Encrochat: Constitutional Court again rejects appeal against conviction
The Federal Constitutional Court has rejected an appeal against a prison sentence imposed on the basis of Encrochat data, despite skepticism from the ECJ.
Encrochat: Constitutional Court again rejects appeal against conviction
The Federal Constitutional Court has rejected an appeal against a prison sentence imposed on the basis of Encrochat data, despite skepticism from the ECJ.
Dark Web Hydra Market Mastermind Sentenced to Life by Russia https://hackread.com/dark-web-hydra-market-mastermind-life-prison-russia/ #Cybersecurity #CyberCrime #DarkWeb #DarkNet #darkweb #Russia #Drugs #Fraud #Hydra #Scam
#SouthKorean police have arrested a CEO and five employees for manufacturing over 240,000 satellite receivers pre-loaded or later updated to include DDoS attack functionality at a purchaser's request. #CyberCrime https://www.bleepingcomputer.com/news/security/korea-arrests-ceo-for-adding-ddos-feature-to-satellite-receivers/
Encrochat: Verfassungsgericht weist Beschwerde gegen Verurteilung erneut zurück
Das Bundesverfassungsgericht hat trotz Skepsis des EuGH eine Beschwerde gegen eine Haftstrafe verworfen, die auf Grundlage von Encrochat-Daten verhängt wurde.
Interpol's Operation HAECHI V nets 5,500+ arrests & $400M+ in seized assets fighting global cybercrime. #Cybercrime #Interpol #HAECHI5
More details: https://thehackernews.com/2024/12/interpol-arrests-5500-in-global.html - https://www.flagthis.com/news/7187
Russian government confirms rare criminal charges against #ransomware cybercriminal
BKA (Germany): Administrator der größten deutschsprachigen Handelsplattform für illegale Waren und Dienstleistungen festgenommen (German language)
English translated title: "Administrator of the largest German-speaking trading platform for illegal goods and services arrested"
Germany's Federal Criminal Police Office (BKA) shut down the servers belonging to the criminal trading platform "Crimenetwork" and arrested one of the administrators yesterday. The platform was considered the largest German-speaking online marketplace for the underground economy and had been active for many years. Crimenetwork served as a marketplace for illegal goods and services, especially stolen data, drugs and forged documents since 2012. Crimenetwork used Bitcoin (BTC) and Monero (XMR) and received commission payments of 1-5% of the sale value for processing the sales. Sellers also paid monthly fees to the platform for advertising and sales licenses. BKA said that between 2018-2024, sales generated at least 1,000 BTC (today worth 90 million Euros) and 20,000 XMR (3 million Euros) were generated via Crimenetwork. The 29-year old is the technical administrator for the platform. Assets around 1.000.000€ (one million Euros) in cryptocurrency assets were seized along with "extensive evidence and high-value vehicles."
h/t Bleeping Computer: Police seizes largest German online crime marketplace, arrests admin
Dutch National Police: Opnieuw versleutelde communicatiedienst criminelen ontmanteld (Dutch language)
English translated title: "Criminals' Encrypted Communications Service Dismantled Again." Politie provides more information in their press release compared to EUROPOL (see parent toot above). MATRIX is an international crypto communication service considered the successor to ANOM, Sky ECC and EncroChat which were previously taken down. The Matrix takedown is known as Operation Passionflower:
At the request of the Dutch authorities, two people were arrested in Marbella, Spain by the Policia nacional, udyco central. This concerns the suspected owner and manager of the service, a 52-year-old man of Lithuanian nationality. A 30-year-old Dutch suspect was also arrested who actively participated in the criminal service for some time. This Dutch suspect is also suspected of international cocaine trafficking in 2020 based on messages from the crypto communication service Sky ECC. There have been 6 house searches in southern Spain and a freezing order has been placed on one of the homes, with an estimated value of more than 15 million euros. The most important servers in France and Germany have been taken down. During the actions, 145,000 euros in cash and half a million euros in cryptocurrencies were seized. In addition, four vehicles were seized and more than 970 telephones were seized. There were also 6 searches in Lithuania today. The police do not rule out more arrests.
