orgs worldwide

Security Affairs

The financially motivated TeamTNT hacking group expanded its arsenal with new tools used to target thousands of victims worldwide. In January 2021, the cybercrime gang launched a new campaign targeting Kubernetes environments with the Hildegard malware. SecurityAffairs – hacking, TeamTNT). Pierluigi Paganini.

article thumbnail

Exposing the "Data Leaks" Paradise – An Analysis

Security Boulevard

biased exclusivity and double layer monetization combination where the attacker might only sell the database to its actual owner and actually get rid of it once they receive the payment.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Sysadmin of fake cybersecurity company sentenced to jail after billion-dollar crime spree

Hot for Security

Notorious FIN7 gang stole payment card details from retailers around the world Cybercrime gang posed as penetration testing firm to recruit hackers. FIN7 operated a front company called Combi Security, which claimed to offer penetration testing services.

article thumbnail

SHARED INTEL: How ransomware evolved from consumer trickery to deep enterprise hacks

The Last Watchdog

In many cases, the crooks hack managed service providers (MSPs) first and then use this access to compromise the partnering organizations. Forward outlook Ransomware is a dynamic and increasingly hybrid segment of cybercrime. The big names that pioneered in these targeted attacks are Sodinokibi (aka REvil) and Ryuk.

article thumbnail

Google provides rules to detect tens of cracked versions of Cobalt Strike

Security Affairs

Researchers at Google Cloud identified 34 different hacked release versions of the Cobalt Strike tool in the wild. Cobalt Strike is a paid penetration testing product that allows an attacker to deploy an agent named ‘Beacon’ on the victim machine. SecurityAffairs – hacking, cybersecurity). Pierluigi Paganini.

article thumbnail

Malware exploits undocumented Google OAuth endpoint to regenerate Google cookies

Security Affairs

hw/iPhone9_4 (gzip)) suggests that a penetration test on Google Drive’s services on Apple devices was a potential origin for the exploit. The exploit’s imperfect testing led to revealing its source.” iPhone/15.7.4 ” concludes the report.

Malware 129
article thumbnail

CISA MAR report provides technical details of FiveHands Ransomware

Security Affairs

Cybersecurity and Infrastructure Security Agency (CISA) has published an analysis of the FiveHands ransomware that was recently detailed by FireEye’s Mandiant. UNC2447 extortion activity employed the FIVEHANDS ransomware, the threat actors aggressively threatened victims to disclose their hack on the media to sell the data on hacker forums.