🔍 Hunting Rituals Edition #3 is now live!
The preceding editions (#1 & #2) of the blog series talk about intrusion tactics used by attackers to linger within an organization’s network undetected.
In Edition #3, we unravel a long-term persistence technique – scheduled tasks, used for the persistent execution of malware.
Read Roman Rezvukhin’s (Head of Malware Analysis and Threat Hunting Team at Group-IB) insights on how the technique is implemented and hunting strategies for effective and timely incident response.
📖 Learn all about it
#ThreatHunting #IncidentResponse #SecurityInsights #FightAgainstCybercrime
The preceding editions (#1 & #2) of the blog series talk about intrusion tactics used by attackers to linger within an organization’s network undetected.
In Edition #3, we unravel a long-term persistence technique – scheduled tasks, used for the persistent execution of malware.
Read Roman Rezvukhin’s (Head of Malware Analysis and Threat Hunting Team at Group-IB) insights on how the technique is implemented and hunting strategies for effective and timely incident response.
📖 Learn all about it
#ThreatHunting #IncidentResponse #SecurityInsights #FightAgainstCybercrime
🔥5👍2
🏠 "This is my house. I have to defend it," says Kevin in Home Alone. And so should you. Criminals have their own reasons to celebrate the holiday season: people are relaxed and distracted, while security teams are understaffed due to vacations. Check our Medium article to gain wisdom from little Kevin and our experienced DFIR team.
#HomeAlone #DFIR #cybersecurity #ransomware
#HomeAlone #DFIR #cybersecurity #ransomware
Medium
Protecting against the seasonal spike in ransomware attacks: Lessons from Home Alone
With Christmas already past and the New Year approaching, people around the globe are spending time with their families, watching holiday…
👍8🔥3❤2
Media is too big
VIEW IN TELEGRAM
This year was truly incredible as we marked multiple global milestones and celebrated our 20th anniversary, creating countless happy memories together.
We want to express heartfelt gratitude to our partners, clients, followers, and all of you for being with us throughout this year. May 2024 bring breakthroughs in cybersecurity, along with prosperity, joy, and success in all aspects of your lives. As we stand united in the fight against cybercrime, let's welcome the new year together.
Happy New Year! 🎉
#HappyNewYear #cybersecurity #FightAgainstCybercrime
We want to express heartfelt gratitude to our partners, clients, followers, and all of you for being with us throughout this year. May 2024 bring breakthroughs in cybersecurity, along with prosperity, joy, and success in all aspects of your lives. As we stand united in the fight against cybercrime, let's welcome the new year together.
Happy New Year! 🎉
#HappyNewYear #cybersecurity #FightAgainstCybercrime
❤15👍3🎉1
✍️ Hopefully, your new year starts with a list of resolutions… And if yours contains at least a couple of those points we are going to mention down below, we've hit home:
✅ Making intelligence-driven decisions only
✅ Getting a robust SOC
✅ Building a cyber threat intelligence program for your organization
✅ Never missing a single cybersecurity trend
✅ Testing actionable and unique frameworks
Hurry up to discover our brand new ebook The Art of SOC, a perfect roadmap to playing your best hand in 2024.
#cybersecurity #securityoperationscenter #SOC #threatintelligence #ebook
✅ Making intelligence-driven decisions only
✅ Getting a robust SOC
✅ Building a cyber threat intelligence program for your organization
✅ Never missing a single cybersecurity trend
✅ Testing actionable and unique frameworks
Hurry up to discover our brand new ebook The Art of SOC, a perfect roadmap to playing your best hand in 2024.
#cybersecurity #securityoperationscenter #SOC #threatintelligence #ebook
👍8🔥2
📖 We've got an interesting weekend read for you! Dive into the fascinating world of scams with our newest Medium article — the kickoff to our series on their evolution. In part 1, we explore the origins of scams on underground forums. Check it out here and hit that Follow button on Medium to stay tuned for the upcoming pieces in this captivating series.
#cybersecurity #WeekendReads #scam #undergroundforums
#cybersecurity #WeekendReads #scam #undergroundforums
Medium
The history of scams: Part 1
How petty theft online grew into an organized criminal market
👍6🔥4❤1
🌐 Walk with us through the dark alleys of crypto phishing! Meet Inferno Drainer, aiming to snatch your hard-earned funds. This crypto drainer operates under the scam-as-a-service model and harbors malicious noscripts that spoof popular Web3 protocols to obtain the victim's consent for authorizing fraudulent transactions.
Dive into our blog, where we dissect one of the most notable pieces of malware from the past year.
#Cybersecurity #cryptothreats #cryptoscams #phishing #cryptowallets #cryptodrainer
Dive into our blog, where we dissect one of the most notable pieces of malware from the past year.
#Cybersecurity #cryptothreats #cryptoscams #phishing #cryptowallets #cryptodrainer
🔥9👍2
🎲 Beat the cheaters at their own game! This article explores how anti-fraud systems with explainable AI are protecting online betting & gaming. Click here to learn more about how AI is keeping the games fair.
