Lull on the carding market๐
๐นThe review period saw a drastic decrease in the number of bank cards put up for sale. One of the key reasons for this decline was the closure of notorious card shop Jokerโs Stash, which used to account for 40% of the global carding market.
๐นIn addition to Jokerโs Stash, more than 10 smaller card shops shut down in 2021. That said, the share of #bank cards put up for sale by other card shops remained the same. This trend has been observed in all the regions.
๐นOn the other hand, the number of textual card data offers increased
from 28 to 38 million due to the growth in the number of #phishing resources during the pandemic, among other things.
Detailed region profiles are provided below โฌ๏ธ
๐นThe review period saw a drastic decrease in the number of bank cards put up for sale. One of the key reasons for this decline was the closure of notorious card shop Jokerโs Stash, which used to account for 40% of the global carding market.
๐นIn addition to Jokerโs Stash, more than 10 smaller card shops shut down in 2021. That said, the share of #bank cards put up for sale by other card shops remained the same. This trend has been observed in all the regions.
๐นOn the other hand, the number of textual card data offers increased
from 28 to 38 million due to the growth in the number of #phishing resources during the pandemic, among other things.
Detailed region profiles are provided below โฌ๏ธ
Phishing and scam affiliate programs are trending
๐นAnother remarkable threat targeting the financial sector in H2 2020 - H1 2021 were phishing and scam affiliate programs. Group-IB experts estimate that there currently are more than 70 such programs, with their joint profit amounting to at least $10 million. On average, the amount stolen by any single threat
actor is estimated at $83.
๐นOver 70 brands from 36 countries worldwide are being exploited by the members of phishing and scam affiliate programs. The majority of brands affected were marketplaces, delivery services, carpooling services, and banking services.
More details are available in our report -> https://bit.ly/3dLL2tJ
๐นAnother remarkable threat targeting the financial sector in H2 2020 - H1 2021 were phishing and scam affiliate programs. Group-IB experts estimate that there currently are more than 70 such programs, with their joint profit amounting to at least $10 million. On average, the amount stolen by any single threat
actor is estimated at $83.
๐นOver 70 brands from 36 countries worldwide are being exploited by the members of phishing and scam affiliate programs. The majority of brands affected were marketplaces, delivery services, carpooling services, and banking services.
More details are available in our report -> https://bit.ly/3dLL2tJ
#report #cybercrime #HTCT #APT
Group-IB presents the fourth volume of its Hi-Tech Crime Trends 2021/2022 report โCyberwarfare: state-sponsored operations in cyberspaceโ โก๏ธโก๏ธโก๏ธ
โ ๏ธConcerns over nation-state attackers grow every year. Group-IBโs previous Hi-Tech Crime Trends reports have detailed how long-term espionage campaigns run by intelligence agencies occurred alongside episodes of open interstate military confrontation, which in some cases resulted in infrastructure being physically destroyed.
๐ฏThe H2 2020 - H1 2021 period has shown that state-sponsored hacker groups can launch large-scale attacks to which even the most high-level targets are vulnerable. We all remember how by hacking into the US software developer SolarWinds, cybercriminals compromised cybersecurity market leaders, as well as several US government agencies.
๐ธRecently, state-backed attackers became less isolated from the rest of the cybercriminal world. More and more often, they use publicly available tools and resort to underground services. They do not shy away from buying initial access from other attackers or exchange malicious tools with them. Group-IBโs hypothesis that the boundaries between nation-state and financially-motivated attackers are beginning to fade is confirmed by the fact that more state-sponsored hackers are trying their luck in new fields to increase their profits.
In our fresh report, available exclusively to Group-IB Threat Intelligence & Attribution customers, we:
๐ธexamine new players who have appeared on the map of interstate confrontation in cyberspace;
๐ธdescribe their most significant operations;
๐ธanalyze their tools;
๐ธprovide a list of threats to companies in the telecommunications, energy, and IT sectors;
๐ธtell about how state-sponsored hackers make extra money;
๐ธand of course provide forecasts on the evolving threat landscape for various
sectors.
