Month: January 2022

How China’s cybercrime underground is making money off…

Both of these things are true: Big data is big business, and cybercriminals love money. So it shouldn’t be a surprise that these two ideas have blended together in some corners of the cybercrime underground. Through Intel 471’s observation and analysis of open source information and behavior on multiple closed forums, we found actors adopting …

How China’s cybercrime underground is making money off… Read More »

The blurry boundaries between nation-state actors and…

When it comes to attributing malicious cyber activity, there are two buckets by which actors generally fall in: “financially-motivated” or “nation-state.” The former is ultimately interested in money, while the latter is more concerned with obtaining or exploiting sensitive information to gain an advantage over a government or commercial entity. For the past decade, defenders …

The blurry boundaries between nation-state actors and… Read More »

The public sector is a juicy target for cybercriminals

The public sector is an extremely high-value target for cybercrime due to the wealth of valuable information it possesses, such as PII and confidential and sensitive documents. Intel 471 has observed government-run systems being exploited in multiple ways for both financial gain or in politically motivated cyberattacks. By analyzing and distinguishing the common threats and …

The public sector is a juicy target for cybercriminals Read More »

Cybercrime underground flush with shipping companies’…

One of the lingering impacts of the COVID-19 pandemic is the havoc it has wreaked on the global supply chain. There have been extreme fluctuations in the availability of goods, ports around the world are severely backlogged with full containers, and shipping and logistics companies are having trouble finding workers to transport cargo. It is …

Cybercrime underground flush with shipping companies’… Read More »

How cryptomixers allow cybercriminals to clean their…

Cryptocurrency is a cybercriminal’s best friend. Actors all over the world have leveraged this technology’s increased anonymity to buy and sell illegal goods, services, stolen data, underground infrastructure and force victims to pay ransom. While blockchain analysis enables researchers and law enforcement to glean information from illicit transactions, criminals have countered by adopting the use …

How cryptomixers allow cybercriminals to clean their… Read More »

Emotet is back. Here's what we know.

Months after law enforcement agencies took down the notorious Emotet botnet, Intel 471 observed the Trickbot banking trojan downloading and executing possible updated Emotet binaries. This marks the first time we observed Emotet malware activity after the takedown was announced in January. Bots associated with Trickbot, tagged several different gtags (lip125, fat2, top118 and others), …

Emotet is back. Here's what we know. Read More »

A reset on ransomware: Dominant variants differ from…

There’s been a shift in the ransomware-as-a-service ecosystem. Be it due to law enforcement, infighting amongst groups or people abandoning variants altogether, the RaaS groups dominating the ecosystem at this point in time are completely different than just a few months ago. Yet, even with the shift in the variants, ransomware incidents as a whole …

A reset on ransomware: Dominant variants differ from… Read More »

Introducing uCrop, Our Own Image Cropping Library for Android

We develop lots of different Android apps at Yalantis, and our experience shows that almost every application we deal with needs image cropping functionality. Image cropping can be used for various purposes, from ordinary adjustment of user profile images to more complex features that involve aspect ratio cropping and flexible image transformations. Since we want …

Introducing uCrop, Our Own Image Cropping Library for Android Read More »