#brand #logo #conference
Group-IB CEO Dmitry Volkov opens #CyberCrimeCon21!
Group-IB CEO Dmitry Volkov has for the first time inaugurated CyberCrimeCon👏 The company’s mission for the past 18 years has remained unchanged. Its simplicity contains the company’s enormous efforts in fighting cybercrime.
Dmitry, without further ado, has presented Group-IB’s brand new visual concept. Our company has been seeking to be a concise and comprehensible brand in each of the regions of its presence — this is reflected in the concise mission and the simple color spectrum that has black and white that symbolize confrontation. Another key visual belonging to the new design is a neon ray that runs through the digital and physical world just like a hero’s path that is followed by anyone who chooses fighting as their mission.
Dmitry has stressed that the main idea behind Group-IB’s image was masterminded and developed by Ilya Sachkov. “We just had to get the job done,” commented Dima. Let’s meet Group-IB’s new logo!
Group-IB CEO Dmitry Volkov opens #CyberCrimeCon21!
Group-IB CEO Dmitry Volkov has for the first time inaugurated CyberCrimeCon👏 The company’s mission for the past 18 years has remained unchanged. Its simplicity contains the company’s enormous efforts in fighting cybercrime.
Dmitry, without further ado, has presented Group-IB’s brand new visual concept. Our company has been seeking to be a concise and comprehensible brand in each of the regions of its presence — this is reflected in the concise mission and the simple color spectrum that has black and white that symbolize confrontation. Another key visual belonging to the new design is a neon ray that runs through the digital and physical world just like a hero’s path that is followed by anyone who chooses fighting as their mission.
Dmitry has stressed that the main idea behind Group-IB’s image was masterminded and developed by Ilya Sachkov. “We just had to get the job done,” commented Dima. Let’s meet Group-IB’s new logo!
#CyberCrimeCon #report #cybercrime #HTCT
Group-IB reveals Hi-Tech Crime Trends 2021/2022⚡️⚡️⚡️
Group-IB presents the 10th edition of its annual report Hi-Tech Crime Trends 21/22 on the most trending cybercrimes and forecasts for the next year. The new report comes in 5 volumes focusing on initial access brokers, ransomware, financial threats, cyberwarfare, and scam & phishing.
All five parts of the Hi-Tech Crime Trends 21/22 will be released by the end of December. If you do not want to miss out, subscribe for updates and we’ll send the notification when each report goes live -> https://bit.ly/3ofZfFs
Group-IB reveals Hi-Tech Crime Trends 2021/2022⚡️⚡️⚡️
Group-IB presents the 10th edition of its annual report Hi-Tech Crime Trends 21/22 on the most trending cybercrimes and forecasts for the next year. The new report comes in 5 volumes focusing on initial access brokers, ransomware, financial threats, cyberwarfare, and scam & phishing.
All five parts of the Hi-Tech Crime Trends 21/22 will be released by the end of December. If you do not want to miss out, subscribe for updates and we’ll send the notification when each report goes live -> https://bit.ly/3ofZfFs
#CyberCrimeCon21 #report #cybercrime #HTCT
Group-IB presents "Hi-Tech Crime Trends 2021/2022. Part I. Uninvited guests: the sale of access to corporate networks.”
❗️The sharp increase in the number of offers to sell access to compromised corporate networks has become one of the underlying trends on the cybercrime arena recently. Group-IB experts have identified several factors contributing to the rapid growth of the initial access market.
🔺One such factor was the emergence of Fxmsp, a hacker who first appeared on underground forums in 2017. Posts about selling access to corporate networks had appeared on dark-web resources back then, but they had been rare and not streamlined. Fxmsp was the first to focus on gaining initial access for the purpose of selling it.
🔺Demand creates supply. The principle also applies to the sale of initial access to compromised networks. Beginning in 2019, there was a sharp increase in the number of ransomware attacks, the first stage of which
is gaining access to a company’s network. This fueled demand for initial access and bolstered the rise of initial access markets.
🔺The third factor furthering the rise of initial access markets is the low threshold to enter the industry. The fact that tools for conducting full-fledged attacks against corporate networks are widely available means that underground actors can make money with little effort. The market for initial access has been flooded with low-skilled threat actors who, despite their poor knowledge of the technical aspects involved, pose a threat to companies.