Fortunately, you can get access to the report by requesting the demo of Group-IB's Threat Intelligence & Attribution system that provides high-fidelity threat intelligence data tailored to your specific organization -> https://bit.ly/3sbd6PU
Group-IB presents the fourth volume of its Hi-Tech Crime Trends 2021/2022 report โCyberwarfare: state-sponsored operations in cyberspaceโ โก๏ธโก๏ธโก๏ธ
โ ๏ธConcerns over nation-state attackers grow every year. Group-IBโs previous Hi-Tech Crime Trends reports have detailed how long-term espionage campaigns run by intelligence agencies occurred alongside episodes of open interstate military confrontation, which in some cases resulted in infrastructure being physically destroyed.
๐ฏThe H2 2020 - H1 2021 period has shown that state-sponsored hacker groups can launch large-scale attacks to which even the most high-level targets are vulnerable. We all remember how by hacking into the US software developer SolarWinds, cybercriminals compromised cybersecurity market leaders, as well as several US government agencies.
๐ธRecently, state-backed attackers became less isolated from the rest of the cybercriminal world. More and more often, they use publicly available tools and resort to underground services. They do not shy away from buying initial access from other attackers or exchange malicious tools with them. Group-IBโs hypothesis that the boundaries between nation-state and financially-motivated attackers are beginning to fade is confirmed by the fact that more state-sponsored hackers are trying their luck in new fields to increase their profits.
In our fresh report, available exclusively to Group-IB Threat Intelligence & Attribution customers, we:
๐ธexamine new players who have appeared on the map of interstate confrontation in cyberspace;
๐ธdescribe their most significant operations;
๐ธanalyze their tools;
๐ธprovide a list of threats to companies in the telecommunications, energy, and IT sectors;
๐ธtell about how state-sponsored hackers make extra money;
๐ธand of course provide forecasts on the evolving threat landscape for various
sectors.
Fortunately, you can get access to the report by requesting the demo of Group-IB's Threat Intelligence & Attribution system that provides high-fidelity threat intelligence data tailored to your specific organization -> https://bit.ly/3sbd6PU
#report #cybercrime #HTCT #APT
๐We would like to shed some light on the content of our new report and reveal some of its highlights:
๐ธDuring the reporting period, 11 new APT groups specializing in cyber espionage were discovered. Two of them โ Dark Halo and HAFNIUM โ conducted the most large-scale operations, competing with each other for the highest number of infected companies.
๐ธThe largest number of active APT groups was detected in the Asia-Pacific region, just like in the previous review period.
๐ธOne of the trends observed in the reporting period was APT groups using rootkits and vulnerabilities to compromise BIOS/UEFI and subsequently gain control over a system.
๐ธThe development of 5G technologies triggered the intensification of espionage campaigns, presumably aimed at competing for new markets in Southeast Asia, Europe, and the United States.
๐ธThe number of attacks on IT companies is growing year after year. In most cases, IT companies are a springboard for supply-chain attacks aimed to compromise customers further.
More findings are in our report, which can be accessed by requesting Group-IB Threat Intelligence & Attribution demo -> https://bit.ly/3sbd6PU
๐We would like to shed some light on the content of our new report and reveal some of its highlights:
๐ธDuring the reporting period, 11 new APT groups specializing in cyber espionage were discovered. Two of them โ Dark Halo and HAFNIUM โ conducted the most large-scale operations, competing with each other for the highest number of infected companies.
๐ธThe largest number of active APT groups was detected in the Asia-Pacific region, just like in the previous review period.
๐ธOne of the trends observed in the reporting period was APT groups using rootkits and vulnerabilities to compromise BIOS/UEFI and subsequently gain control over a system.
