Discover and read the best of Twitter Threads about #cybercrime

Most recents (24)

Breaking News! Massive data breach rocks online lingerie retailer. Hackers targeted their website, compromising the private information of 1.5 million women. Cybersecurity authorities are on the case, apprehending the suspect & uncovering shocking details #DataBreach

Thread🧵: Image
Udaipur, Rajasthan - the origin of a chilling cybercrime. Rajasthan's SOG unveils a Twitter profile, @Cyber_Huntss, operating from Udaipur. Swift action ensues, leading to the arrest of suspect Sanjay Soni. The investigation takes a riveting turn. #CyberCrime #ArrestMade +
Sanjay, a self-proclaimed Hindu Nationalist, is notorious for provocative social media posts. Attention catches fire as BJP minister Laxmikant Bhardwaj joins the fray, seeking updates from Rajasthan Police. The plot thickens. 

Unveiling the truth - Sanjay's +
Read 12 tweets
Dark Web Data Leak Exposes RaidForums Members

Nearly half a million members of a notorious cybercrime forum have had their details publicly exposed after a key database was published on another hacking site.

#DarkWeb #RaidForums #Cybercrime…
"#Cybersecurity researchers at VX-Underground confirmed the news that over 478,000 users of RaidForums had their data leaked on up-and-coming forum Exposed."
"A screenshot shared by Emsisoft threat analyst, Brett Callow, shows the leak was posted by an Exposed admin known as "Impotent."

Read 4 tweets
📍How #AadharCard can destroy your whole life saving bank balance.
👉 If you have linked your #aadhar with the bank account then must read.

Here is the complete thread with proof 🧵👇
1/8 First thing you must know :
When you get a bank account
❌Internet banking is turned off by default,
❌Debit/Credit card is turned off by default
#Aadhaar Enabled Payment Systems are enabled by default

So that means you can withdraw through Aadhar card finger prints
So, what is happening in India if you have not turned off your #aadhar biomatrices (Few persons turned off) then anyone can use your finger print to withdrawal your money.

👉Now big questions :-
How anyone can get your fingerprints ⁉️
Is transaction possible without OTP ⁉️
Read 10 tweets

An international operation involving the National Crime Agency has taken down one of the biggest online marketplaces selling stolen credentials to criminals worldwide.

Genesis Market was a go-to service for criminals seeking to defraud victims.

The platform hosted 80 million credentials and digital fingerprints stolen from over two million people.

Led by the @FBI and @Politie, activity to take the site down involved 17 countries.
As part of the investigation, the NCA identified hundreds of UK-based users of the platform and information was passed to policing partners.

This resulted in 47 warrants being executed in coordinated raids by the NCA, Regional Cyber Crime Units and police forces.
Read 4 tweets
Sextortion, It's Process And How To Deal With It

1/4 Image
The Process of Sextortion

2/4 Image
Who Are Victims of Sextortion

3/4 Image
Read 4 tweets
🧵 While #ChatGPT is grabbing the headlines, pushing @GoogleAI (#LaMDA) and @Baidu_Inc to rush their plans to launch competitors, maybe it’s time to explore the security/privacy concerns generative AIs raise.

Here's a #thread on some of these, brought to you by @InfosecurityMag.
@GoogleAI @Baidu_Inc @InfosecurityMag First, @OpenAI’s #ChatGPT has already been used to develop #malware and other malicious tools, as @a_mascellino reported on January 9, 2023. #encryption #cybercrime cc @SShykevich @_CPResearch_…
Read 15 tweets

FIN7 UNVEILED: A deep dive into notorious cybercrime gang

The big day is finally here! 🎊After months of tireless research and analyses, we can present you with the most insightful information: an extensive report on the notorious #cybercrime gang #FIN7.
Thanks to the PTI team, we obtained never-seen-before information about FIN7’s inner workings. We got a deeper understanding of their organizational structures, identities, attack vectors, and proof-supported affiliations with other ransomware groups, among others.
The most enticing remarks of the report are:

