Workflow
Cybercrime
icon
Search documents
X @Binance
Binance· 2025-09-03 02:00
Strengthening the fight against cybercrime 🚨We’re proud to support Indonesian law enforcement and regulators in advancing enforcement capabilities. Through training, investigative support, and collaboration, #Binance remains committed to combating cross-border crypto crime. 🤝This milestone underscores the importance of partnership and knowledge sharing in building a safer digital ecosystem.Dive in 👉 https://t.co/VIBSCkr6k0 ...
X @Anthropic
Anthropic· 2025-08-27 11:06
AI Cybercrime Disruption - Anthropic's Threat Intelligence team is working to disrupt AI cybercrime [1] - Jacob Klein and Alex Moix from Anthropic are discussing the company's efforts in this area [1]
X @Anthropic
Anthropic· 2025-08-27 11:06
Threat Landscape - The report details the identification and disruption of sophisticated attempts to use Claude for cybercrime [1] - North Korea is implicated in a fraudulent employment scheme [1] - AI is being used to create ransomware, even by individuals with basic coding skills [1] AI Security Implications - The report highlights the potential for AI models like Claude to be exploited for malicious purposes [1] - The findings underscore the need for robust security measures to prevent AI-facilitated cybercrime [1]
X @Decrypt
Decrypt· 2025-08-14 19:49
Sanctions & Regulations - US Treasury sanctions Russian crypto firms due to cybercrime links and sanctions evasion [1] Cybercrime & Security - Focus on Russian crypto firms' involvement in cybercrime activities [1]
The Shadowy Cambodia-Based Service That Profits From Scams
Bloomberg Originals· 2025-08-01 06:00
Overview of Huione Group's Operations - Huione Group is identified as a key gateway to global crime, facilitating scam compounds where trafficked people are forced to scam others [1][2] - The US Treasury Department classifies Huione as engaged in money laundering, describing it as the "Amazon for criminals" [3] - Huione operates through various arms, including Huione Pay (payment services) and Huione Guarantee (online marketplace for illicit items) [5][9] Illicit Activities and Modus Operandi - Huione Pay is alleged to be involved in money laundering through a cell called Huione International Pay, facilitating scams like fake romance schemes [7][8] - Huione Guarantee hosts an online marketplace on Telegram where buyers and sellers can purchase illegal items needed for online scams, including stolen data and money laundering services [9] - The platform facilitates efficient scam operations, offering everything needed to target and extract money from victims worldwide [10] Scale and Impact - Huione Guarantee's transaction volume ($28 billion) dwarfs that of previous darknet markets like Silk Road and AlphaBay (totaling $11 billion) [11] - Elliptic's research indicates that Huione Group entities received over $91 billion in crypto assets in the last five years [28] - The cybercrime industry in Southeast Asia, often underwritten by Chinese mafia members, is a multibillion-dollar industry, with Cambodia being a major driver [21] Regulatory and Investigative Actions - The US Treasury Department has blacklisted Huione from US markets for engaging in money laundering [30] - Telegram has taken action to shut down most of the channels used by Huione Guarantee [29] - Huione Crypto appears to have rebranded itself as Kex, but transaction volumes remain high [32] Connections and Complications - Huione has directors who also work for other powerful conglomerates and banks in Cambodia, including Hun To, a cousin of Cambodia's Prime Minister [27] - Huione has developed its own stablecoin (USDH) to evade attempts to freeze wallets [31] - Proving Huione facilitates illegal activity is challenging due to its lack of transparency and complex financial structure [12][13]
X @TechCrunch
TechCrunch· 2025-07-24 15:36
Cybersecurity Threat - Cybercrime forum Leak Zone publicly exposed its users' IP addresses [1] Data Breach - The exposure of IP addresses represents a significant data breach for the forum's users [1]
Why the Digital World Needs Cyber Diplomats | Sanjana Rathi | TEDxGCEM
TEDx Talks· 2025-07-16 16:24
Cybersecurity Threats & Impact - Cybercrime is a global epidemic, not a niche concern, affecting ordinary people and causing them to lose their savings [1] - A farmer in India lost approximately ₹100,000 (₹1 Lakh) to an international phishing attack, highlighting the real-world impact of cybercrime [1] - A ransomware attack on one of the largest shipping companies caused approximately $300 million in damages [2] - In 2017, an attack on around 20 ships in the Black Sea showed navigation systems placing ships approximately 32 kilometers inland, demonstrating risks to life and the economy [3] Cybersecurity Challenges & Evolution - The world failed to evolve fast enough to meet digital threats, with laws and systems lagging behind technology [1] - Governments are investing billions of dollars in new institutions and policies, but building more silos instead of agility [1] - The issue is not a failure of intention, but a failure of evolution in cybersecurity [1] Cyber Diplomacy as a Solution - Cyber diplomacy is presented as a necessary next step in global evolution, blending technology and diplomacy [1][3] - Cyber diplomats are needed to understand firewalls, foreign policy, encryption, and empathy, acting swiftly across borders [1] - Cyber diplomats should be trained not just in response, but in anticipation, acting as new diplomats of peace across digital frontiers [1] - Cyber diplomacy can bring a solution to critical infrastructure systems that are increasingly digitized and vulnerable to collapse [1][3]
