We are proud to unveil our first Cyber Fusion Center in the Asia-Pacific region, located within the Digital Crime Resistance Center, Singapore.
The Cyber Fusion Center integrates core capabilities, including Threat Intelligence, Digital Forensics & Incident Response, Managed XDR, Attack Surface Management, Digital Risk Protection, and Fraud Protection, into one unified, intelligence-driven ecosystem.
Unlike conventional SOCs, the Cyber Fusion Center delivers proactive, AI-powered threat hunting and fraud prevention, giving organizations real-time visibility and rapid response across their digital environments. Read the full announcement.
#CyberFusionCenter #ThreatIntelligence #ManagedXDR #FraudPrevention #FightAgainstCybercrime
The Cyber Fusion Center integrates core capabilities, including Threat Intelligence, Digital Forensics & Incident Response, Managed XDR, Attack Surface Management, Digital Risk Protection, and Fraud Protection, into one unified, intelligence-driven ecosystem.
Unlike conventional SOCs, the Cyber Fusion Center delivers proactive, AI-powered threat hunting and fraud prevention, giving organizations real-time visibility and rapid response across their digital environments. Read the full announcement.
#CyberFusionCenter #ThreatIntelligence #ManagedXDR #FraudPrevention #FightAgainstCybercrime
โค8๐3๐1
Group-IB has uncovered a coordinated scam operation exploiting verified Google Ads, deepfake videos, and fake news outlets to impersonate Singaporeโs government officials and noted public figures in a fraudulent investment campaign known as the โImmediate Eraโ scam.
Our latest Threat Intelligence Report details how this operation leveraged:
๐น28 verified Google advertiser accounts targeting Singapore users
๐นOver 50 intermediary redirect domains to evade detection
๐นFabricated media sites mimicking CNA and Yahoo! News
๐นAI-generated deepfakes used to build false credibility
This case highlights a new era of organized, cross-border financial fraud, where legitimacy is simulated through verified platforms and regulatory loopholes. Read the full technical breakdown here.
#CyberSecurity #DeepfakeAwareness #ScamAlert #FightAgainstCybercrime
Our latest Threat Intelligence Report details how this operation leveraged:
๐น28 verified Google advertiser accounts targeting Singapore users
๐นOver 50 intermediary redirect domains to evade detection
๐นFabricated media sites mimicking CNA and Yahoo! News
๐นAI-generated deepfakes used to build false credibility
This case highlights a new era of organized, cross-border financial fraud, where legitimacy is simulated through verified platforms and regulatory loopholes. Read the full technical breakdown here.
#CyberSecurity #DeepfakeAwareness #ScamAlert #FightAgainstCybercrime
โค14๐2๐1
Group-IB Threat Intelligence has uncovered a global phishing campaign orchestrated by MuddyWater (TA450). The phishing campaign targeted international organizations and more than 100 governments worldwide to gather foreign intelligence using the Phoenix V4 malware.
Key highlights:
๐น Over 100 governments and international organizations targeted globally
๐น Use of FakeUpdate injector and Phoenix v4 malware with new persistence methods
๐น Integration of legitimate RMM tools (Action1, PDQ) and a custom Chromium credential stealer
๐น C2 infrastructure hosted behind Cloudflare and active for just five days, indicating strong OPSEC discipline
This campaign highlights how MuddyWater continues to evolve its tradecraft, blending social engineering, custom malware, and legitimate tools to gather foreign intelligence.
Read the full technical analysis here.
#ThreatIntelligence #APT #Phishing #MuddyWater #CyberSecurity #MalwareAnalysis
Key highlights:
๐น Over 100 governments and international organizations targeted globally
๐น Use of FakeUpdate injector and Phoenix v4 malware with new persistence methods
๐น Integration of legitimate RMM tools (Action1, PDQ) and a custom Chromium credential stealer
๐น C2 infrastructure hosted behind Cloudflare and active for just five days, indicating strong OPSEC discipline
This campaign highlights how MuddyWater continues to evolve its tradecraft, blending social engineering, custom malware, and legitimate tools to gather foreign intelligence.
Read the full technical analysis here.
