Russian Sandworm Hacking Team Expands Reach

Russian Cyber Sabotage Unit Sandworm Adopting Advanced Techniques Mandiant newly designated the Russian military intelligence hacking team known as Sandworm as APT44. Russia’s preeminent cyber sabotage unit presents “one of the widest and high severity cyber threats globally” due to its advanced capabilities and successes in disrupting global critical infrastructure sectors, a new report warns. Sandworm is the cyberwarfare...

Read More

Banking Trojan Harvests Facial Biometrics for AI Deepfakes

GoldPickaxe Malware Can Record User’s Face, Gather Video Used in Deepfake Crimes A Chinese-speaking cybercrime group, identified as GoldFactory, is expanding the functionality and reach of its advanced banking Trojans. These Trojans are now collecting and stealing biometric data. Cybersecurity firm Group-IB recently released a report saying that GoldFactory has developed a new Trojan, dubbed GoldPickaxe, that comes in Android and iOS variants...

Read More

2023 Saw a Number of High-Profile Breaches

We hope that you had a successful 2023. Looking back, 2023 saw a number of high-profile breaches as criminals and nation-state-supported hackers both created new methods of attacking and took advantage of existing vulnerabilities. Looking to 2024, here are a few things that we think are worth keeping an eye on moving forward. Phishing NOW WITH AI Phishing continues to be a persistent and lucrative attack vector for criminals and state-...

Read More

Okta Says Hacker Stole Every Customer Support User’s Details

Beware of Phishing and Social Engineering Attacks Targeting Passwords, Vendor Warns Okta, the identity and authentication giant, said the attacker behind its September data breach stole more information than it first discovered. That includes details for all users of its primary customer support system. They first publicly confirmed the breach on Nov. 3, warning that attackers had gained access to its customer support management system and...

Read More

Phishing Accounts for More than Half of Cybercrime

Cybercrime is an ever-evolving field. Technology evolves to allow new tactics or new scales for criminals, as well as giving firms new tools to combat fraud and theft. Due to the fact that it’s ever-evolving, sometimes it can be difficult to see vast changes that occur over time. Over the last 5 years, there have been significant changes to the landscape of cybercrime. Not just in the increases in scale but also significant changes in the types...

Read More

Will FedNow Truly Rewire the US Payments Landscape?

Fraud, Security, Implementation Hurdles With Fast Payment Program The new FedNow service has been hyped as a way to revolutionize the U.S. approach to payments, thanks to the Federal Reserve’s perception as a stable payments network provider and its access to a built-in customer base of thousands of national, regional and community financial institutions. The large volume of banks with access to an instant payments network may lead to a...

Read More

GPT Goes Evil: How Criminals Are Leveraging LLM’s

How GPT’s Evil Twin Could Be Used in BEC Attacks A black hat AI tool called Worm GPT is being used to improve the efficacy of phishing emails. This is particularly troubling because a recent survey shows that 1 in 5 people fall for the fake, AI-generated emails, according to cybersecurity researchers. Researchers at SlashNext recently assessed WormGPT, an evil twin of OpenAI’s GPT AI model designed specifically for malicious...

Read More

Check Fraud Increases As Criminals Evolve

Check fraud increased 84% between 2021 and 2022, to 680,000 reported cases, according to the U.S. Department of the Treasury. Part of this growth stems from the fact that check fraud has become easier and more accessible. Cybercrime groups are openly hawking fraudulent check schemes on the Telegram messaging app. Check fraud started rising during the COVID-19 pandemic partially due to stimulus programs. Criminals made easy money by stealing...

Read More

Duo Security/Cisco Security Study Highlights 5 Most-Impactful Security Activities

A third-party security study commissioned by Duo Security/Cisco highlights the five most-impactful security activities for an organization. This study builds on one that was previously commissioned in 2020. Broadly speaking, the study focuses on two key security areas: prevention and response. For prevention, the two most impactful areas were having a current tech stack, and having that tech stack integrated with your security systems. They...

Read More

Success of EMV Chip leads to changing fraud landscape.

The enhanced security provided by EMV chips has significantly impacted card fraud at retail locations. The continued presence of the magnetic stripe as a backup leads to continuing fraud losses. However, as always, where there’s a will, there’s a way, and criminals continue to use a variety of ways to obtain and exploit card information. Several of these ways continue to rely on the presence of the magnetic strip in order to either obtain...

Read More