The latest hot topics from the Deep & Dark Web and beyond.

Blog > Trending

Mounting Uncertainty in Run-Up to Brazilian Election

August 14, 2018

Major political events can impact the threat landscape for businesses and government organizations, particularly during the run-up to major elections. This is especially true with the upcoming October general election in Brazil. Largely fueled by persistent political polarization and economic tensions, a climate of mounting uncertainty surrounding this election is already giving rise to cyber […]

Read more

Money Mules Remain Instrumental in Money-Laundering Schemes

July 30, 2018

In May, it was reported that criminals had siphoned hundreds of millions of pesos from Mexican banks through unauthorized transfers. The attack exploited problems with third-party software used by banks to connect to Mexico’s interbanking electronic payment system to send unauthorized transfers to various accounts at other banks. The transfers were quickly withdrawn as cash, […]

Read more

Peer-to-Peer Cryptocurrency Exchanges Abused in Cash-Out Schemes

By Flashpoint Analyst Team
July 16, 2018

Cybercriminals responding to security measures such as Know-Your-Customer implemented by Coinbase and other reputable cryptocurrency exchanges have begun to abuse legitimate peer-to-peer exchanges instead to convert or launder stolen funds. Flashpoint analysts have observed a growing number of underground discussions and specific recommendations around certain peer-to-peer services that threat actors consider valuable for converting cash […]

Read more

Wait Continues for AlphaBay Successor

July 9, 2018

The day international authorities announced last summer they had shuttered the AlphaBay and Hansa Deep & Dark Web (DDW) markets signaled a new order of doing business on the cybercrime and fraud underground. Gone in a relative instant were the days of the massive, centralized markets peddling drugs, guns, malware and more, and introduced instead […]

Read more

Flashpoint at Black Hat USA 2018

July 2, 2018

As someone who has been attending Black Hat USA for more than 15 years, I can attest to the tremendously valuable experience the conference provides for security vendors, decision-makers, and end-users alike. Here’s why I continue to attend: The Collaborative Atmosphere Black Hat is one of the largest and most popular security events in the […]

Read more

Misinformation and Disinformation: Impact on Emergency Management and Response

June 25, 2018

The notion of “fake news,” the perceived practice of mainstream media being manipulated to spread deliberate misinformation, has created a mistrust of traditional sources of news and information. This trend has elevated social media to a dominant means through which information is disseminated and consumed. Inevitably, however, the peer-to-peer spread of false information also suffers […]

Read more

Card Shops Endure as a Primary Method of Fraud

Underground card shops endure because they are the epitome of a centralized criminal economy. At their highest levels, card shops are stood up by an established infrastructure, a team accountable for the product, and reputations that translate to revenue. Despite many gains by the law enforcement and private-sector research communities, card shops figure to remain […]

Read more

Latin American “Bineros” Ramping Up Fraudulent Activity

Fraudulent activity among Latin American cybercriminals, known as bineros, continues to plague online streaming services and retailers operating in the region. The source of this death-by-a-thousand-cuts type of fraud is an undetermined issue with the validation of BINs. Bineros operate in Spanish-language (and some Portuguese-language) Latin-American underground communities and focus on the hunt for security […]

Read more

An Analysis of Islamic State Propaganda Distribution

May 15, 2018

The success of the Islamic State’s (ISIS) information-warfare strategy relies on the group’s ability to distribute propaganda to targeted audiences online. Moreover, to ensure the longevity of its material, ISIS has taken considerable measures to prevent its content from being removed from the internet. Jihadist groups have a long history of leveraging the internet to […]

Read more