
The Week in Dark Web - 18 April 2022 - Access Sales and Data Leaks
The Week in Dark Web – 18 April 2022 – Access Sales and Data Leaks Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomware attacks, som...
![SOCRadar® Cyber Intelligence Inc. | Deep Web Profile: AgainstTheWest / BlueHornet [Part 1]](https://socradar.io/wp-content/uploads/2022/04/deep-web-profile-againstthewest-bluehornet.png.webp)
Deep Web Profile: AgainstTheWest / BlueHornet [Part 1]
Deep Web Profile: AgainstTheWest / BlueHornet [Part 1] In October 2021, a new leak group emerged in RaidForums with the handle AgainstTheWest. They have started actively targeting major organizations ...

‘Fullz,’ ‘Dumps,’ and More: What do Hackers Sell on the Black Market?...
‘Fullz,’ ‘Dumps,’ and More: What do Hackers Sell on the Black Market? It’s easy to appreciate the importance hackers place on stolen bank accounts, credit cards, and social security numbers. Each of t...

Is Nginx Zero-Day RCE Vulnerability False Alarm?
Is Nginx Zero-Day RCE Vulnerability False Alarm? On Saturday, April 9, it was announced that there was a zero-day RCE vulnerability for webserver Nginx version 1.18 in the post made from the Twit...

Android Banking Malware Octo Allows Remote Control on Infected Devices
Android Banking Malware Octo Allows Remote Control on Infected Devices A banking trojan Octo has been discovered, downloaded from the Google Play Store, and targeting banks and financial institutions....

New Remote Access Trojan (RAT) named Borat on the Darknet Markets
New Remote Access Trojan (RAT) named Borat on the Darknet Markets Threat actors are developing more advanced attack techniques every day. They even help non-technical attackers by publishing toolkits....

What Cyber Security Experts Think: How to Make Money on the Dark Web?
What Cyber Security Experts Think: How to Make Money on the Dark Web? People increasingly purchase and sell items in the Internet’s most obscure corners. Amazon, Shopify, Walmart, and eBay are all wel...

Dark Web Profile: Lapsus$ Extortion Group
Dark Web Profile: Lapsus$ Extortion Group [Update] August 11, 2023: The Cyber Safety Review Board (CSRB) published a review of the Lapsus$ extortion group’s attacks. Read more under: “A Review of Laps...

What's the Difference Between Dark Web, Deep Web and Dark Net?
What’s the Difference Between Dark Web, Deep Web and Dark Net? When people discuss the shady underbelly of the internet, stolen data, drugs, weapons, child pornography, rent killings, illegal it...

Is Lapsus$ Extortion Group "Officially Back from Vacation"?
Is Lapsus$ Extortion Group “Officially Back from Vacation”? The Lapsus$ group announced that they would be on vacation until March 30 after the notorious Okta attack. In the early hours of...

The Week in Dark Web - 28 March 2022 - Access Sales and Data Leaks
The Week in Dark Web – 28 March 2022 – Access Sales and Data Leaks Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomware ...

How to Identify Spear Phishing?
How to Identify Spear Phishing? Successful spear phishing accounts for up to 95 percent of all attacks on enterprise networks. Because of the proliferation of COVID-19, attacks escalated in 2020, with...

Automotive Industry Under Ransomware Attacks
Automotive Industry Under Ransomware Attacks Although the automotive industry has begun to digitalize its manufacturing facilities, most businesses still treat cybersecurity as an afterthought. Accord...

Telegram: A New Place for Hackers
Telegram: A New Place for Hackers One of the most commonly used messaging apps, Telegram, has become more and more popular ever since the privacy policy scandal of WhatsApp in January 2021. WhatsApp a...

Lapsus$ Group Allegedly Breached Okta After Microsoft Source Code Leak
Lapsus$ Group Allegedly Breached Okta After Microsoft Source Code Leak The Lapsus$ group has announced that they are responsible for authentication service provider Okta’s digital breach. Threat...

The Week in Dark Web - 21 March 2022 - Ransomware Attacks and Data Lea...
The Week in Dark Web – 21 March 2022 – Ransomware Attacks and Data Leaks Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ranso...

Dark Web Profile: AvosLocker Ransomware
Dark Web Profile: AvosLocker Ransomware AvosLocker was first detected in 2021, and it usually appears as ransomware targeting Windows systems. After a variant targeting Linux environments emerged, str...

An Overview on Conti Ransomware Leaks: Is This the End for Conti?
An Overview on Conti Ransomware Leaks: Is This the End for Conti? Along with Russia’s physical invasion of Ukraine on February 24th, 2022, Russia has targeted and attacked Ukraine in cyberspace. There...

B1txor20 Malware Exploiting Log4J Vulnerability
B1txor20 Malware Exploiting Log4J Vulnerability Since the Log4J vulnerability was discovered, some other malware showed up and exploited it. B1txor20 seems to take its place among the participants in ...

Deep Web Profile: APT41/Double Dragon
Deep Web Profile: APT41/Double Dragon APT41 (also known as Double Dragon) is a well-known cyber threat group that carries out Chinese state-sponsored espionage as well as financially motivated operati...
Warning: Undefined variable $postsAll in /var/www/html/wp-content/themes/socradar/category.php on line 175