SpyLoan: l'incubo Android con 8 milioni di download
#Android #AppDannose #Cybercrime #DatiPersonali #Estorsione #Google #IngegneriaSociale #McAfee #Notizie #PlayStore #Prestiti #ProtezioneDati #Sicurezza #SpyLoan #Tecnologia #Truffeonline
https://www.ceotech.it/spyloan-lincubo-android-con-8-milioni-di-download/
Windows 10 Addio! Ora Microsoft Ti Lascia Installare Windows 11 a tuo rischio e pericolo
NATO to step up action against Russian, Chinese ‘sabotage’ | Russia-Ukraine war News https://www.byteseu.com/526196/ #AsiaPacific #China #Conflicts #Cybercrime #cybersecurity #Europe #Finland #INFRASTRUCTURE #News #Russia #RussiaUkraineWar #Sweden #Technology
Europol azzera MATRIX: arresti lampo e sequestri di smartphone Pixel! #CyberCrime #Sicurezza
Untergrund-Marktplatz: BKA legt Crimenetwork still und verhaftet Techniker
Ermittler werfen dem Verdächtigen vor, eine illegale Handelsplattform im Darknet betrieben und sich an Drogenhandel beteiligt zu haben. Er sitzt in U-Haft.
EUROPOL: International operation takes down another encrypted messaging service used by criminals
MATRIX is an encrypted messaging service "made by criminals for criminals," that was invitation-only. It was first discovered by Dutch authorities on the phone of a criminal who murdered a Dutch journalist in 2021. Today EURPOL announced the takedown of MATRIX by Dutch and French authorities (infrastructure contained over 40 servers), and several search warrants and arrests were executed in Spain, the Netherlands, Lithuania, France, and Germany. Law enforcement was able to monitor messages for 3 months, deciphering over 2.3 million messages in 33 languages. Intercepted messages were linked to international drug trafficking, arms trafficking and money laundering.
Unit 42: Threat Assessment: Howling Scorpius (Akira Ransomware)
Not to be outdone by Check Point Research, Unit 42 provides a whole ransomware actor profile for Akira Ransomware. Akira is a Ransomware-as-a-Service (RaaS) group relying on a double extortion strategy. They operate a Tor-based data leak site for listing victims and exfiltrating stolen data. Unit 42 describes targeted regions and industries, and provides a technical analysis of Akira's attack lifecycle. Vulnerabilities they exploit include CVE-2020-3259 (7.5 high) Cisco ASA and FTD Information Disclosure Vulnerability and CVE-2023-20269 (5.0 medium) Cisco ASA and FTD Unauthorized Access Vulnerability. Indicators of compromise include Check Point Research's single SHA256 hash, listed as Akira_v2.
Check Point Research (CPR): Inside Akira Ransomware's Rust Experiment
Check Point Research analyzed the construction and control flow of Akira ransomware's Rust version that circulated in early 2024, which has specific features uniquely targeting ESXi servers. Their analysis demonstrates how Rust idioms, boilerplate code, and compiler strategies come together to account for the complicated assembly. The report outlines principles to follow when analyzing in-the-wild Rust binaries in general. We present an analysis of the design strategies used by the malware's authors, as indicated by the assembly and parts of the reconstructed source code. Indicators of compromise provided.
Scammers are getting past multi-factor authentication (MFA) by stealing session cookies - small bits of data that keep you logged in. To help protect your business, keep devices updated and be cautious about the websites you use
#Cookies #CyberCrime #MFA https://cybersecuritynews.com/hackers-hijack-mfa-enabled/
Con Visual Studio Code Puoi scrivere programmi per Commodore 64!
https://www.redhotcyber.com/post/visual-studio-code-3-commodore-64/
Südkoreanischer Hersteller verkaufte 240.000 Satellitenreceiver mit versteckter DDoS-Funktion. CEO und fünf Mitarbeiter wurden verhaftet. #Cybercrime #DDoS https://winfuture.de/news,147242.html?utm_source=Mastodon&utm_medium=ManualStatus&utm_campaign=SocialMedia
Supply Chain e DDoS tra le Stelle. Trovati Ricevitori Satellitari con modulo DDoS interno