Yesterday, July 7, the United Kingdom’s National Crime Agency (NCA) released their Cyber Crime Assessment report for 2016, where they outlined the most important threats to UK businesses such as cybercrime. This is the first cybercrime report produced jointly by the NCA and industry partners.Read More
A multicomponent backdoor and point-of-sale (PoS) malware tandem can lead to stealthier and more flexible attacks. And these can pose greater threats to enterprises and small and medium-sized businesses (SMBs). Add another PoS malware to the mix, and you’ve got even bigger trouble.Read More
You may have heard about the Panama Papers—documents from a Panamanian law firm that revealed politicians, businessmen, and prominent individuals from countries all over the world were using offshore companies to cut their tax bills. It occurred to us to ask: Do cybercriminals avail of these services? Our research revealed that ads for offshore banking can also be found in underground forums. Offshore companies in Panama, the British Virgin Islands, and the Dominican Republic are used to hide the proceeds from cybercrime.Read More
April 2016 was a great month for putting cybercriminals in prison. On April 12 Paunch, the creator of the infamous Blackhole exploit kit, was sentenced to seven years in a Russian prison. This was soon followed by Aleksandr Panin, the creator of SpyEye: he was sentenced by a United States federal court to nine and a half years in prison for his role in creating SpyEye. One of his partners, Hamza Bendelladj, was sentenced to fifteen years.
The most recent case involved Esthost, a company we know very well from our research. Vladimir Tsastsin became the latest member of the Esthost gang to be sentenced to jail; he will spend more than 7 years in prison. He was also ordered to forfeit more than $2.5 million in property.Read More
Are terrorists really any different from cybercriminals? We stumbled upon terrorist content during our investigations on cybercriminal activity in the underground, and after a thorough analysis of it, we uncovered parallels in the way these two distinct groups operate online.
Terrorists’ usage of the Internet in their operations has been under heavy discussions as of late, with recent events such as the Paris and Belgium attacks bringing the controversial subject to the forefront. When terrorist groups make use of the latest cyber technologies, techniques, and applications spanning across mobile, surface web, as well as deep and dark web, it makes the problem of tracking them even that much harder.Read More