Wire Transfer Scam Alert, New Bug Haunts Linux, ZeroAccess Botnet and more | TWIC - January 30, 2015

Posted by Lindsey Havens

Jan 30, '15

Each week, the PhishLabs team posts The Week in Cybercrime (TWIC) to recap noteworthy cybercrime articles and reports (open source).

Read More

Topics: Malware, DDoS, The Week in Cybercrime, Data Breach

DDoS on the Rise, Spear-Phishing, Alleged Silk Road Operator Arrested and more | TWIC - January 23, 2015

Posted by Lindsey Havens

Jan 23, '15

Each week, the PhishLabs team posts The Week in Cybercrime (TWIC) to recap noteworthy cybercrime articles and reports (open source).

Read More

Topics: Phishing, Malware, DDoS, The Week in Cybercrime, Data Breach

DDoS on the rise: the AK-47 of cybercrime

Posted by Lindsey Havens

Jan 23, '15

AK-47’s have been around forever. The most popular and widely used assault rifles in the world. Not because they do anything advanced, but because they’re cheap, reliable, and are so easy to use that untrained fighters can wield them effectively. Much like the AK-47, DDoS attacks are not highly sophisticated, expensive, or the most “sexy” of cybercrime but they can be very effective. As 2014 came to a close, it was a record year for distributed-denial-of-service (DDoS) attacks, with increases in volume and sophistication level. Researchers anticipate the upwards trend of attacks will only continue in 2015, with many businesses still underprepared to fight back against an attack.

High-profile targets such as banks, ecommerce and online storefront vendors, online gaming platforms, governments and educational establishments are generally the unfortunate marks for DDoS exploitation. However, any organization that relies on the Internet to conduct business is a potential target of attack so it is critical to implement DDoS mitigation tactics and incident response plans prior to an event.
Read More

Topics: DDoS

Skeleton Key Malware, Park 'N Fly Data Breach, Crowti Ransomware and more | TWIC - January 16, 2015

Posted by Lindsey Havens

Jan 16, '15

Each week, the PhishLabs team posts The Week in Cybercrime (TWIC) to recap noteworthy cybercrime articles and reports (open source).

Read More

Topics: Phishing, Malware, DDoS, The Week in Cybercrime, Data Breach, Ransomware

CryptoWall Ransomware Defense, Bank DDoS Attack, Router Exploits and more | TWIC - January 10, 2015

Posted by Lindsey Havens

Jan 10, '15

Each week, the PhishLabs team posts The Week in Cybercrime (TWIC) to recap noteworthy cybercrime articles and reports (open source).

Read More

Topics: Malware, DDoS, The Week in Cybercrime, Android, Banking Trojan

Big data, big [illicit] business

Posted by Lindsey Havens

Jan 9, '15

True to form, cybercriminals not only stole funds, personally identifiable information, credentials, bank account information , health records and more in 2014 but they also poached legitimate business tactics and strategies to bolster illicit operations. In a recent interview with Dell SecureWorks’ David Shear, BankInfoSecurity’s, Tracy Kitten uncovers trends in the underground cybercrime market. Most notable is the growing trend of “Cybercrime-as-a-Service” or (CaaS).

In 2015, we can expect to see a continued increase in the number of underground operations offering full-service cybercrime. Just as in any marketplace, competition continues to rise in the underground resulting in the constant evolution of services and new features. Some key attributes of leading suppliers of CaaS closely resemble those of a valid business, including:

  • Superior customer service
  • Tutorials and training
  • Satisfaction guaranteed
  • Value-added data (personally identifiable information documentation such as a driver’s license or a utility bill to enable authentication)
  • Reputation for delivering quality services

Data reigns in the underground

Read More

Topics: Fraud, Account Takeover, Cybercrime-as-a-Service

Internet Systems Consortium Hacked, Malware on Steam Chat, Lizard Squad Arrests and more | TWIC - January 2, 2015

Posted by Lindsey Havens

Jan 2, '15

Each week, the PhishLabs team posts The Week in Cybercrime (TWIC) to recap noteworthy cybercrime articles and reports (open source).

Read More

Topics: The Week in Cybercrime, Android, Data Breach, POS Attacks, Banking Trojan

Top blog posts from PhishLabs: 2014 review

Posted by Lindsey Havens

Dec 30, '14

It has been an eventful year in cybercrime. We hope you have been able to follow our blog for updates in the cyber security arena but in case you missed one or two, we’ve compiled the most popular posts published by PhishLabs in 2014:

Read More

Topics: Phishing, Malware, ZeuS, Hacker Tools, Vishing, Vawtrak, Banking Trojan

New Zeus Variant, Android Malware, ATMs Hacked and more | TWIC - December 26, 2014

Posted by Lindsey Havens

Dec 26, '14

Each week, the PhishLabs team posts The Week in Cybercrime (TWIC) to recap noteworthy cybercrime articles and reports (open source).

Read More

Topics: Phishing, ZeuS, The Week in Cybercrime, Android, POS Attacks, Banking Trojan

Crimeware-as-a-Service, CryptoLocker, ICANN Spear Phishing, and more | TWIC - December 20, 2014

Posted by Lindsey Havens

Dec 20, '14

Each week, the PhishLabs team posts The Week in Cybercrime (TWIC) to recap noteworthy cybercrime articles and reports (open source).

Read More

Topics: Phishing, The Week in Cybercrime, Crimeware, Vawtrak, Banking Trojan, CryptoLocker

    

Subscribe to Email Updates