Summary: The video discusses the increasing sophistication of cyberattacks, focusing on two main stories: hackers exploiting Google search ads to impersonate legitimate businesses and a pastor charged with defrauding his congregation through a fraudulent cryptocurrency scheme. The video highlights the methods used in these scams and the significant amounts of money involved, as well as the challenges in combating these cybercrimes.Keypoints:…
Read More
At least usd69 million stolen from crypto platform Phemex in suspected cyberattack
Summary: Singapore-based cryptocurrency platform Phemex experienced a cyberattack that resulted in the theft of over $69 million in digital assets. The company has paused some operations and is working to restore withdrawals while manually reviewing requests. Experts suggest that the sophistication of the attack indicates involvement from experienced threat actors, potentially linked to North Korean hackers.…
Read More
Unmasking Cyber Deception: The Rise of Generic Phishing Pages Targeting Multiple Brands
The CloudSEK Threat Research Team has identified a generic phishing page capable of impersonating various brands to steal user credentials. This phishing page, hosted on Cloudflare’s workers.dev, utilizes a generic login interface and can be customized to target specific organizations. Victims’ credentials are exfiltrated to a remote server after they log in.…
Read More
Oracle Patches 200 Vulnerabilities With January 2025 CPU
Summary: Oracle has released 318 new security patches in its January 2025 Critical Patch Update, addressing over 180 vulnerabilities that can be exploited remotely without authentication. Among these, 30 patches resolve critical-severity flaws, with Oracle Communications receiving the highest number of new patches. The update also includes security fixes for MySQL and various other Oracle applications, emphasizing the urgency of applying these patches to mitigate potential threats.…
Read More

Victim: JOMARSOFTCORP.COM Country : Actor: clop Source: http://santat7kpllt6iyvqbr7q4amdv6dzrh6paatvyrzl7ry3zm72zigf4ad.onion/jomarsoftcorp-com Discovered: 2025-01-22 05:53:03.558179 Published: 2025-01-22 05:53:03.558179 Description : Company Name: JOMARSOFTCORP.COM Services Offered: Software and IT services Specializations: Custom software development, mobile app development Focus: Understanding specific business needs Benefits: Automating processes, increasing efficiency, driving growth Industries Served: Various sectors Goal: Assisting businesses in achieving technology objectives

About Country: Cybersecurity Perspective and Ransomware Cases

– Cybersecurity Framework: The country has established a national cybersecurity strategy that focuses on enhancing resilience against cyber threats and improving response mechanisms.…

Read More
Analysis Report on the Latest Phishing Incident by Clickfix: The Tragedy of CAPTCHA Resistance – Security Cow
This article analyzes the Clickfix phishing incidents, highlighting the evolution of CAPTCHA bypass techniques and the exploitation of user trust in verification mechanisms. It details how attackers use social engineering to manipulate users into executing malicious commands, leading to data theft. Affected: Windows system users, WordPress websites, online security sector

Keypoints :

Clickfix is a phishing technique that exploits user fatigue with verification processes.…
Read More
Sneaky 2FA: exposing a new AiTM Phishing-as-a-Service
In December 2024, a new Adversary-in-the-Middle (AiTM) phishing kit known as Sneaky 2FA was identified, targeting Microsoft 365 accounts. This phishing kit, sold as Phishing-as-a-Service (PhaaS) by the cybercrime service “Sneaky Log”, utilizes sophisticated techniques including autograb functionality and anti-bot measures. The analysis reveals its operational methods, including the use of Telegram for distribution and support.…
Read More
Cyber Insights 2025: Open Source and Software Supply Chain Security
Summary: SecurityWeek’s Cyber Insights 2025 explores expert predictions regarding the evolving landscape of cybersecurity, particularly focusing on Open Source Software (OSS) and the Software Supply Chain. The report highlights the increasing risks associated with OSS, including supply chain attacks and the challenges of governance and visibility.…
Read More
North Korean IT Worker Fraud Linked to 2016 Crowdfunding Scam and Fake Domains
Summary: Cybersecurity researchers have uncovered links between North Korean threat actors involved in fraudulent IT worker schemes and a 2016 crowdfunding scam. These actors have been infiltrating companies globally under false identities to generate revenue for North Korea, while also being connected to previous scams. Recent findings highlight the evolution of their tactics and the ongoing threat they pose in cyberspace, particularly in cryptocurrency thefts.…
Read More
US, Japan, South Korea Blame North Korean Hackers for 0M Crypto Heists
Summary: In 2024, North Korean hackers stole approximately $660 million in cryptocurrency, with the funds allegedly supporting Pyongyang’s weapons programs. The US, Japan, and South Korea issued a joint statement warning the blockchain industry about the persistent threat posed by these cybercriminals.

Threat Actor: North Korean hackers | North Korean hackers Victim: Cryptocurrency exchanges and users | cryptocurrency exchanges

Key Point :

North Korean hackers conducted at least five major cryptocurrency heists in 2024.…
Read More
Millions Stolen: North Korea Hackers Target Blockchain Industry
Summary: The United States, Japan, and the Republic of Korea have issued a warning regarding North Korea’s cyber actors targeting the global blockchain technology industry, emphasizing the threat of cryptocurrency theft. This joint statement highlights the sophisticated tactics employed by these actors and the need for enhanced collaboration to mitigate the risks.…
Read More
Illicit HuiOne Telegram Market Surpasses Hydra, Hits  Billion in Crypto Transactions
Summary: HuiOne Guarantee has emerged as the largest online illicit marketplace, surpassing Hydra with over $24 billion in cryptocurrency transactions. The platform is linked to various criminal activities, including money laundering and human trafficking, and has connections to organized crime groups globally.

Threat Actor: HuiOne Guarantee | HuiOne Guarantee Victim: Global online users | online users

Key Point :

HuiOne Guarantee has received at least $24 billion in cryptocurrency, significantly more than the defunct Hydra marketplace.…
Read More
DoJ Indicts Three Russians for Operating Crypto Mixers Used in Cybercrime Laundering
Summary: The U.S. Department of Justice has indicted three Russian nationals for their roles in operating cryptocurrency mixing services Blender.io and Sinbad.io, which were allegedly used for laundering criminal funds. The mixers facilitated transactions that obscured the origins of funds linked to various cyber crimes, including ransomware and wire fraud.…
Read More
Russian nationals arrested by US, accused of running crypto mixers Blender and Sinbad
Summary: Three Russian nationals have been indicted for their involvement in operating cryptocurrency mixing services Blender.io and Sinbad.io, which were used to launder funds for cybercriminals, including North Korea’s Lazarus Group. The U.S. Department of Justice, in collaboration with international law enforcement, has taken significant steps to dismantle these platforms and hold the operators accountable.…
Read More
New Web3 attack exploits transaction simulations to steal crypto
Summary: Threat actors are utilizing a new tactic known as “transaction simulation spoofing” to steal cryptocurrency, successfully executing an attack that resulted in the theft of 143.45 Ethereum, valued at around $460,000. This method exploits flaws in transaction simulation mechanisms in Web3 wallets, which are intended to protect users from fraudulent activities.…
Read More