๐ธThe development of 5G technologies triggered the intensification of espionage campaigns, presumably aimed at competing for new markets in Southeast Asia, Europe, and the United States.
๐ธThe number of attacks on IT companies is growing year after year. In most cases, IT companies are a springboard for supply-chain attacks aimed to compromise customers further.
More findings are in our report, which can be accessed by requesting Group-IB Threat Intelligence & Attribution demo -> https://bit.ly/3sbd6PU
#report #cybercrime #HTCT #scam #phishing
Group-IB presents the fifth volume of its Hi-Tech Crime Trends 2021/2022 report โScams and Phishing: The epidemic of online fraudโ โก๏ธโก๏ธโก๏ธ
๐We finally release the concluding part of our 5-volume Hi-Tech Crime Trends 2021/2022 report โ โScams and Phishing: The epidemic of online fraud.โ In this paper, Group-IBโs CERT-GIB and Digital Risk Protection analysts analyze major scam campaigns, instruments used and threat actorsโ infrastructure.
โ๏ธThe COVID-19 pandemic was the main reason for the explosive growth of online scams. According to Group-IBโs data, fraud accounted for 74.5% of all online crimes in the first half of 2021. More than half (57%) of all cybercrimes were scams (a type of fraud in which victims voluntarily make payments or disclose their data), while phishing (theft of bank card data) accounted for just 17.5%.
๐Here are some other highlights and trends from our fresh report:
๐น Group-IB specialists helped block more than 14,000 phishing resources hosted
on some 12,000 unique domains. About 20% of phishing websites were hosted on compromised legitimate resources.
๐น Classiscam became one of the largest, longest, and most technically advanced hybrid scam campaigns in the world. As at the end of 2021, 70 active affiliate programs use this scheme, targeting more than 80 international brands from 36 countries.
๐นAn increase in phishing targeting online services (16%) and social media (8%) has been recorded.
๐นThe popularity of the scam-as-a-service model has led to scams scaling up on a global level and to a lower entry threshold for newbie-scammers with no real skills for conducting scams.
โ More trends and forecasts for the development of online fraud are in our fresh report โ> https://bit.ly/3GXLtOb
Group-IB presents the fifth volume of its Hi-Tech Crime Trends 2021/2022 report โScams and Phishing: The epidemic of online fraudโ โก๏ธโก๏ธโก๏ธ
๐We finally release the concluding part of our 5-volume Hi-Tech Crime Trends 2021/2022 report โ โScams and Phishing: The epidemic of online fraud.โ In this paper, Group-IBโs CERT-GIB and Digital Risk Protection analysts analyze major scam campaigns, instruments used and threat actorsโ infrastructure.
โ๏ธThe COVID-19 pandemic was the main reason for the explosive growth of online scams. According to Group-IBโs data, fraud accounted for 74.5% of all online crimes in the first half of 2021. More than half (57%) of all cybercrimes were scams (a type of fraud in which victims voluntarily make payments or disclose their data), while phishing (theft of bank card data) accounted for just 17.5%.
๐Here are some other highlights and trends from our fresh report:
๐น Group-IB specialists helped block more than 14,000 phishing resources hosted
on some 12,000 unique domains. About 20% of phishing websites were hosted on compromised legitimate resources.
๐น Classiscam became one of the largest, longest, and most technically advanced hybrid scam campaigns in the world. As at the end of 2021, 70 active affiliate programs use this scheme, targeting more than 80 international brands from 36 countries.
๐นAn increase in phishing targeting online services (16%) and social media (8%) has been recorded.
๐นThe popularity of the scam-as-a-service model has led to scams scaling up on a global level and to a lower entry threshold for newbie-scammers with no real skills for conducting scams.
โ More trends and forecasts for the development of online fraud are in our fresh report โ> https://bit.ly/3GXLtOb
Group-IB
Hi-Tech Crime Trends 2021/2022. Uninvited Guests: The Sale of Access to Corporate Networks | Group-IB
Analysis of dark web forums to understand the sale of access to compromised infrastructure.
