article thumbnail

Red Team vs Blue Team vs Purple Team: Differences Explained

eSecurity Planet

Blue teams consist of security analysts, network engineers and system administrators. A red team’s activity can extend beyond cybersecurity attacks and vulnerability scanning to include phishing , social engineering , and physical compromise campaigns lasting weeks or more.

article thumbnail

FIN7 sysadmin behind “billions in damage” gets 10 years

Malwarebytes

Hladyr is the systems administrator for the FIN7 hacking group, and is considered the mastermind behind the Carbanak campaign , a series of cyberattacks said to stolen as much as $900 million from banks in early part of the last decade. The campaigns all started with spear-phishing targeted at bank employees.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Fake Company Sheds Light on Ransomware Group Tactics

eSecurity Planet

The goal was to make the victims run illegal penetration tests and ransomware attacks unwittingly. They’re known for their credit card malware and phishing campaigns. The group published detailed offers on popular job boards and conducted multiple job interviews. It goes by many names, such as JokerStash, Navigator, or Carbanak.

article thumbnail

Three members of FIN7 (Carbanak) gang charged with stealing 15 million credit cards

Security Affairs

Hladyr is suspected to be a system administrator for the group. According to the European authorities, FIN7 developed sophisticated banking trojan tracked as Cobalt , based on the Cobalt Strike penetration testing tool, that was spread through spear-phishing campaigns aimed at employees at different banks.

Banking 44
article thumbnail

Russian-speaking cybercrime evolution: What changed from 2016 to 2021

SecureList

This way, with attackers switching to distributing malicious files via phishing emails, it has become more difficult to track the version of the user’s software, or how far the attack went. To make matters worse, with the development of penetration-testing tools and services, the dark market saw the rise of new malicious tools.

article thumbnail

Cyber Security Awareness and Risk Management

Spinone

Social engineering attacks , including phishing, spam, and viruses introduced via clickable links within e-mail affected 80% of the banking institutions in 2016. VoIP phishing and impersonation also victimized millions of corporate employees across the world , contributing to an even greater cyber threat.

article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Longtime network and system administrator Jack Daniel is a technology community activist, mentor, and storyteller. Through tenures at Citrix, HP, and Bugcrowd, Jason Haddix offers his expertise in the areas of penetration testing , web application testing, static analysis, and more. Denial-of-Suez attack.