#cybersecuritytips #breaches
The consequences of data breaches might be devastating for companies. This #CybersecurityAwarenessMonth we want to share with you some recommendations on how to prevent data leakages. Check them out!
The consequences of data breaches might be devastating for companies. This #CybersecurityAwarenessMonth we want to share with you some recommendations on how to prevent data leakages. Check them out!
๐ฅ8
#report #OPERA1ER
๐ธ OPERA1ER knocking on your door. The prolific French-speaking threat actor, codenamed OPERA1ER (aka Common Raven and DESKTOP-group) managed to carry out more than 30 successful attacks against banks, financial services, and telecommunication companies mainly located in Africa between 2018 and 2022. Many of the victims identified were successfully hit twice, and their infrastructure was then used to attack other organizations.
In collaboration with the researchers from Orange CERT Coordination Center, Group-IB is releasing a new report "OPERA1ER. Playing God without permission".
๐OPERA1ER traces its roots back to 2016. Between 2018 and 2022, the gang managed to steal at least $11 million, and the actual amount of damage could be as high as $30 million.
๐OPERA1ER has been seen targeting companies across in 15 countries: Ivory Coast, Mali, Burkina Faso, Benin, Cameroon, Bangladesh, Gabon, Niger, Nigeria, Paraguay, Senegal, Sierra Leone, Uganda, Togo, Argentina. Africa clearly remains their priority.
๐One of OPERA1ERโs attacks involved a vast network of 400 mule accounts for fraudulent money withdrawals.
Download Group-IB's new report "OPERA1ER. Playing God without permission" to get detailed information about the tactics, techniques, and procedures (TTPs), tools and kill chain of this gang.
๐ธ OPERA1ER knocking on your door. The prolific French-speaking threat actor, codenamed OPERA1ER (aka Common Raven and DESKTOP-group) managed to carry out more than 30 successful attacks against banks, financial services, and telecommunication companies mainly located in Africa between 2018 and 2022. Many of the victims identified were successfully hit twice, and their infrastructure was then used to attack other organizations.
In collaboration with the researchers from Orange CERT Coordination Center, Group-IB is releasing a new report "OPERA1ER. Playing God without permission".
๐OPERA1ER traces its roots back to 2016. Between 2018 and 2022, the gang managed to steal at least $11 million, and the actual amount of damage could be as high as $30 million.
๐OPERA1ER has been seen targeting companies across in 15 countries: Ivory Coast, Mali, Burkina Faso, Benin, Cameroon, Bangladesh, Gabon, Niger, Nigeria, Paraguay, Senegal, Sierra Leone, Uganda, Togo, Argentina. Africa clearly remains their priority.
๐One of OPERA1ERโs attacks involved a vast network of 400 mule accounts for fraudulent money withdrawals.
Download Group-IB's new report "OPERA1ER. Playing God without permission" to get detailed information about the tactics, techniques, and procedures (TTPs), tools and kill chain of this gang.
๐ฅ10
Group-IB
#report #OPERA1ER ๐ธ OPERA1ER knocking on your door. The prolific French-speaking threat actor, codenamed OPERA1ER (aka Common Raven and DESKTOP-group) managed to carry out more than 30 successful attacks against banks, financial services, and telecommunicationโฆ
#blog #OPERA1ER
Threat actors are constantly developing new TTPs and in August 2022, with the help of Przemyslaw Skowron, Group-IB identified some new servers used by OPERA1ER. The latest IOCs and OPERA1ERโs targets can be found in this blog post๐
Threat actors are constantly developing new TTPs and in August 2022, with the help of Przemyslaw Skowron, Group-IB identified some new servers used by OPERA1ER. The latest IOCs and OPERA1ERโs targets can be found in this blog post๐
๐5
#fraud #conference
Letโs stamp out digital fraud together!
Group-IB teamed up in late October with its partner Versos to host the first ever Fraud Day โ Saudi Arabia in Riyadh! The event, organized in collaboration with the Saudi Banking Committee for Information Security (BCIS), brought together thought leaders and representatives from leading Saudi Arabian, Middle Eastern, and global financial institutions to discuss best practices to combat the growing threat of digital fraud.
More details๐
Letโs stamp out digital fraud together!
Group-IB teamed up in late October with its partner Versos to host the first ever Fraud Day โ Saudi Arabia in Riyadh! The event, organized in collaboration with the Saudi Banking Committee for Information Security (BCIS), brought together thought leaders and representatives from leading Saudi Arabian, Middle Eastern, and global financial institutions to discuss best practices to combat the growing threat of digital fraud.
More details๐
๐ฅ12