#scam #fraud #DRP #phishing
Group-IB uncovers an ongoing worldwide scam campaign targeting users in over 90 countries worldwideโ ๏ธ
Group-B Digital Risk Protection (DRP) team has revealed an ongoing scam campaign targeting users in over 90 countries all around the world, including the United States, Canada, South Korea, and Italy. The fraudsters employ the tried and tested technique with fake surveys and giveaways purporting to be from popular brands to steal usersโ personal and payment data, with the total number of big-name companies impersonated in the scheme exceeding 120.
The potential victim pool of a single scam network is estimated at about 10 million people, while the potential damage totaled about $80 million per month, according to Group-IBโs Digital Risk Protection unit.
More details -> https://bit.ly/3e9MCpw
Group-IB uncovers an ongoing worldwide scam campaign targeting users in over 90 countries worldwideโ ๏ธ
Group-B Digital Risk Protection (DRP) team has revealed an ongoing scam campaign targeting users in over 90 countries all around the world, including the United States, Canada, South Korea, and Italy. The fraudsters employ the tried and tested technique with fake surveys and giveaways purporting to be from popular brands to steal usersโ personal and payment data, with the total number of big-name companies impersonated in the scheme exceeding 120.
The potential victim pool of a single scam network is estimated at about 10 million people, while the potential damage totaled about $80 million per month, according to Group-IBโs Digital Risk Protection unit.
More details -> https://bit.ly/3e9MCpw
#scam #fraud #DRP #phishing
According to Group-IB's DRP analysts, this type of fraud has been spotted in 91 countries, with cybercriminals exploiting at least 121 brands as bait. The analysis of the serverโs infrastructure that hosted scam websites indicates that the scamโs target regions are Europe (36.3%), Africa (24.2%), and Asia (23.1%).
The new wave of the scam is particularly persistent thanks to an innovation in the scammersโ toolset โ targeted links, which makes investigating and tackling such attacks increasingly challenging. More about the targeted link structure and the scam mechanics in a fresh blog post by Group-IB's #DRP analysts -> https://bit.ly/3mmKD5G
According to Group-IB's DRP analysts, this type of fraud has been spotted in 91 countries, with cybercriminals exploiting at least 121 brands as bait. The analysis of the serverโs infrastructure that hosted scam websites indicates that the scamโs target regions are Europe (36.3%), Africa (24.2%), and Asia (23.1%).
The new wave of the scam is particularly persistent thanks to an innovation in the scammersโ toolset โ targeted links, which makes investigating and tackling such attacks increasingly challenging. More about the targeted link structure and the scam mechanics in a fresh blog post by Group-IB's #DRP analysts -> https://bit.ly/3mmKD5G
#ransomware #RaaS #cybercrime
Did you know that the history of ransomware attacks covers slightly over 30 years? ๐
๐The first prototype of what we today know as ransomware appeared as early as in 1989. Many concepts that we currently perceive as indispensable attributes of ransomware โ exorbitant ransoms, Ransomware-as-a-Service (RaaS) programs, and data leak sites (DLS) โ were yet to come.
๐In a fresh byline for HelpNetSecurity, Group-IB Head of Cybercrime Research Dmitry Shestakov gives an overview of how Ransomware-as-a-Service developed, highlights the tipping points in the contemporary history of ransomware, and identifies the main factors of this market's explosive growth.
Check it out -> https://www.helpnetsecurity.com/2021/12/22/ransomware-empire/
Did you know that the history of ransomware attacks covers slightly over 30 years? ๐
๐The first prototype of what we today know as ransomware appeared as early as in 1989. Many concepts that we currently perceive as indispensable attributes of ransomware โ exorbitant ransoms, Ransomware-as-a-Service (RaaS) programs, and data leak sites (DLS) โ were yet to come.
