Do you want to be a #cybercriminal ?
A single button tutorial from rootkid.

Do you want to be a #cybercriminal ?
A single button tutorial from rootkid.

#infosec #ransomware #cybercriminal
Un grupo de ransomware llamado CLOP obtuvo acceso a los sistemas Oracle EBS de Anywhere Real Estate. Los datos expuestos incluían nombres, datos de contacto y números de seguridad social, pero no estaban involucrados datos de transacciones de consumidores.
https://www.housingwire.com/articles/anywhere-real-estate-data-breach/
TA584 is one of the most prominent #cybercriminal threat actors tracked by Proofpoint threat researchers. In a new blog, the team shared a detailed analysis of the threat actor, its campaigns, attack chains, targeting, payloads, and shared defensive recommendations.
Blog: https://www.proofpoint.com/us/blog/threat-insight/cant-stop-wont-stop-ta584-innovates-initial-access
Our researchers have tracked #TA584 since 2020. In 2025, they observed shifts to TA584’s tactics, techniques and procedures (TTPs). Notably, it expanded global targeting; adopted ClickFix social engineering; and delivered new malware, Tsundere Bot.
⚠️ Such activity shows that static detections alone are not reliable against constantly evolving threat actors.
Explore the blog for more details along with protection tips, Emerging Threats Rules and IOCs.
Via #TheRecord August 14, 2025
#Italian government warned on Wednesday that #identity documents belonging to tens of thousands of people who had stayed at #hotels in the country allegedly have been stolen and are being illegally sold online.
According to the computer emergency response team at the Agency for Digital #Italy (CERT-AGID), at the last count a #cybercriminal going by the handle “mydocs” had offered more than 90,000 documents for sale.
https://therecord.media/italy-hotel-guests-possible-data-breach-ids
Espionage 🤝 Cybercrime :: TA829 🤝 UNK_GreenSec
Our extensive visibility into the threat landscape has led us to conclude that there is very likely a link between TA829 (a cybercriminal actor also conducting #espionage in line with Russian state interests) & UNK_GreenSec (a #cybercriminal cluster observed deploying #malware and #ransomware).
See our research blog for a technical analysis of the intriguing overlap between the threat actor clusters. https://brnw.ch/21wTN3n
Cops in #Germany Claim They've ID'd the Mysterious #Trickbot #Ransomware Kingpin
The elusive boss of the Trickbot and Conti #cybercriminal groups has been known only as “Stern.” Now, #German law enforcement has published his alleged identity—and it’s a familiar face.
https://www.wired.com/story/stern-trickbot-identified-germany-bka/
Data Extortion Criminal Arrested in Thailand: Key Developments - https://www.redpacketsecurity.com/prolific-data-extortion-actor-arrested-in-thailand/
#threatintel #cybercriminal #Thailand_Singapore #data_extortion
OMG, it’s actually worse than we thought. The teen on Musk’s #DOGE team graduated from ‘The Com’ - a noted #CyberCriminal network. And there’s more… read this! #Coup #AmericanCoup #infosec #OpSec
https://krebsonsecurity.com/2025/02/teen-on-musks-doge-team-graduated-from-the-com/