Group-IB
2.19K subscribers
739 photos
26 videos
2 files
525 links
Your daily source of cybersecurity news brought to you by Group-IB, one of the global industry leaders.
Download Telegram
As threat activity across cyberspace surges, waiting to react until a threat becomes a full-blown crisis is far from ideal.

But the real question is: how do you defend against the threats you haven’t even seen yet?

Just because a threat isn’t visible doesn’t mean it sure isn’t there. This is where proactive threat hunting becomes essential.

Curious about what threat hunting involves? Want to learn how to equip your teams to uncover hidden threats—even the ones you don’t yet know about?

🚀 Our latest blog has all the answers

#Cybersecurity #RiskManagement #ThreatHunting #FightAgainstCybercrime
🔥6👍3
In an ideal world, standard security technology and oversight would fend off every cyber threat.

But in today’s landscape, where adversaries utilize every possible tactic, major threats can easily go undetected.

Don't wait for threats to strike — hunt them down!

Threat hunting isn’t just a practice – it’s a crucial risk management strategy. Learn how to do it right with our new eGuide, featuring insights from Group-IB’s frontline threat hunters:

🫱 Conduct hunts for unknown and previously undocumented threats.
🫱 Explore different approaches to threat hunting, including adversary hunting, workflows, and more.
🫱 Learn when to conduct hunts and how to integrate them into your proactive security strategy.
🫱 Upgrade your detection capabilities with managed threat hunting services.

Ready to enhance your defenses?

Access the guide now

#Cybersecurity #threathunting #RiskManagement #FightAgainstCybercrime #InfoSec #CyberThreats #ThreatIntelligence #DataProtection
👍122
🚨New Blog Alert: Discover how APT Lazarus is pushing the limits of stealth on macOS! 🚨

In our latest research, Group-IB analysts uncover an advanced evasion technique, where Lazarus hides malicious code in macOS Extended Attributes, sidestepping detection and leaving zero traces on VirusTotal. From stealthy execution flows to fake decoy files, we break down how this technique leverages Rust and the Tauri framework to evade security measures.

Dive in to learn about RustyAttr, the elusive macOS trojan, and see why this approach has yet to make it to the MITRE ATT&CK framework.

For further details, check out our blog

#CyberSecurity #APT #Lazarus #MacOS #ThreatIntelligence #groupib
🔥11👏2👍1
📢 Exciting News from Group-IB! 📢

Today, we're thrilled to announce a new partnership with HELP University, the BIMP-EAGA Business Council (BEBC), and the BIMP-EAGA ICT CEO Forum (BEICF) to fortify cybersecurity in Southeast Asia! 🌏

Through this collaboration:

🔹Group-IB will provide industry-leading tools like our Unified Risk Platform to help local businesses safeguard their digital assets.
🔹HELP University will offer specialized training programs, with participants receiving a joint certification that reflects their strengthened skills in digital forensics, threat investigation, and more.

As cyber threats evolve, we're committed to supporting and upskilling Southeast Asia’s cybersecurity workforce.

👉 Learn more about our partnership here

#Cybersecurity #GroupIB #HELPUniversity #BIMPEAGA #FightAgainstCybercrime
🔥12👍2
🤔You may not see them, but can you be sure there's no mule activity in your financial network?

While mule accounts can be hard to detect, they leave clues. Leverage Group-IB’s advanced Fraud Protection and catch these signals early in the "warm-up" phase.

How does Group-IB Fraud Protection work against mule activity?

🔍 Behavioral Analysis — Identifies suspicious activity like multi-accounting, location inconsistencies, installation dates, anomalous network activity, and more.
🔗 Relationship Analysis — Uncovers complex mule networks across multiple financial institutions and accounts.
⚙️ Proprietary Rules and Algorithms — Pinpoints and disrupts mule activity with accuracy.

Learn how you can stop mule activity in its tracks with Group-IB Fraud Protection

#FinancialSecurity #FraudPrevention #AML #CyberSecurity #FightAgainstCybercrime
👍7🔥1
Media is too big
VIEW IN TELEGRAM
Egypt's largest e-payment provider, Fawry, is renowned for its commitment to customer security and service integrity.

And even in the face of an unexpected cyber threat, the e-payment giant upheld its responsibility without a second thought.

🛡️Learn how this $2 billion industry leader averted a ransomware attack by engaging Group-IB’s experts for full-cycle risk management—ensuring effective response and recovery.

Here's the complete interview with Ashraf Sabry, Founder and CEO of Fawry, talking more on it

Group-IB’s strong presence in the MEA region—with an established Digital Crime Resistence Center (DCRC) and 24/7 availability of critical expertise and resources—continues to strengthen the region's fight against cybercrime.

#RansomwareAttack #Cybersecurity #FightAgainstCybercrime
🔥10👍7
The MEA region’s digital growth is reshaping cybersecurity challenges. Group-IB's latest e-guide explores three years of key trends, from deepfakes to AI-driven scams. Use it to understand current threats, prioritize defenses, and build resilience.