๐In a fresh byline for HelpNetSecurity, Group-IB Head of Cybercrime Research Dmitry Shestakov gives an overview of how Ransomware-as-a-Service developed, highlights the tipping points in the contemporary history of ransomware, and identifies the main factors of this market's explosive growth.
Check it out -> https://www.helpnetsecurity.com/2021/12/22/ransomware-empire/
This media is not supported in your browser
VIEW IN TELEGRAM
#conference #CyberCrimeCon21 #cybersecurity #APT #vulnerability
It's the time we've all been waiting for๐ฅ๐ฅ๐ฅ
The video recordings of CyberCrimeCon21 conference are now available on the event's website. This your chance to catch up on the sessions you might have missed:
๐ธ Keynote address by Group-IB CEO Dmitry Volkov;
๐ธ Session, during which you will learn who might be selling access to your company;
๐ธTale of the rise and fall of The Fraud Family;
๐ธ Report about the Number 1 cyber threat โ ransomware;
๐ธ Story about APT41โs 2021 world tour;
๐ธ Review of APTs' espionage campaigns in APAC
... And even more presentations by speakers from INTERPOL, Europol, SentinelOne, CyberSOC Africa, IstroSec, Positive Technologies, VNPT Cyber Immunity, and Computest
Check it out and enjoy the show -> https://cybercrimecon.com
It's the time we've all been waiting for๐ฅ๐ฅ๐ฅ
The video recordings of CyberCrimeCon21 conference are now available on the event's website. This your chance to catch up on the sessions you might have missed:
๐ธ Keynote address by Group-IB CEO Dmitry Volkov;
๐ธ Session, during which you will learn who might be selling access to your company;
๐ธTale of the rise and fall of The Fraud Family;
๐ธ Report about the Number 1 cyber threat โ ransomware;
๐ธ Story about APT41โs 2021 world tour;
๐ธ Review of APTs' espionage campaigns in APAC
... And even more presentations by speakers from INTERPOL, Europol, SentinelOne, CyberSOC Africa, IstroSec, Positive Technologies, VNPT Cyber Immunity, and Computest
Check it out and enjoy the show -> https://cybercrimecon.com
#ThreatIntelligence #MITRE
How to make the most of threat intelligence with MITRE ATT&CKยฎ?
The MITRE ATT&CKยฎ framework became the industry standard to describe attack tactics and techniques. It's used by SOC analysts, DFIR experts, Red teams, threat hunters, threat intelligence analysts, because it provides quick answers about how different threats operate and how security teams can detect and stop them. The matrix gives teams a concise overview, as well as the ability to deep dive should they still need thorough threat intelligence.
We use this framework within Group-IB's Threat Intelligence & Attribution system in three different scenarios:
๐ To describe activity of the threat actor
๐ To describe techniques relevant to the particular malware family
๐ As a separate tool for security experts
Read our latest blog post to learn how Group-IBโs customers benefit from mapping capabilities within Threat Intelligence & Attribution system.
โก๏ธ https://bit.ly/3qeRj7i
How to make the most of threat intelligence with MITRE ATT&CKยฎ?
The MITRE ATT&CKยฎ framework became the industry standard to describe attack tactics and techniques. It's used by SOC analysts, DFIR experts, Red teams, threat hunters, threat intelligence analysts, because it provides quick answers about how different threats operate and how security teams can detect and stop them. The matrix gives teams a concise overview, as well as the ability to deep dive should they still need thorough threat intelligence.
We use this framework within Group-IB's Threat Intelligence & Attribution system in three different scenarios:
๐ To describe activity of the threat actor
๐ To describe techniques relevant to the particular malware family
๐ As a separate tool for security experts
Read our latest blog post to learn how Group-IBโs customers benefit from mapping capabilities within Threat Intelligence & Attribution system.
โก๏ธ https://bit.ly/3qeRj7i