🔹 Unveiling FIN7’s development of an auto attack system to exploit the most profitable targets based on their revenue, employee count, headquarters’ location, and website information
Read more👇
Read 7 tweets
🚨New #MicrosoftExchange #vulnerabilities were disclosed, including CVE-2022-41040 and CVE-2022-41082. Threat actors can easily exploit the new vulnerabilities, and bypass #ProxyNotShell URL rewrite mitigations, resulting in many companies facing further #ransomware #attacks.
An example of what such an exploit can do is shown in the picture below, where the #threat actor #FIN7 developed tailored systems to quickly discover and infiltrate the high-value targets by performing mass scans using #Microsoft #exchange #vulnerabilities.
Our PTI team has already observed activities involving recent vulnerabilities in the wild. Therefore, #PRODAFT recommends that companies fix the vulnerabilities as soon as possible to avoid serious consequences.
Read 4 tweets
Is Australia's data breach wave a coincidence, bad luck or intentional targeting? Maybe all three. But the security weaknesses that have led to the incidents are not exotic. Here's an analysis 🧵 #auspol #infosec #cybercrime @CyberGovAU @ClareONeilMP
None of intrusions are the result of indefensible exploits. The culprits are the usual suspects: an insecure API, compromised credentials, a failure to quickly patch, everyday account takeovers and bad development practices.
And the people behind these attacks are most likely workaday cybercriminals, not your top-level nation-state attackers. What follows is a breakdown of the breaches and incidents:
Read 13 tweets
🚨 North Korean APT group responsible for crypto and NFT phishing campaign spanning over 190 domains

Targeting dozens of $ETH and $SOL projects.

Uses collections on NFT marketplaces to lure victims to malicious minting sites.


#Phishing #NFT #NorthKorea #cybercrime
Campaign activity began in April and is on-going.

The following domains have been registered in the past three days:


Full list of domains at the end.

2/ DPRK phishing site golddao.siteDPRK phishing site seveneyes.onlineDPRK phishing site tapfantasy.inDPRK phishing site
Campaign used @OVH and @Leaseweb dedicated hosting.



Read 20 tweets

வணக்கம் மக்களே இப்ப இருக்க டிஜிட்டல் உலகத்துல ஒருத்தர் 2 போன் கூட வச்சி உலகத்தின் எந்த மூலைக்கும் பேசுறாங்க. இது ஒரு டிஜிட்டல் புரட்சி தான் ஆனா கொஞ்சம் ஆபத்தும் நிரஞ்சது கூட. இப்ப நம்ப கைல ஆதார் கார்டு வந்ததும் வந்துச்சி கேக்குற இடத்தில
எல்லாம் குடுத்து வச்சோம். இப்ப அதன் மூலமா நம்ப பேர்ல எத்தன சிம் வாங்கி இருக்கு அப்படினு யாருக்கும் தெரிவது இல்ல அத கண்டுபிடிக்க அரசாங்கம் ஒரு வெப்சைட் ஓபன் பண்ணி இருக்காங்க. இந்த லிங்க் கிளிக் பண்ணி உள்ள போனா 👇👇👇 இந்த மாதிரி ஒரு கூகுள் பக்கம் வரும்
அதுல முதல்ல இருக்க பக்கத்த ஓபன் பண்ணுங்க. இப்ப கீழ இருக்க👇👇👇 மாதிரி ஒரு பக்கம் வரும். அதுல நீங்க ஆதார் எண்ணுடன் இணைத்து வைத்து உள்ள போன் நம்பர் குடுங்க. அதுக்கு அப்புறம் genarate OTP குடுத்தா உங்க நம்பர்க்கு ஒரு OTP வரும்
Read 6 tweets
Since your malicious cyberattack timelines matched cybersecurity’s research to strengthen security for years and now, you hack alone but with a cooperative goal to damage national security. Which Advanced Persistent Threats group/s #APTs are you in, #Animez_UK? Image
Converting traditional crime to cyber-enabled crime and becomes a malicious attacker against the UK, for

1- financial income,
2- #sexual desire and #harassment with #pornography sent to #women,
3- attacks for #politics against the UKGOV.

