Cybercrime and Dark Web Research

Show
Security Practitioner’s Guide to Email Spoofing and Risk Reduction
January 24, 2019

In our previous extended blog, Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It, we …

read more

The Way of Hacking

November 10, 2015

In the Japanese martial art of Aikido it is said that “Kurai Dori” is the ability of a skilled practitioner, …

read more

Emerging Markets: Online Extortion Matures via DDoS Attacks

November 9, 2015

Unlike scenes from books or movies where shadowy figures hold manila envelopes containing information or photographs pertaining to an unsuspecting …

read more

Crackas With Attitude strike again?

October 28, 2015

Last week, the New York Post reported that hackers had compromised the personal email address of CIA Director, John Brennan. …

read more

Smilex: Dangers of Poor OpSec

October 27, 2015

Background On 13 Oct 2015, it was revealed in an indictment on the US department of Justice website that Dridex …

read more

Online Carding

October 7, 2015

There is no shortage of credit card information being sold online. In the past six months alone, our spider (which covers I2P …

read more

OPSEC and Trust In An Underground Cybercriminal Forum

September 9, 2015

Introduction There are perhaps tens of thousands of forums and sites in the visible and dark webs dedicated to criminal …

read more

Emerging Markets & Services: Ransomware-as-a-Service

September 7, 2015

A look at emerging markets and services, specifically at  ransomeware-as-a-service.

read more

Kaspersky Labs Discloses Duqu 2.0 Attack

September 7, 2015

Introduction Today social media channels the world over are a buzz with news of Kaspersky Labs disclosure of the discovery …

read more

Online Extortion – Old Ways, New Tricks

September 7, 2015

Extortion is nothing new for organised crime. For centuries, gangs have been operating protection rackets and kidnappings to successfully extract ransom money from their victims. And as with many things in modern life, these old techniques have been successfully brought over to the cyber realm.

read more

Exploiting Is My Business…and Business Is Good

September 4, 2015

In 2015 we are seeing new trends emerge with respect to Exploit Kits in the wild. These trends are particularly interesting in that they suggest that the frequency of 0-day exploits made available in these kits is growing while the time to integrate said 0-days from the time of discovery to inclusion in the kits is shrinking rapidly.

read more