#ThreatIntelligence #APT #Phishing #MuddyWater #CyberSecurity #MalwareAnalysis
๐ฅ6๐2โค1๐1
Investment scams are no longer isolated schemes, they have evolved into industrialized, multi-actor fraud networks operating at a global scale.
Key highlights:
๐น A shared centralized backend powers hundreds of fake trading platforms, linked through recurring API endpoints, reused SSL certificates, and identical admin panels.
๐น Chatbots act as automated operators screening victims, simulating support, and distributing payment instructions that expose valuable artifacts for attribution.
๐น Fraud groups exploit weak KYB/KYC processes using forged documents and biometric bypass services traded on Telegram to open mule accounts.
๐น Auxiliary infrastructure such as chat simulators and exposed admin panels fabricates investor activity and leaves technical footprints that analysts can pivot on.
Our report maps the Victim Manipulation Flow, details the infrastructure links, and exposes the mechanics behind the illusion.
Read the full technical report.
#InvestmentScams #Cybersecurity
Key highlights:
๐น A shared centralized backend powers hundreds of fake trading platforms, linked through recurring API endpoints, reused SSL certificates, and identical admin panels.
๐น Chatbots act as automated operators screening victims, simulating support, and distributing payment instructions that expose valuable artifacts for attribution.
๐น Fraud groups exploit weak KYB/KYC processes using forged documents and biometric bypass services traded on Telegram to open mule accounts.
๐น Auxiliary infrastructure such as chat simulators and exposed admin panels fabricates investor activity and leaves technical footprints that analysts can pivot on.
Our report maps the Victim Manipulation Flow, details the infrastructure links, and exposes the mechanics behind the illusion.
Read the full technical report.
#InvestmentScams #Cybersecurity
โค7๐3๐1
๐จ New technical deep-dive: โGhosts in / procโ ๐จ
Attackers are no longer just hiding files, they are rewriting what the OS shows. Our new research demonstrates how adversaries manipulate Linuxโs / proc filesystem to spoof process names and corrupt forensic timelines, effectively making malicious activity look benign.
Key Highlights:
๐นMalicious processes spoofing / proc/<pid>/cmdline so tools like ps and top report harmless names
๐นTimeline corruption via modified / proc/<pid>/stat start times processes can appear to start in the future
๐นWhen / proc is trusted in isolation, triage, timeline stitching, and attribution can all fail
๐นFull lab walkthrough, indicators, and practical mitigations included
๐ Read the full analysis here.
#ThreatIntel #LinuxSecurity #DFIR #CyberSecurity #IncidentResponse
Attackers are no longer just hiding files, they are rewriting what the OS shows. Our new research demonstrates how adversaries manipulate Linuxโs / proc filesystem to spoof process names and corrupt forensic timelines, effectively making malicious activity look benign.
Key Highlights:
๐นMalicious processes spoofing / proc/<pid>/cmdline so tools like ps and top report harmless names
๐นTimeline corruption via modified / proc/<pid>/stat start times processes can appear to start in the future
๐นWhen / proc is trusted in isolation, triage, timeline stitching, and attribution can all fail
๐นFull lab walkthrough, indicators, and practical mitigations included
๐ Read the full analysis here.
#ThreatIntel #LinuxSecurity #DFIR #CyberSecurity #IncidentResponse
๐5๐ฅ1๐1
๐จUncovering a Multi-Stage Phishing Kit Targeting Italyโs Infrastructure
Phishing has evolved, becoming industrialized, automated, and powered by underground ecosystems that mirror legitimate SaaS businesses.
Our latest investigation exposes a professional phishing framework impersonating Aruba S.p.A., Italyโs major IT and web services provider.
The key findings:
๐น Multi-stage kit automating every phase of the attack from CAPTCHA evasion to OTP interception
๐น Pre-filled login URLs designed to increase credibility and lower suspicion
๐น Fake payment pages harvesting full credit card and 3D Secure/OTP data
๐น Telegram bots used for real-time exfiltration and backup data logging
๐น Evidence of Phishing-as-a-Service (PhaaS) scaling fraud through automation and community support
Phishing may be one of the oldest cyber threats, but today, it operates like a fully industrialized ecosystem.
๐งฉ Read the full technical analysis here.
#ThreatIntelligence #CyberSecurity #Phishing #CyberCrime
Phishing has evolved, becoming industrialized, automated, and powered by underground ecosystems that mirror legitimate SaaS businesses.