#Animez_UK ImageImage
1st stage- early life:
-Experienced #exclusion/#discrimination.
-Didn’t learn to communicate with #women.
-favours #authoritarianism.
-enjoys #control targeted women & whom against his will.
- Expresses hidden #hatred & #violence on through cyberattacks.

#Animez_UK ImageImage
Read 214 tweets
Wie kann man so krass abstürzen? Ken Jepsen ca. 2011Ken Jepsen ca. 2022
Ich glaub' den muss ich mir archivieren...…
Read 297 tweets
Als ich im Dezember in Kiew war, wurde meine Kreditkarte gesperrt. Das Sicherheitssystem der Bank dachte, ich sei gehackt worden (Ukraine=#Cybercrime!) Dabei hatte ich mit der gleichen Karte den Flug gekauft. Ist die Banken-KI so schlecht? Ich begann zu recherchieren. (Thread)
Auch in meiner Recherche zum #Europol-Scam fiel mir auf, wie schlecht Banken offenbar aufgestellt sind: Eine Frau hatte zehn Mal rund 2000 Euro unter anderem an unbekannte Konten in Singapur überwiesen. Und 20.000 Euro an eine Kryptowährungsbörse.… 2/13
Nicht verdächtig, fand die beteiligte Bank sowie der Dienstleister Wise. Obwohl die Frau noch nie ihr gesamtes Geld nach Singapur überwiesen und in Bitcoin investiert hatte. Sowohl die Bank als auch Wise versicherten mir, dass sie ausgefeiltes maschinelles Lernen einsetzen. 3/13
Read 13 tweets
Having fun with cyberstalking #UKGOV, attacking organisations, universities & individuals connected to the justice system, UK #military against #NCSC, treating #intelligence & #GCHQ as jokes to your 15- 20 yrs malicious #hacking for #China & #Russia inside #Britain, @Animez_UK?01
Converting #traditional crime to cyber-enabled crime and becomes a malicious #cyberattacker against the UK, for

1- #financial income,
2- #sexual desire and #harassment with #pornography sent to #women,
3- attacks for #politics against the #UKGOV.

@Animez_UK @NCSC

02 Image
1st stage- early life:
-Experienced #exclusion/#discrimination.
-Didn’t learned to communicate with #women.
-favours #authoritarianism.
-enjoys to #control targeted women & whom against his will.
- Expresses hidden #hatred & #violence on through cyberattacks.

@Animez_UK @NCSC Image
Read 188 tweets
#ICYMI, here's a #threatintel related🧵👇 by me on @USTreasury advisory on DPRK IT workers' attempts to obtain employment while posing as non-North Korean nationals:… (1/?)
DPRK IT workers "engage in a wide range of IT dev work, such as: mobile & web-based apps, virtual currency exchange platforms & digital coins. Some
designed virtual currency exchanges or created analytic tools/apps for virtual currency traders & marketed their products." (2/?)
This reminds me, for example, of Marine Chain Token: (…;…), #AppleJeus (…) and, more recently, #TraderTraitor (…). #HIDDENCOBRA/#APT38 loves loves loves their crypto (3/?)
Read 14 tweets

Dangers of twitter copycat posters 🧵

Copycat accounts are scams, designed to trick and prey on the #fintwit community.

DON’T let it happen to you.
Be aware. I’m going to show you how it works!

I tracked my interactions with copycats. I documented it with screenshots.👇

These are the original accounts I have noticed this happening to:


Copycat created accounts subtly change the name, notice the extra (l)?


And copy the same profile picture

The copycat replies to a comment a follower has made on an original post. (Often way down the thread so the original account holder does not notice)

Clever right!

They invite the follower to join them on the telegram app.