👉 Read the e-guide here

📢 Share with your network to help raise awareness about cybersecurity in the region!

#DigitalRisks #CyberSecurity #GroupIB
🔥6👍32
Revealing the Infostealer Business: VietCredCare and DuckTail

Our latest investigation sheds light on the hidden world of Facebook account theft in Vietnam, focusing on the malware families VietCredCare and DuckTail. These information stealers exploit sophisticated tactics to harvest sensitive data from Facebook Business accounts, fueling a thriving underground market.

Key findings include:
🔍 A comparative analysis of the malware's tactics, exposing their roles in the broader infostealer ecosystem.
⚙️ Insights into how these operations monetize stolen data for unauthorized ad campaigns.
📊 An exploration of the underground networks shaping the digital threat landscape.

This investigation uncovers the inner workings of a lucrative cybercrime industry, providing critical insights for cybersecurity professionals. Dive into the details here.

#CyberSecurity #DigitalSecurity #Phishing #CybercrimeInvestigation #InfoSec
👍10👎3❤‍🔥2👏2
🚀 The future of cyber investigations is here.

Imagine uncovering a cybercriminal’s entire infrastructure in just one click. Sounds like a trick...or a miracle! There’s no magic involved, though—only hard work from a multidisciplinary team made up of Group-IB experts. We are delighted to announce a completely reinvented Graph, designed to guarantee the best possible investigation experience.

So, what’s new in Graph?

Fully automated and faster investigation—preventing hours spent on manual work
A sleek, intuitive interface—making complex data connections crystal clear
Expanded data sources—from public data breaches to insights into the dark web
New case management feature—to effortlessly track, save, and revisit your findings
 
Whether you’re fighting phishing campaigns, detecting fraud, or tracking malicious actors, Group-IB’s Graph puts the puzzle pieces together for you.
 
Dive into the blog post to explore how these innovations will transform your investigations.

#cybersecurity #graph #infosec
10👍2
INTERPOL and AFRIPOL led Operation Serengeti, a coordinated international effort to combat cybercrime across borders. Group-IB provided vital investigative support, analyzing scams, phishing domains, and leaked data to uncover the operations of cybercriminal networks.

The results were unprecedented:
1,006 suspects arrested for their involvement in cybercrime
134,089 malicious infrastructures dismantled, crippling criminal operations
$193 million in financial losses prevented globally

From dismantling elaborate Ponzi schemes in Senegal to uncovering an $8.6 million credit card fraud operation in Kenya, this operation sent a clear message: cybercriminals have nowhere to hide.

Discover how Group-IB contributed to this landmark success

#Cybercrime #OperationSerengeti #CyberSecurity
🔥8🏆6👍2
Online scammers are targeting users with fake betting ads, promising quick riches but stealing personal data and funds instead. Group-IB CERT has identified over 1,377 malicious websites globally—don’t be their next victim! Learn how these scams operate and how to protect yourself and your business.

🔗 Read more in our latest blog

#ScamAlert #cybersecurity #OnlineSafety #FightAgainstCybercrime
8👍3
🚨Deepfake Fraud: A Growing Threat to Financial Institutions🚨

In a recent investigation, Group-IB uncovered over 1,100 deepfake fraud attempts targeting an Indonesian financial institution. Fraudsters are using AI-powered tools to bypass advanced biometric security systems.

In our latest blog, we reveal:
How virtual cameras and face-swapping bypass KYC
The financial impact—losses in Indonesia alone estimated at $138.5M
Expert recommendations to safeguard financial institutions

As deepfake tech becomes more accessible, the stakes are higher than ever. Is your financial institution prepared?

🔗Read the full blog for actionable insights and expert recommendations

#Cybersecurity #DeepfakeFraud #FinancialInstitutions #ThreatIntelligence #AI #GroupIB
👍8🔥7👎2
🤝 Group-IB and Cybersecurity Center of Uzbekistan Join Forces!

We’re excited to announce a strategic partnership between Group-IB and the Cybersecurity Center of Uzbekistan, formalized during the Cyber Security Summit 2024 - Central Eurasia.

This collaboration is a pivotal step toward strengthening Uzbekistan’s national cybersecurity framework. Together, we aim to:
Exchange actionable threat intelligence.
Enhance cybersecurity awareness through comprehensive training.
Support local businesses and institutions with vulnerability assessments and digital forensics.
Accelerate joint operations against cybercrime in the region.

With the establishment of a Digital Crime Resistance Center in Tashkent, we’re committed to creating a safer digital environment for businesses and citizens alike.

👉 Learn more about our mission to fight cybercrime

#Cybersecurity #GroupIB #Uzbekistan #Partnership #CyberThreats #DigitalSafety
🔥26👍6
Staying ahead of modern cyberthreats requires more than just tools — it takes knowledge. That’s why we created Malware Reports, a free resource designed to help security professionals.

