article thumbnail

How Cryptocurrency Turns to Cash in Russian Banks

Krebs on Security

A financial firm registered in Canada has emerged as the payment processor for dozens of Russian cryptocurrency exchanges and websites hawking cybercrime services aimed at Russian-speaking customers, new research finds. A machine-translated version of Flymoney, one of dozens of cryptocurrency exchanges apparently nested at Cryptomus.

article thumbnail

U.S. Justice Department Cracks Down on Scattered Spider Phishing Ring

SecureWorld News

The attacks have resulted in millions of dollars in theft, including cryptocurrency and sensitive corporate data, showcasing the ongoing threat of organized cybercrime. Scattered Spider has gained infamy for its high-profile cyberattacks, including the ransomware assault on MGM Casino in 2023 , which caused widespread disruption.

Phishing 107
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Over 39K unauthenticated Redis services on the internet targeted in cryptocurrency campaign

Security Affairs

Threat actors targeted tens thousands of unauthenticated Redis servers exposed on the internet as part of a cryptocurrency campaign. This may allow hackers to gain server privileges, delete or steal data, or even lead to an encryption extortion, critically endangering normal business services.” ” warns Censys.

article thumbnail

Ransomware Attacks on Schools: 'Dirty, Rotten Scoundrels' Stop Online Learning

SecureWorld News

"We talked about the possibility of waiting to the end of school, but our IT folks said, just like any other infection, the longer you let it go the worse it is going to get," said Assistant Superintendent of Business Services Larry Teixeira. It holds student demographics along with attendance.

article thumbnail

Cyber security guidance for small fleet operators

Pen Test Partners

This software can be used as part of a bot net to attack other organisations, use your processor power to mine for cryptocurrencies, or simply destroy data. Four common of cyber-attacks are: Malware attack malicious software is installed on your machines. are termed Information Technology (IT) systems.

article thumbnail

Q&A with Giles Inkson: A Guide to Digital Operational Resilience Act (DORA)

NetSpi Executives

It aims to establish frameworks and processes on how to conduct Information and Communications Technology (ICT) risk management across technology assets and key business services underpinning financial sector organisations, subject to audit. Twenty key types of businesses fall under the financial services umbrella.

article thumbnail

Spam and phishing in 2024

SecureList

Social media business services were increasingly used as a pretext for credential theft, as they play a key role in developing and promoting businesses and are directly linked to financial operations. Fraudsters claimed to offer cash-out services for in-game coins by converting them into rubles.