“Chat me on telegram”
Read 11 tweets
#cybercrime - A🧵- Did you know that losses connected to internet crimes were estimated to be $6.9 billion last year? This is a significant increase from $42.2 billion in 2020.
More than 40 percent of experts surveyed by Allianz Global Corporate & Specialty think that cybercrime and business interruption will be the biggest business risks in 2022.
Data from security firm Blackfog shows that from January to November of this year, 244 ransomware hacks were publicized, an increase of 25 percent compared to the same period in 2020.
Read 9 tweets
1/4 Combination of sanctions and Western businesses exodus from Russia may soon result in an uptick of cyber attacks from the country even if the conflict in Ukraine deescalates. Among many other things, the recent leak of internal chat logs and sensitive data tied to Russian
2/4 cybercrime group Conti illustrate that Russian ransomware groups are seeking “employees” on local job-hunting websites. The current pace of Western businesses exodus including technology companies
3/4 will leave many IT talents in Russia without a legitimate income. Also the growing isolation of the Russian economy might in the worst case lead to the North Korean scenario and we can see
Read 6 tweets
Today #AllahabadHighCourt refused to quash criminal proceedings against one Niyaz Ahmad Khan booked for sharing PM Narendra Modi and Home Minister Amit Shah's morphed images on Facebook.

In 2018, Khan had shared one morphed photo of PM shaking hands with #terrorist Hafiz Saeed. Image
In another morphed photo shared by Khan, #PrimeMinister and #HomeMinister were shown feeding biscuits to dogs, on whom "Aaj Tak TV", "Zee TV" and "India TV" was written.
Taking note of Khan's act, Court observed,
"Use of Cyberspace by some people to vent out their anger and frustration by travestying the Prime Minister, Key-figures holding the highest office in the abhorrent."

#allahabadhighcourt #cybercrime
Read 6 tweets
"Our adversaries want to know what our weapon systems & space platforms can do...disrupt our operations" @NSAGov Cybersecurity Directorate Tech Dir Neal Ziring tells @INSAlliance

"We of course have to prevent this" by making sure vulnerabilities get fixed & stay fixed, he says
"Chinese threats in cyberspace are huge" per @NSAGov Cybersecurity Directorate Tech Dir Neal Ziring

"They are very aggressive at what they do" he says, noting US intel, pvt sector "watching them too"
"We have to understand their tradecraft & their intentions so we can work effectively to block them"
per @NSAGov's Ziring on #China hacking ops
Read 5 tweets
Cyberstalkers and extremists find their inspiration hile mirroring themselves. This the case for 🇵🇰Ramla Akhtar, tweeting under @BarefootRaRa & @BestInventoryFX
READ the article:…
#RamlaAkhtar #Cybercrime #BernardGrua #PamirInstitute @bernardgrua Ramla Akhtar, aka Rmala Aalam, accusations
@wrmly, thanks again for the retweet! 🙏
Pakistani 🇵🇰 cyberstalker #RamlaAkhtar, tweeting under #BarefootRaRa & #BestInventoryFX frequently mentions she is a brown woman from Karachi to allegate she's victim of "whyte" racism. Then, why is she flirting with French 🇫🇷 Far Right?
READ the article:… Ramla Akhtar, French far right
Read 4 tweets
🧵 Useful Websites

1⃣ Check if your email/ phone number is in a data breach

If yes, change your password immediately
#password #cybercrime
2⃣ Check the SMS Header of text message received on your phone

3⃣ To know how many SIM cards are purchased in your name;

Click here

Read 5 tweets
Many authorities around the world already invoke cybercrime or cybersecurity laws to punish journalists.

Here are three journalists currently accused under #cybercrime laws ⤵️…
Filipino journalist @mariaressa is battling a spate of spurious libel charges under the #Philippines’ 2012 Cybercrime Prevention Act in connection with reporting by her news website, Rappler, and could face a six-year prison sentence if one conviction is not overturned on appeal.
Bangladeshi reporter Ruhul Amin Gazi has been jailed for over a year without trial because a 2019 report published by his employer, the Daily Sangram newspaper, was available on the internet, triggering a criminal complaint under the Digital Security Act.…
Read 4 tweets

Related hashtags

Did Thread Reader help you today?

Support us! We are indie developers!

This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!