Our latest investigation exposes a professional phishing framework impersonating Aruba S.p.A., Italyโs major IT and web services provider.
The key findings:
๐น Multi-stage kit automating every phase of the attack from CAPTCHA evasion to OTP interception
๐น Pre-filled login URLs designed to increase credibility and lower suspicion
๐น Fake payment pages harvesting full credit card and 3D Secure/OTP data
๐น Telegram bots used for real-time exfiltration and backup data logging
๐น Evidence of Phishing-as-a-Service (PhaaS) scaling fraud through automation and community support
Phishing may be one of the oldest cyber threats, but today, it operates like a fully industrialized ecosystem.
๐งฉ Read the full technical analysis here.
#ThreatIntelligence #CyberSecurity #Phishing #CyberCrime
๐7๐ฅ4๐2โค1๐1
๐จ New Threat Report Released: UNC2891 โ ATM Threats Never Die
A financially motivated threat actor infiltrated banking networks using a Raspberry Pi connected to an ATM switch, deployed custom malware like CAKETAP and SLAPSTICK, and maintained undetected access for years.
From DNS tunneling to money mule recruitment via Telegram see how modern attackers operate.
๐ Get the full breakdown of UNC2891โs TTPs, malware analysis, and incident response insights.
#CyberSecurity #ThreatIntelligence #ATMThreats #FinancialSecurity
A financially motivated threat actor infiltrated banking networks using a Raspberry Pi connected to an ATM switch, deployed custom malware like CAKETAP and SLAPSTICK, and maintained undetected access for years.
From DNS tunneling to money mule recruitment via Telegram see how modern attackers operate.
๐ Get the full breakdown of UNC2891โs TTPs, malware analysis, and incident response insights.
#CyberSecurity #ThreatIntelligence #ATMThreats #FinancialSecurity
๐ฅ12
๐จBloody Wolf Expands Across Central Asia ๐จ
Since June 2025, Group-IB analysts have been tracking a rapidly evolving campaign by Bloody Wolf, an APT group weaponizing trusted government identities to deliver lightweight but highly effective JAR-based loaders.
By impersonating Ministries of Justice and abusing legitimate remote-access software like NetSupport Manager, the group has quietly scaled its operations from Kyrgyzstan to Uzbekistan supported by geo-fenced infrastructure, tailored lures, and a custom JAR generator designed for stealth and persistence.
Key highlights:
๐น Their spear-phishing techniques and localized PDF lures
๐น How custom JAR loaders deploy NetSupport RAT
๐น Infrastructure masquerading as government portals
๐น Multi-layered persistence and evasion methods
๐น IOCs, MITRE mapping, & defensive recommendations
Bloody Wolf shows how low-cost tools & precise social engineering can evolve into regionally impactful cyber operations. Read the full analysis.
#CyberSecurity #BloodyWolf
Since June 2025, Group-IB analysts have been tracking a rapidly evolving campaign by Bloody Wolf, an APT group weaponizing trusted government identities to deliver lightweight but highly effective JAR-based loaders.
By impersonating Ministries of Justice and abusing legitimate remote-access software like NetSupport Manager, the group has quietly scaled its operations from Kyrgyzstan to Uzbekistan supported by geo-fenced infrastructure, tailored lures, and a custom JAR generator designed for stealth and persistence.
Key highlights:
๐น Their spear-phishing techniques and localized PDF lures
๐น How custom JAR loaders deploy NetSupport RAT
๐น Infrastructure masquerading as government portals
๐น Multi-layered persistence and evasion methods
๐น IOCs, MITRE mapping, & defensive recommendations
Bloody Wolf shows how low-cost tools & precise social engineering can evolve into regionally impactful cyber operations. Read the full analysis.
#CyberSecurity #BloodyWolf
โค10๐ฅ1
๐จ New launch: Fraud moves fast. Now defense does too.
Announcing the Cyber Fraud Intelligence Platform: real-time, privacy-preserving fraud intelligence sharing for banks, payment providers, e-commerce, gaming, and telecoms.
๐นShare risk signals on suspicious activity, not just confirmed fraud.
๐นStop APP fraud & mule networks before funds are lost.