Download link -> https://bit.ly/3pjvxPc
Group-IB presents "Hi-Tech Crime Trends 2021/2022. Part I. Uninvited guests: the sale of access to corporate networks.”
❗️The sharp increase in the number of offers to sell access to compromised corporate networks has become one of the underlying trends on the cybercrime arena recently. Group-IB experts have identified several factors contributing to the rapid growth of the initial access market.
🔺One such factor was the emergence of Fxmsp, a hacker who first appeared on underground forums in 2017. Posts about selling access to corporate networks had appeared on dark-web resources back then, but they had been rare and not streamlined. Fxmsp was the first to focus on gaining initial access for the purpose of selling it.
🔺Demand creates supply. The principle also applies to the sale of initial access to compromised networks. Beginning in 2019, there was a sharp increase in the number of ransomware attacks, the first stage of which
is gaining access to a company’s network. This fueled demand for initial access and bolstered the rise of initial access markets.
🔺The third factor furthering the rise of initial access markets is the low threshold to enter the industry. The fact that tools for conducting full-fledged attacks against corporate networks are widely available means that underground actors can make money with little effort. The market for initial access has been flooded with low-skilled threat actors who, despite their poor knowledge of the technical aspects involved, pose a threat to companies.
Download link -> https://bit.ly/3pjvxPc
Group-IB
Fxmsp: “The Invisible God of Networks” Threat Research | Group-IB Resources
The report shows how Fxmsp’s cybercriminal career evolved from a newbie hacker to one of the major players of the Russian-speaking underground.
#CyberCrimeCon21 #report #cybercrime #HTCT
The overall size of initial access market hits $7.2 mln💵
In H2 2020-H12021, the market of corporate initial access continued to flourish and grew by almost 16% from $6,189,388 to $7,165,387. Here are some other figures proving this explosive growth:
🔹The number of offers to sell access to companies almost tripled over the review period: from 362 to 1,099.
🔹The number of initial access brokers skyrocketed from 86 active brokers to 262, with 229 new players joining the roster.
🔹The number of industries exploited by initial access brokers surged from 20 to 35, which indicates that cybercriminals are becoming aware of the variety of potential victims. Most companies affected belonged to the manufacturing, education, and financial services.
🔹The number of countries where cybercriminals broke into corporate networks increased from 42 to 68. US-based companies were the most popular among sellers of access to compromised networks, followed by France and the UK.
🔹Five brokers make 35% of all the profit from access sale in the underground.
Download link -> https://bit.ly/3pjvxPc
The overall size of initial access market hits $7.2 mln💵
In H2 2020-H12021, the market of corporate initial access continued to flourish and grew by almost 16% from $6,189,388 to $7,165,387. Here are some other figures proving this explosive growth:
🔹The number of offers to sell access to companies almost tripled over the review period: from 362 to 1,099.
🔹The number of initial access brokers skyrocketed from 86 active brokers to 262, with 229 new players joining the roster.
🔹The number of industries exploited by initial access brokers surged from 20 to 35, which indicates that cybercriminals are becoming aware of the variety of potential victims. Most companies affected belonged to the manufacturing, education, and financial services.
🔹The number of countries where cybercriminals broke into corporate networks increased from 42 to 68. US-based companies were the most popular among sellers of access to compromised networks, followed by France and the UK.
🔹Five brokers make 35% of all the profit from access sale in the underground.
Download link -> https://bit.ly/3pjvxPc
Group-IB
Hi-Tech Crime Trends 2021/2022. Uninvited Guests: The Sale of Access to Corporate Networks
Analysis of dark web forums to understand the sale of access to compromised infrastructure.
#CyberCrimeCon21 #report #cybercrime #HTCT
Access brokers: regional profiles 🌎
Let's take a closer look at the situation with the sales of access to corporate networks in various regions.
🔹In APAC alone, the total cost of all the accesses to the region’s companies available in the underground totaled $3.3 million. Most of the accesses on the sale belonged to organizations from Australia, India and China.
