Scam as a service 2: the B team

Interest in Tor based threats is increasing to the extent that some vendors will scoop up all activity they find on Tor and provide you a nice front end to search through it at your leisure. This might lead the casual observer to assume that the darkness is a one stop shop for cyber threats, but criminals existed on the internet prior to Tor, and still do quite well for themselves without it. In fact, bad guys with good OPSEC tend to be the exception, rather than the rule. So let’s take a quick look at some unpleasant stuff and the nadir of bad OPSEC, Facebook.

Categories:

Tags:

(Read more…)

Read more

Tech support scams, stolen data, and botnets

We’ve found a scam in a box company that also offers intelligence leads. That is, they’ll sell you the scam and point you at the most vulnerable targets first.

Categories:

Tags:

(Read more…)

Read more

A week in security (Dec 11 – Dec 17)

A compilation of notable security news and blog posts from the 11th of December to the 17th. This week, we talked about ransomware, screen lockers, Goldeneye–not the James Bond movie–and Malwarebytes’ 2017 predictions.

Categories:

Tags:

(Read more…)

Read more

A week in security (Jan 01 – Jan 07)

A compilation of notable security news and blog posts from the 1st of January to the 7th. This week, we touched on the Sundown exploit kit with a surprising payload and a fake technical support page that wreaked havoc on Mac systems.

Categories:

Tags:

(Read more…)

Read more