Telegram Channels Unveiled: The Hidden Dangers Lurking in Shared Files
Telegram Channels Unveiled: The Hidden Dangers Lurking in Shared Files In today’s interconnected world, cyberspace has become a breeding ground for legitimate and malicious activities; Telegram, a pop...
Dark Web Profile: Bjorka
Dark Web Profile: Bjorka In the ever-evolving landscape of cyber threats, understanding the profiles of individual threat actors is crucial for both governments and private organizations to take actio...
SMS Bomber: How Dangerous Can a Text Be?
SMS Bomber: How Dangerous Can a Text Be? Among the ever-evolving threats in the world of cybersecurity, SMS Bomber attacks are emerging as a modern danger that can have significant and disturbing cons...
Top 5 Dark Web Search Engines
Top 5 Dark Web Search Engines Shadowy depths of the internet, where anonymity reigns, and curiosity intertwines with caution. In this blog post, we delve into Dark Web search engines. Hidden from the ...
Evil-GPT Sale, Paramount Plus and Casio Data Leak & Unauthorized A...
Evil-GPT Sale, Paramount Plus and Casio Data Leak & Unauthorized Access Sales The SOCRadar Dark Web Team continuously uncovers incidents that endanger various entities by monitoring the hidden rec...
Dark Web Profile: Big Head Ransomware
Dark Web Profile: Big Head Ransomware While ransomware groups such as ALPHV and Lockbit 3.0 continue to hit big companies and make headlines with the large-sized files they steal, there are also actor...
Dark Web Sales: Unauthorized Citrix Access, Credit Cards, and Student ...
Dark Web Sales: Unauthorized Citrix Access, Credit Cards, and Student Documents The SOCRadar Dark Web Team has been tirelessly monitoring the deep corners of the internet, and their efforts have unear...
Threat Profile: Rhysida Ransomware
Threat Profile: Rhysida Ransomware [Update] November 16, 2023: See the subheading: “Collaborative Advisory by CISA, FBI, and MS-ISAC on Rhysida Ransomware.” [Update] February 13, 2024: “A Free Decrypt...
Major Cyberattacks in Review: July 2023
Major Cyberattacks in Review: July 2023 The major cyberattacks of July 2023 included waves of data breaches, affecting both private and public sector entities, including healthcare organizations, fina...
Top 10 Ransomware Demands
Top 10 Ransomware Demands In cyberspace, few threats rival ransomware attacks’ pervasive and destructive nature. As our interconnected world grows, these digital extortionists demonstrate unpara...
Zero-Day RCE Sale, Pizza Hut Access Sale & More
Zero-Day RCE Sale, Pizza Hut Access Sale & More Welcome to the twisted world of the Dark Web, where the illicit trade of cyber weapons and stolen data thrives under the cover of anonymity. In thi...
Dark Web Profile: 8Base Ransomware
Dark Web Profile: 8Base Ransomware In today’s cyber world, while the ransomware scene remains dynamic and active, new actors are emerging with significant numbers of victims. In this article, we will ...
Russia-Linked APT Group Gamaredon Starting Extortion 30-50 Minutes Aft...
Russia-Linked APT Group Gamaredon Starting Extortion 30-50 Minutes After First Initial Access The threat group, Gamaredon, linked to Russia, has been observed engaging in data exfiltration activities ...
APT Profile: Kimsuky
APT Profile: Kimsuky In cyberspace, the Korean Peninsula has been a hotbed of activity for a while. With conflict unfolding between North and South Korea, North Korean Advanced Persistent Threats (APT...
Roblox Data Breach, Unauthorized Access Sales, and Global Leaks
Roblox Data Breach, Unauthorized Access Sales, and Global Leaks Welcome to SOCRadar’s weekly dark web news digest. This week, we spotlight several critical cybersecurity incidents: a significant...
Dark Web Threat Profile: CLOP Ransomware
Dark Web Threat Profile: CLOP Ransomware [Update] August 7, 2023: Clop ransomware has now adopted Torrents as a distribution method for the stolen data. See more under: “Clop Adopts New Extortion Appr...
An Ongoing DDoS Campaign Targeting Sweden
An Ongoing DDoS Campaign Targeting Sweden Following an Islamophobic incident where the Qur’an was burned in Stockholm, Sweden, a new wave of cyber attacks, named #OpSweden, has emerged with sign...
Underground Fully UnDetectable (FUD) Crypter Market
Underground Fully UnDetectable (FUD) Crypter Market The rapidly evolving threats in the field of cybersecurity are being met with sophisticated methods such as “FUD” (Fully UnDetectable) crypters, whi...
Inside the Mind of a Ransomware Boss: An Interview with the LockBit Ad...
Inside the Mind of a Ransomware Boss: An Interview with the LockBit Administrator As the effectiveness of ransomware attacks continues to escalate, they have emerged as the most significant challenge ...
Healthcare Data, Zero Day Exploit, and ATM & POS Malware Sales
Healthcare Data, Zero Day Exploit, and ATM & POS Malware Sales This week, there’s a chilling offer on the dark web involving sensitive data from the U.S. healthcare industry. But that’...