🔹European companies were among frequent targets of access brokers as well. The total cost of all the accesses to the region’s companies offered for sale in the #underground totaled $590,095 in the review period. French companies were the most popular lot for sellers of access to compromised networks, followed by the UK and Italy.
🔹In the Middle East, the total cost of all the accesses to the region’s companies available in the underground accounted for $247,836. Most of the accesses on the sale belonged to organizations from the UAE, followed by Israel and Turkey.
Download the report for more details -> https://bit.ly/3pjvxPc
Access brokers: regional profiles 🌎
Let's take a closer look at the situation with the sales of access to corporate networks in various regions.
🔹In APAC alone, the total cost of all the accesses to the region’s companies available in the underground totaled $3.3 million. Most of the accesses on the sale belonged to organizations from Australia, India and China.
🔹European companies were among frequent targets of access brokers as well. The total cost of all the accesses to the region’s companies offered for sale in the #underground totaled $590,095 in the review period. French companies were the most popular lot for sellers of access to compromised networks, followed by the UK and Italy.
🔹In the Middle East, the total cost of all the accesses to the region’s companies available in the underground accounted for $247,836. Most of the accesses on the sale belonged to organizations from the UAE, followed by Israel and Turkey.
Download the report for more details -> https://bit.ly/3pjvxPc
Group-IB
Hi-Tech Crime Trends 2021/2022. Uninvited Guests: The Sale of Access to Corporate Networks
Analysis of dark web forums to understand the sale of access to compromised infrastructure.
This media is not supported in your browser
VIEW IN TELEGRAM
Today, at #CyberCrimeCon, Group-IB Head of Digital Forensics and Malware Analysis Lab Oleg Skulkin revealed his findings about the recent developments in the #ransomware market.
The full session's recording will soon be available at ▶️ https://cybercrimecon.com
The full session's recording will soon be available at ▶️ https://cybercrimecon.com
#report #cybercrime #HTCT #ransomware
Group-IB presents the second volume of its Hi-Tech Crime Trends 2021/2022 report “Corporansom: threat number one” ⚡️⚡️⚡️
In the first 11 months of 2021, more than 60% of all the incidents investigated by Group-IB concerned ransomware. This number is expected to grow, with the number of public affiliate programs growing by 23% in H2 2020 – H1 2021 compared to the corresponding period a year earlier.
Over the review period, RaaS gangs increased the conversion by posting compromised data online on their Data Leak Sites (DLS). It has become very popular, with the number of victims whose data has been published on DLSs having grown by 935% in H2 2020 – H1 2021.
The report represents the first attempt to provide a retrospective analysis of how the ransomware cyber empire evolved and shed light on how businesses worldwide lose millions of dollars to cybercriminals. In this report, we look into how and why the ransomware industry has developed, provide in-depth analyses of certain affiliate programs from within, and share statistics on the countries and industries that are attacked most often.
Download link -> https://bit.ly/31NMsRX
Group-IB presents the second volume of its Hi-Tech Crime Trends 2021/2022 report “Corporansom: threat number one” ⚡️⚡️⚡️
In the first 11 months of 2021, more than 60% of all the incidents investigated by Group-IB concerned ransomware. This number is expected to grow, with the number of public affiliate programs growing by 23% in H2 2020 – H1 2021 compared to the corresponding period a year earlier.
Over the review period, RaaS gangs increased the conversion by posting compromised data online on their Data Leak Sites (DLS). It has become very popular, with the number of victims whose data has been published on DLSs having grown by 935% in H2 2020 – H1 2021.
The report represents the first attempt to provide a retrospective analysis of how the ransomware cyber empire evolved and shed light on how businesses worldwide lose millions of dollars to cybercriminals. In this report, we look into how and why the ransomware industry has developed, provide in-depth analyses of certain affiliate programs from within, and share statistics on the countries and industries that are attacked most often.
Download link -> https://bit.ly/31NMsRX
Group-IB
Hi-Tech Crime Trends 2021/2022. Uninvited Guests: The Sale of Access to Corporate Networks | Group-IB
Analysis of dark web forums to understand the sale of access to compromised infrastructure.
