Cybercrime

From malware and botnets to the latest cybercriminal schemes, check out what today’s black hat hackers are up to.

Blog > Cybercrime

The Many Faces of Cryptocurrency

January 29, 2018

While it may be a bit harsh to label it the currency of crime, Bitcoin and its dozens of cryptocash cousins certainly have an underworld appeal. Profit-motivated cybercriminals are drawn to its decentralized nature and the anonymity that it affords. Cryptocurrency also simplifies cashing out for the bad guys, and the potential for extortion through […]

Read more

The Proliferation of Carded Purchases in the Spanish-Language Underground

January 25, 2018

Purchases made with compromised payment card information, known as compras among Spanish-speaking cybercriminals, are a frequent subject of chatter in Spanish-language Deep & Dark Web (DDW) communities. Since late 2015, fraudulent activity related to stolen card information has become increasingly pervasive across the Spanish-language underground, primarily originating from Latin America. Compras vendors can obtain compromised […]

Read more

Criminals Finding FinTech to Their Liking

Financial technology, or fintech, has banks on edge because of its potential to disrupt core means of doing business. Services are being delivered in ways unimaginable a decade ago, and technology such as near-field communication, digital wallets, and other mobile-based payment and banking options are elevating many new players to heights previously reserved for a […]

Read more

Evaluating the Vulnerabilities Equities Process and Policy

November 28, 2017

As 2017 draws toward an end, we are reminded of the large-scale cyber attacks that have affected the government, private business, and consumers. Ransomware strains such as WannaCry and NotPetya are particularly memorable for their destructive capabilities and rampant propagation through a Microsoft Windows vulnerability. In response, the United States government has been compelled to […]

Read more

Trickbot Gang Evolves, Incorporates Account Checking Into Hybrid Attack Model

Individuals who reuse login credentials across multiple sites are more susceptible to account checking attacks, which occur when threat actors use credentials stolen from past database breaches or compromises to gain unauthorized access to other accounts belonging to the same victims. However, the process of mining compromised data for correct username and password combinations requires […]

Read more

Cybercriminal Abuse of Rewards Points

November 20, 2017

Cybercriminal interest in stolen data is not solely limited to financial or personally identifiable information. In fact, Flashpoint analysts have observed Deep & Dark Web chatter pertaining to the exploitation of rewards points programs, especially those associated with travel. This chatter aligns with cybercriminals’ interest in fraudulent booking services for hotels, airline tickets, and car […]

Read more

Best Practices for Combating Fraud in the Insurance Industry

November 7, 2017

Today’s fraudsters are nothing if not resilient. After all, combatting fraud is often compared to a game of “whack-a-mole” —and for good reason. Just as organizations across all sectors are continually developing new ways to prevent fraud, fraudsters are continually developing new schemes. While a new anti-fraud measure may help decrease one type of fraud, […]

Read more