Group-IB
2.19K subscribers
739 photos
26 videos
2 files
525 links
Your daily source of cybersecurity news brought to you by Group-IB, one of the global industry leaders.
Download Telegram
#report #cybercrime #HTCT #ransomware

Group-IB presents the third volume of its Hi-Tech Crime Trends 2021/2022 report “Big money: threats to financial sector⚡️⚡️⚡️

❗️Organizations in the financial sector face a diverse threat landscape, as they are often the preferred targets of financially motivated cybercriminals. In H2 2020 - H1 2021, the cyber threat that stood out as the most damaging to financial sector organizations was ransomware.

🔺In the review period the number of financial organizations whose data was released on DLS increased to 127 compared to 50 a year earlier. Group-IB identified at least 24 groups attacking companies in the financial sector. The most prolific among them were #REvil, #Conti, and #Avaddon.

🔺The market for access to corporate networks has grown significantly. Compared to the previous period, the number of initial access brokers (IABs) has increased from 18 to 47 , while the number of known sale incidents went up from 31 to 95.

Download link -> https://bit.ly/3dLL2tJ
Lull on the carding market📉

🔹The review period saw a drastic decrease in the number of bank cards put up for sale. One of the key reasons for this decline was the closure of notorious card shop Joker’s Stash, which used to account for 40% of the global carding market.

🔹In addition to Joker’s Stash, more than 10 smaller card shops shut down in 2021. That said, the share of #bank cards put up for sale by other card shops remained the same. This trend has been observed in all the regions.

🔹On the other hand, the number of textual card data offers increased
from 28 to 38 million due to the growth in the number of #phishing resources during the pandemic, among other things.

Detailed region profiles are provided below ⬇️
Phishing and scam affiliate programs are trending

🔹Another remarkable threat targeting the financial sector in H2 2020 - H1 2021 were phishing and scam affiliate programs. Group-IB experts estimate that there currently are more than 70 such programs, with their joint profit amounting to at least $10 million. On average, the amount stolen by any single threat
actor is estimated at $83.

🔹Over 70 brands from 36 countries worldwide are being exploited by the members of phishing and scam affiliate programs. The majority of brands affected were marketplaces, delivery services, carpooling services, and banking services.

More details are available in our report -> https://bit.ly/3dLL2tJ
#report #cybercrime #HTCT #APT

Group-IB presents the fourth volume of its Hi-Tech Crime Trends 2021/2022 report “Cyberwarfare: state-sponsored operations in cyberspace⚡️⚡️⚡️

⚠️Concerns over nation-state attackers grow every year. Group-IB’s previous Hi-Tech Crime Trends reports have detailed how long-term espionage campaigns run by intelligence agencies occurred alongside episodes of open interstate military confrontation, which in some cases resulted in infrastructure being physically destroyed.

🎯The H2 2020 - H1 2021 period has shown that state-sponsored hacker groups can launch large-scale attacks to which even the most high-level targets are vulnerable. We all remember how by hacking into the US software developer SolarWinds, cybercriminals compromised cybersecurity market leaders, as well as several US government agencies.

🔸Recently, state-backed attackers became less isolated from the rest of the cybercriminal world. More and more often, they use publicly available tools and resort to underground services. They do not shy away from buying initial access from other attackers or exchange malicious tools with them. Group-IB’s hypothesis that the boundaries between nation-state and financially-motivated attackers are beginning to fade is confirmed by the fact that more state-sponsored hackers are trying their luck in new fields to increase their profits.

In our fresh report, available exclusively to Group-IB Threat Intelligence & Attribution customers, we:

🔸examine new players who have appeared on the map of interstate confrontation in cyberspace;
🔸describe their most significant operations;
🔸analyze their tools;
🔸provide a list of threats to companies in the telecommunications, energy, and IT sectors;
🔸tell about how state-sponsored hackers make extra money;
🔸and of course provide forecasts on the evolving threat landscape for various
sectors.

Fortunately, you can get access to the report by requesting the demo of Group-IB's Threat Intelligence & Attribution system that provides high-fidelity threat intelligence data tailored to your specific organization -> https://bit.ly/3sbd6PU
#report #cybercrime #HTCT #APT

🔎We would like to shed some light on the content of our new report and reveal some of its highlights:

🔸During the reporting period, 11 new APT groups specializing in cyber espionage were discovered. Two of them — Dark Halo and HAFNIUM — conducted the most large-scale operations, competing with each other for the highest number of infected companies.

🔸The largest number of active APT groups was detected in the Asia-Pacific region, just like in the previous review period.

🔸One of the trends observed in the reporting period was APT groups using rootkits and vulnerabilities to compromise BIOS/UEFI and subsequently gain control over a system.

🔸The development of 5G technologies triggered the intensification of espionage campaigns, presumably aimed at competing for new markets in Southeast Asia, Europe, and the United States.

🔸The number of attacks on IT companies is growing year after year. In most cases, IT companies are a springboard for supply-chain attacks aimed to compromise customers further.

More findings are in our report, which can be accessed by requesting Group-IB Threat Intelligence & Attribution demo -> https://bit.ly/3sbd6PU
#report #cybercrime #HTCT #scam #phishing

Group-IB presents the fifth volume of its Hi-Tech Crime Trends 2021/2022 report “Scams and Phishing: The epidemic of online fraud⚡️⚡️⚡️

👉We finally release the concluding part of our 5-volume Hi-Tech Crime Trends 2021/2022 report — “Scams and Phishing: The epidemic of online fraud.” In this paper, Group-IB’s CERT-GIB and Digital Risk Protection analysts analyze major scam campaigns, instruments used and threat actors’ infrastructure.

⚔️The COVID-19 pandemic was the main reason for the explosive growth of online scams. According to Group-IB’s data, fraud accounted for 74.5% of all online crimes in the first half of 2021. More than half (57%) of all cybercrimes were scams (a type of fraud in which victims voluntarily make payments or disclose their data), while phishing (theft of bank card data) accounted for just 17.5%.

📑Here are some other highlights and trends from our fresh report:

🔹 Group-IB specialists helped block more than 14,000 phishing resources hosted
on some 12,000 unique domains. About 20% of phishing websites were hosted on compromised legitimate resources.

🔹 Classiscam became one of the largest, longest, and most technically advanced hybrid scam campaigns in the world. As at the end of 2021, 70 active affiliate programs use this scheme, targeting more than 80 international brands from 36 countries.

🔹An increase in phishing targeting online services (16%) and social media (8%) has been recorded.

🔹The popularity of the scam-as-a-service model has led to scams scaling up on a global level and to a lower entry threshold for newbie-scammers with no real skills for conducting scams.

More trends and forecasts for the development of online fraud are in our fresh report —> https://bit.ly/3GXLtOb