#cybersecurity #antifraud #artificialntelligence #fraudprotection #gaming #betting #ExplainableAI
#cybersecurity #antifraud #artificialntelligence #fraudprotection #gaming #betting #ExplainableAI
Amazon
How anti-fraud systems use explainable AI to protect the betting and gaming industry | Amazon Web Services
Online betting and gaming are businesses with strict rules and regulations. To stay profitable and comply with laws, licensed operators develop mechanisms to restrict illegitimate customers from using their platforms. Fraudsters’ malicious activity can lead…
👍10
📰 This week our fine-grained investigation into Inferno Drainer’s multi-million crypto scam scheme hit headlines! Despite the announced shutdown, the scam vendor’s customers continue to attack, and the number of victims is growing. To stay on guard, check the recap with key findings in our Medium post.
#recap #cybersecurity #cryptodrainer #scam #crypro
#recap #cybersecurity #cryptodrainer #scam #crypro
Medium
Goodbye Inferno Drainer?
How the scam service stole millions of dollars and why it’s still dangerous
👍11🔥1
🌐 Fighting cybercrime together!
Group-IB played a pivotal role in Operation Synergia, a INTERPOL-led initiative across 50+ countries targeting cybercrime. Our experts identified over 500 phishing sites and 1,900+ malware IP addresses. Collaboration with law enforcement led to 31 arrests and the takedown of numerous C2 servers. Learn more in our press release.
#Cybersecurity #OperationSynergia #INTERPOL #phishing #ransomware #bankingmalware
Group-IB played a pivotal role in Operation Synergia, a INTERPOL-led initiative across 50+ countries targeting cybercrime. Our experts identified over 500 phishing sites and 1,900+ malware IP addresses. Collaboration with law enforcement led to 31 arrests and the takedown of numerous C2 servers. Learn more in our press release.
#Cybersecurity #OperationSynergia #INTERPOL #phishing #ransomware #bankingmalware
❤6👍4🔥2
⬆️ Amid rising cyber threats, organizations must bolster their defense capabilities. An effective approach in achieving this is through a DFIR service provider.
Gartner Market Guide for Digital Forensics and Incident Response Retainer Services gives a pretty comprehnsive view.
Excited to announce Group-IB's recognition as a Representative Vendor for "Group-IB Incident Response Retainer" for the third consecutive time.
Get complete information here.
#Cybersecurity #DFIR #IncidentResponse #Gartner
Gartner Market Guide for Digital Forensics and Incident Response Retainer Services gives a pretty comprehnsive view.
Excited to announce Group-IB's recognition as a Representative Vendor for "Group-IB Incident Response Retainer" for the third consecutive time.
Get complete information here.
#Cybersecurity #DFIR #IncidentResponse #Gartner
👍4🤬1
🚨New cyber threat uncovered. Meet ResumeLooters, the malicious group that exploits resumes and targets primarily APAC employment agencies and retailers. With SQL injections, cybercriminals compromised 65 websites, affecting over 70% of victims in the Asia-Pacific.
Our blog delves into their tactics, providing IoCs and expert recommendations for safeguarding against SQL injection and XSS attacks: dive into it here.
#cybersecurity #ThreatIntelligence #ResumeLooters #retail #jobseekingsites #cyberthreats
Our blog delves into their tactics, providing IoCs and expert recommendations for safeguarding against SQL injection and XSS attacks: dive into it here.
#cybersecurity #ThreatIntelligence #ResumeLooters #retail #jobseekingsites #cyberthreats
👍9❤3
🦾 We're dedicated to fighting cybercrime, and our flagship product, the Unified Risk Platform, just got even better with new AI-powered updates! Swipe through our cards to learn more about these key enhancements.
For further details, check our press release.
#Cybersecurity #AI #UnifiedRiskPlatform #ProductUpdates
For further details, check our press release.
#Cybersecurity #AI #UnifiedRiskPlatform #ProductUpdates
👍4👏2
🤔 Did you know cybercrime operates a lot like your favorite subnoscription services? But instead of binge-worthy shows, hackers subscribe to monthly plans for malware, DDoS attacks, and more.
Unveil the secrets of the cybercrime-as-a-service world with our latest Medium article. Read it now: https://group-ib.medium.com/cybercrime-as-a-service-7-real-life-examples-with-pictures-cbe37ec3b30b
#Cybersecurity #Cybercrime #CybercrimeAsAService
Unveil the secrets of the cybercrime-as-a-service world with our latest Medium article. Read it now: https://group-ib.medium.com/cybercrime-as-a-service-7-real-life-examples-with-pictures-cbe37ec3b30b
#Cybersecurity #Cybercrime #CybercrimeAsAService
Medium
Cybercrime as a service: 7 real-life examples (with pictures)
Subnoscription services that hackers use to conduct attacks
🔥9
🛑 New Trojan Alert!
Group-IB's Threat Intelligence Unit has identified a new Trojan targeting the APAC region, notably Thailand and Vietnam. Meet GoldPickaxe.iOS, the first iOS Trojan aimed at harvesting facial recognition data for unauthorized bank account access.
Stay informed by checking out our latest blog post.
#Cybersecurity #iOSTrojan #ThreatIntelligence #GoldFactory
Group-IB's Threat Intelligence Unit has identified a new Trojan targeting the APAC region, notably Thailand and Vietnam. Meet GoldPickaxe.iOS, the first iOS Trojan aimed at harvesting facial recognition data for unauthorized bank account access.
Stay informed by checking out our latest blog post.
#Cybersecurity #iOSTrojan #ThreatIntelligence #GoldFactory
🔥7❤6👍2😱1