๐นGDPR-compliant, Bureau Veritas verified.
๐นPersonal data never leaves your organization.
Collective problem. Collective defense.
๐ Read the press release here.
๐ Learn more.
#CFIP #Cybersecurity #GDPR #AppFraud
Announcing the Cyber Fraud Intelligence Platform: real-time, privacy-preserving fraud intelligence sharing for banks, payment providers, e-commerce, gaming, and telecoms.
๐นShare risk signals on suspicious activity, not just confirmed fraud.
๐นStop APP fraud & mule networks before funds are lost.
๐นGDPR-compliant, Bureau Veritas verified.
๐นPersonal data never leaves your organization.
Collective problem. Collective defense.
๐ Read the press release here.
๐ Learn more.
#CFIP #Cybersecurity #GDPR #AppFraud
๐ฅ9โค2๐2
Group-IBโs latest threat report exposes the full scale of GoldFactoryโs mobile fraud operation, one of the most technically advanced campaigns currently targeting APAC.
Key insights:
๐นA surge of 300+ modified banking apps, patched with injected modules to bypass security and retain full legitimate functionality
๐นOver 11,000 device infections traced through Group-IB Fraud Protection telemetry
๐นA unified ecosystem of loaders (Gigabud, Remo, MMRat) delivering secondary payloads such as SkyHook
๐นNew Gigaflower variant features experimental OCR and QR code scanning to auto-extract ID card data.
๐นInfrastructure overlaps linking open directories and shared S3 buckets hosting malicious binaries
This report reveals how GoldFactory has industrialized mobile fraud by weaponizing legitimate apps and what defenders need to know now. Read the full analysis.
#MobileBanking #CyberSecurity #APACThreats #BankingMalware #GoldFactory
Key insights:
๐นA surge of 300+ modified banking apps, patched with injected modules to bypass security and retain full legitimate functionality
๐นOver 11,000 device infections traced through Group-IB Fraud Protection telemetry
๐นA unified ecosystem of loaders (Gigabud, Remo, MMRat) delivering secondary payloads such as SkyHook
๐นNew Gigaflower variant features experimental OCR and QR code scanning to auto-extract ID card data.
๐นInfrastructure overlaps linking open directories and shared S3 buckets hosting malicious binaries
This report reveals how GoldFactory has industrialized mobile fraud by weaponizing legitimate apps and what defenders need to know now. Read the full analysis.
#MobileBanking #CyberSecurity #APACThreats #BankingMalware #GoldFactory
โค7๐ฅ5
As digital lending accelerates in Uzbekistan, cybercriminals are exploiting verification gaps, low financial awareness, and social engineering to weaponize online credit services at scale turning personal identity into a profitable attack surface.
Key Highlights:
๐น Online credit fraud cases surged 42% in 2024 compared to 2023
๐น 34% of incidents involved fraudsters posing as bank or government officials
๐น Microcredits are approved using stolen passport, FaceID, and OTP data
๐น Scammers deploy Telegram bots and SMS-stealers to bypass authentication
๐น New regulations now allow victims to be exempt from repaying fraudulent loans
Our latest analysis breaks down the evolving fraud ecosystem, the social engineering tactics behind it, and the controls financial institutions must implement to stay ahead.
Read the full report here.
#FraudIntelligence #ThreatIntel #DigitalFraud #SocialEngineering #CyberSecurity
Key Highlights:
๐น Online credit fraud cases surged 42% in 2024 compared to 2023
๐น 34% of incidents involved fraudsters posing as bank or government officials
๐น Microcredits are approved using stolen passport, FaceID, and OTP data
๐น Scammers deploy Telegram bots and SMS-stealers to bypass authentication
๐น New regulations now allow victims to be exempt from repaying fraudulent loans
Our latest analysis breaks down the evolving fraud ecosystem, the social engineering tactics behind it, and the controls financial institutions must implement to stay ahead.
Read the full report here.
#FraudIntelligence #ThreatIntel #DigitalFraud #SocialEngineering #CyberSecurity
๐6๐ฅ3โค2
Group-IBโs Red Team has identified two previously unknown zero-day vulnerabilities in widely used enterprise platforms: Cisco UCCX and IBM Sterling.