What to Do When Your Identity Is Used in a Scam? | Migs Bustos | TEDxRizalStreet
TEDx Talks· 2025-07-10 16:08
Industry Trend & Risk Awareness - The industry faces a growing threat from love scams and deep fakes, impacting individuals and families [3] - Scammers use stolen identities to build relationships and defraud victims of money [3][4] - Cybercriminals are evolving their methods, including using QR codes for phishing [16][17] - The Philippines ranks seventh globally in connection to love scams [15] Individual & Corporate Security Measures - The industry emphasizes the importance of regularly changing passwords and setting social media profiles to private to mitigate risks [18][19] - It is crucial to be vigilant about dubious links and requests for money in messaging apps [17] - Encourages individuals to report suspicious activity and break the stigma surrounding scams [21][22] Data & Statistics - In 2023, Filipinos may have lost around 10 linked to romance scams, increasing to 45 in 2024 [15] - Globally, approximately 1,000 people are linked to romance scams [15] - One victim lost $2,000, equivalent to approximately 9 to 11 million Philippine pesos [8]
Whispers of the Web: Exposing Data Privacy and Cyber Deception | Amit Dubey | TEDxNIIT University
TEDx Talks· 2025-07-09 15:14
Data Collection and Usage - Social media platforms collect extensive user data, including location, browsing history, contacts, and even health and fitness information [5][6] - Platforms like Facebook can infer sensitive information such as physical address, political and religious beliefs, and sexual orientation [7][8] - Companies are collecting data not just for targeted advertising but to control user behavior and decision-making [27] - Criminals exploit readily available personal data to manipulate individuals, emphasizing that users are targeted, not their devices [23] Security Vulnerabilities and Exploits - Applications with SMS access can be exploited to read and send OTPs, leading to financial losses [12][15] - Criminals are hacking individuals to reach their devices [23] - Even seemingly harmless actions, like a child installing an app for gaming currency, can have severe consequences [22] - User activities across devices linked to the same Gmail account can be tracked and exploited [18] Digital Footprint and Privacy - Individuals leave a unique digital fingerprint based on their internet usage patterns [24] - Google tracks user locations and activities precisely over many years, creating a detailed timeline [10][11] - This data can be used as court-admissible evidence [11] Recommendations - Users should be aware of the permissions granted to applications on their phones [13] - Users can check their Google activity to see what data is being tracked [17] - The industry should recognize that users are products of the data they consume, influencing their thoughts and aspirations [2]
Q1/2025 Gen Threat Report Reveals AI-Driven Scams Redefining Cybercrime
Prnewswire· 2025-05-28 13:00
Core Insights - The Q1/2025 Gen Threat Report reveals significant increases in cyber threats, including a 186% rise in breached personal information and a 466% increase in phishing reports [2][4][5] - The report highlights the evolution of online threats, with attackers utilizing AI and personalized tactics to enhance deception [3][7] - Gen has successfully protected over 4 million users from Scam-Yourself Attacks, which involve individuals being manipulated into compromising their own devices [7][8] Data Breaches - There was a 36% increase in the number of data breaches faced by companies compared to the previous quarter, with individual breached records rising by over 186% [4] - Attackers are employing advanced infostealers, making data compromise faster and harder to detect [4] Phishing Scams - Phishing reports surged by 466%, now accounting for nearly 32% of all scam submissions to the Norton Genie scam detector [5] - Phishing is identified as the fastest-growing threat, with generic scams making up 51% of reports [5] - Attackers are using dynamic DNS services and subdomain providers to create deceptive login pages, making phishing attempts harder to detect [6] Scam-Yourself Attacks - Gen protected over 4 million users from Scam-Yourself Attacks, where individuals are tricked into infecting their own devices [7] - Attackers are utilizing AI-generated personas and deepfake influencers to deliver malicious campaigns [7] - Fake browser update scams have increased to over 17 times the previous quarter's levels, tricking users into installing malware [8] Financial Threats - Mobile financial threats are on the rise, with malware exploiting accessibility features to steal sensitive data [10] - Digital currencies are increasingly targeted, with one campaign linked to the US presidential inauguration resulting in nearly $4 million stolen through over 2,000 transactions [11] Company Overview - Gen is a global leader in Cyber Safety, providing solutions through trusted brands like Norton, Avast, and LifeLock [1][13] - The company aims to empower individuals to live their digital lives safely and confidently, serving nearly 500 million users in over 150 countries [13]