With Malware Reports, you can:

Access thousands of public malware samples analyzed by our Malware Detonation Platform
Explore detailed behavioral analysis and animated visualizations
Dive into threats mapped to the MITRE ATT&CK® framework

You can look up malware by name, hash, or behavior — or even compare threats over time.

Whether you're a SOC analyst, threat hunter, reverse engineer, or malware researcher, this database equips you with actionable insights. Use Malware Reports to gain clarity during incident response, craft more effective detection and hunting rules, and compare historical and current threats to stay ahead.

Check out the free tool here

#CyberSecurity #MITREATTACK #MalwareReports #ThreatHunting #FightAgainstCybercrime
🔥13👍4👌2👨‍💻1
🚨In our latest investigation, Group-IB uncovers a sophisticated phishing campaign targeting employees of over 30 companies across 15 countries.

This campaign leverages trusted platforms, dynamic personalization, and multi-brand impersonation to evade even advanced email defenses.

📌 In this blog, we explore:
Insights into the latest phishing techniques
Actionable recommendations to protect your team
An in-depth look into how trust can be weaponized

👉 Dive into the full analysis here and empower your team to stay safe
🔥12
🚨 Group-IB has identified a phishing campaign impersonating Singapore’s SupportGoWhere portal to steal sensitive information like personal details, credit card numbers, and 2FA codes. The scam begins with fake SMS messages that redirect victims to fraudulent websites mimicking government platforms.

Investigations have revealed 30 active and 592 dormant phishing resources. The same phishing kit is also being used in various scams, including fake parking fines, redemption of bonus points and resolving issues with failed deliveries. Residents are encouraged to stay vigilant by avoiding suspicious links, verifying URLs, and reporting incidents to the authorities.

🔗 Learn more about the campaign and how to stay protected

#PhishingAlert #CyberSecurity #Singapore #InformationSecurity #FightAgainstCybercrime
👍4
European businesses today are juggling multiple facets: complex regulations, evolving cyber risks, and the growing difficulty of maintaining a strong cybersecurity posture.

Managed Security Service Provider like NVISO has stepped up to fortify the security foundations of the European economy, helping businesses sustain and upgrade their security maturity.

Such a massive task demands exceptional expertise. To meet this challenge, NVISO turned to Group-IB’s localized, industry-leading, high-fidelity Threat Intelligence (TI).

Discover how this powerful integration transformed NVISO’s security offerings in our latest collaboration story

#CyberSecurity #ThreatIntelligence #ManagedSecurity #FightAgainstCybercrime
👍9
📱Patch Me If You Can: The Truth About Smartphone Vulnerabilities

How safe is your smartphone? This question is more urgent than ever as leaked Cellebrite tools expose the unsettling truth: even the most advanced devices aren't immune to exploitation.

From the risks of AFU vulnerabilities to the flawed anti-theft systems on iOS and Android, this blog uncovers:

How manufacturers downplay security flaws
What the Cellebrite leaks reveal about smartphone vulnerabilities
Expert recommendations for safeguarding your data

Whether you're an individual or a business, the stakes are high. Dive into actionable insights to protect against data breaches, identity theft, and corporate espionage.

#Cybersecurity #MobileSecurity #SmartphoneSafety #GroupIB
👍71
New Year – New Success to Unlock🔓, and New and Disruptive Cybercriminal Antics to Deal With?😕

With the industry questioning which trends will define the threat landscape, how prepared are you to combat them?

If you have little idea of what’s coming, Dmitry Volkov, CEO of Group-IB ventures into the future to share some vouched for predictions with us today, to keep you in the clear!

✒️Check out the most important blog to help shape your cybersecurity strategy and strengthen your defenses for 2025

#cybersecurity #Infosec #FightAgainstCybercrime
4🔥21
Cybercriminals in the Middle East have developed a sophisticated impersonation scam targeting individuals who file complaints on government portals. By posing as government officials, they exploit trust and use remote access tools to access victims’ sensitive data. These scams are highly effective due to the use of stealer malware (e.g., RedLine), which harvests login credentials, credit card details, and more from compromised devices.

💳 How the Scam Works:
1️⃣ Victims are contacted by fraudsters claiming to assist with a lodged complaint, posing as government officials to build trust.
2️⃣ They are instructed to download the legitimate government application and remote access tools under the guise of resolving their complaint.
3️⃣ Once access is granted, fraudsters steal credit card details and intercept OTP codes during shared screen sessions to complete unauthorized transactions.

Learn more about these schemes and how to stay secure in our latest blog
👍6🔥2
AI’s precision and agility are next-level, especially in detecting anomalies that can indicate fraud in its early stages. But does AI replace human expertise?

When dealing with adversaries who use complex and adaptive strategies, defense demands more—an investigator's intuition, critical judgment, and local context awareness — qualities AI cannot fully replicate.

Learn how Group-IB’s Fraud Protection merges the power of AI with the localized awareness of expert fraud analysts to deliver complete protection

#CyberSecurity #AI #FraudPrevention #FightAgainstCybercrime
👍41