Following responsible disclosure, both vendors validated the findings and released security updates to protect their customers.
This discovery highlights the strength of Group-IBโs approach to rigorous, dependable, and attributable analysis. By leveraging deep empirical threat intelligence to replicate highly advanced attacks, our teams reveal critical risks that many other security assessments overlook.
Full technical details are available in our press release.
#CyberSecurity #ZeroDay #VulnerabilityAssessment #ThreatIntelligence #EnterpriseSecurity #SecurityUpdates #FightAgainstCybercrime
Following responsible disclosure, both vendors validated the findings and released security updates to protect their customers.
This discovery highlights the strength of Group-IBโs approach to rigorous, dependable, and attributable analysis. By leveraging deep empirical threat intelligence to replicate highly advanced attacks, our teams reveal critical risks that many other security assessments overlook.
Full technical details are available in our press release.
#CyberSecurity #ZeroDay #VulnerabilityAssessment #ThreatIntelligence #EnterpriseSecurity #SecurityUpdates #FightAgainstCybercrime
โค14๐1
๐จAndroid-based financial fraud in Uzbekistan has entered a new stage of operational maturity, with threat actors shifting from simple SMS stealers to sophisticated, multi-stage infection chains built around stealthy droppers, advanced obfuscation, and automated infrastructure.
Key Highlights:
๐นOver $2M stolen by a single tracked group since January 2025
๐นTwo primary dropper families, MidnightDat and RoundRift, were identified using native decryption and encrypted asset storage.
๐นWonderland, a new SMS stealer with bidirectional WebSocket Cโ, enables real-time command execution, SMS sending, and USSD control.
๐นTelegram remains the central distribution channel, fueled by stolen sessions sold on dark web markets.
๐นThousands of unique samples generated through automated build pipelines to evade signature-based detection
๐ Read the full analysis here.
#ThreatIntelligence #AndroidMalware
Key Highlights:
๐นOver $2M stolen by a single tracked group since January 2025
๐นTwo primary dropper families, MidnightDat and RoundRift, were identified using native decryption and encrypted asset storage.
๐นWonderland, a new SMS stealer with bidirectional WebSocket Cโ, enables real-time command execution, SMS sending, and USSD control.
๐นTelegram remains the central distribution channel, fueled by stolen sessions sold on dark web markets.
๐นThousands of unique samples generated through automated build pipelines to evade signature-based detection
๐ Read the full analysis here.
#ThreatIntelligence #AndroidMalware
๐10๐ฅ3
๐ธ โEasy money. Simple tasks. Work from your phone.โ
Our latest analysis exposes a coordinated wave of fake online job ads sweeping across the Middle-East and Africa region. These aren't isolated scams, they are a large-scale, organized operation exploiting the demand for remote work to steal personal data and funds.
Key insights from our investigation:
๐น Over 1,500 fraudulent job ads identified in 2025, impersonating trusted e-commerce platforms, banks, and even government ministries.
๐น Ads are highly localized, using Arabic dialects and regional currencies to appear authentic.
๐น Victims are funneled from social media into private Telegram and WhatsApp groups, where sensitive information and upfront โdepositsโ are collected.
๐นThe scam infrastructure includes fake registration portals, cloned branding, and repeat behavioral patterns among attackers.
Read More.
#CyberSecurity #OnlineScams #MENA #Phishing #DigitalRisk #FraudPrevention #ThreatIntelligence
Our latest analysis exposes a coordinated wave of fake online job ads sweeping across the Middle-East and Africa region. These aren't isolated scams, they are a large-scale, organized operation exploiting the demand for remote work to steal personal data and funds.
Key insights from our investigation:
๐น Over 1,500 fraudulent job ads identified in 2025, impersonating trusted e-commerce platforms, banks, and even government ministries.
๐น Ads are highly localized, using Arabic dialects and regional currencies to appear authentic.
๐น Victims are funneled from social media into private Telegram and WhatsApp groups, where sensitive information and upfront โdepositsโ are collected.
๐นThe scam infrastructure includes fake registration portals, cloned branding, and repeat behavioral patterns among attackers.
Read More.
#CyberSecurity #OnlineScams #MENA #Phishing #DigitalRisk #FraudPrevention #ThreatIntelligence
๐ฅ11โค2๐2