Redirect to URL:
https://www.group-ib.com/blog/
BACK
Blog Group-IB
We know about cybercrime.
We share what is interesting.
BACK
Blog Group-IB
We know about cybercrime.
We share what is interesting.
RECENT POSTS
THREAT INTELLIGENCE
INVESTIGATIONS
DIGITAL RISK PROTECTION
CERT-GIB
DIGITAL FORENSICS
GROUP-IB PRODUCTS
CYBER SECURITY
Dark Pink
New APT hitting Asia-Pacific, Europe that goes deeper and darker
Dark Pink
New APT hitting Asia-Pacific, Europe that goes deeper and darker
Godfather: A banking Trojan that is impossible to refuse
Scam-free Christmas: 8 online scams to protect your customers from
Group-IB's Fraud Intelligence: How can you find mule accounts lurking in your digital payments?
Hired hand: Scammers mimic Saudi manpower provider
OPERA1ER APT in Africa
Treasure trove. Alive and well point-of-sale malware
DeadBolt ransomware: nothing but NASty
Take control of your shadow IT
Scam is rising
Letting off steam
Roasting 0ktapus: The phishing campaign going after Okta identity credentials
APT41 World Tour 2021 on a tight schedule
Switching side jobs
Challenge accepted
Fake investment scams in Europe
Under the Hood. Group-IB Managed XDR
Group-IB introduces the Unified Risk Platform
Fat Cats
We see you, Gozi
Thousands of IDs exposed in yet another data breach in Brazil
"We find many things that others do not even see"
Swiss Army Knife Phishing
SideWinder.AntiBot.Script
Scamopedia
Old Gremlins, new methods
Scammers make off with $1.6 million in crypto
Mitigating Spring4Shell with Group-IB
Empty Box
Lost & Found: Group-IB Unveils AssetZero
Cleaning the atmosphere
Shedding light on the dark web
How MITRE ATT&CK helps users of Threat Intelligence & Attribution
Mitigating Log4Shell in Log4j with Group-IB
Ready-made fraud
Inside the Hive
The Darker Things
Cannibal Carders
RUNLIR - phishing campaign targeting Netherlands
Scamdemic outbreak
Under the hood. Group-IB Threat Intelligence & Attribution. Part 2
Bold ad campaign
It's alive!
Prometheus TDS
The Art of Cyberwarfare
Under the hood. Group-IB Threat Intelligence & Attribution
The Fraud Family
The Brothers Grim
REvil Twins
Big airline heist: APT41 likely behind a third-party attack on Air India
FontPack: A dangerous update
Connecting the Bots: Hancitor fuels Cuba Ransomware Operations
GrelosGTM group abuses Google Tag Manager to attack e-commerce websites
Lazarus BTC Changer
Deep water: exploring phishing kits
When Karma Comes Back
Kremlin RATs from Nigeria
Masters of disguise
JavaScript sniffers’ new tricks: Analysis of the E1RB JS sniffer family
Inside Classiscam
The source of everything: digital forensic examination of incidents involving source code leaks
New UltraRank attacks
The footprints of Raccoon: a story about operators of JS-sniffer FakeSecurity distributing Raccoon stealer
The Locking Egregor
Group-IB Fraud Hunting Platform
Big Game Hunting: Now in Russia
Lock Like a Pro: Dive in Recent ProLock’s Big Game Hunting
Digital forensics specialist's bookshelf
IcedID: When ice burns through bank accounts
ATT&CKing ProLock Ransomware
PerSwaysion Campaign
Reconstructing User Activity for Forensics with FeatureUsage
Chromium-based Microsoft Edge from a Forensic Point of View
Hunting for Nextcloud Cloud Storage Forensic Artifacts on Endpoints
A Shortcut to Compromise: Cobalt Gang phishing campaign
Hunting for Attacker’s Tactics and Techniques With Prefetch Files
Group-IB unveils its graph
Massive malicious campaign by FakeSecurity JS-sniffer
WhatsApp in Plain Sight: Where and How You Can Collect Forensic Artifacts
RDoS attacks by fake Fancy Bear hit banks in multiple locations
No Time to Waste: How Windows 10 Timeline Can Help Forensic Experts
50 Shades of Ransomware
Tools up: the best software and hardware tools for computer forensics
Following the RTM
THREAT INTELLIGENCE
Dark Pink
Godfather: A banking Trojan that is impossible to refuse
OPERA1ER APT in Africa
Treasure trove. Alive and well point-of-sale malware
Roasting 0ktapus: The phishing campaign going after Okta identity credentials
APT41 World Tour 2021 on a tight schedule
Switching side jobs
We see you, Gozi
Thousands of IDs exposed in yet another data breach in Brazil
SideWinder.AntiBot.Script
Old Gremlins, new methods
How MITRE ATT&CK helps users of Threat Intelligence & Attribution
Inside the Hive
Cannibal Carders
Under the hood. Group-IB Threat Intelligence & Attribution. Part 2
Bold ad campaign
Prometheus TDS
The Art of Cyberwarfare
Under the hood. Group-IB Threat Intelligence & Attribution
The Fraud Family
The Brothers Grim
Big airline heist: APT41 likely behind a third-party attack on Air India
FontPack: A dangerous update
GrelosGTM group abuses Google Tag Manager to attack e-commerce websites
Lazarus BTC Changer
When Karma Comes Back
Kremlin RATs from Nigeria
JavaScript sniffers’ new tricks: Analysis of the E1RB JS sniffer family
New UltraRank attacks
The footprints of Raccoon: a story about operators of JS-sniffer FakeSecurity distributing Raccoon stealer
IcedID: When ice burns through bank accounts
PerSwaysion Campaign
Massive malicious campaign by FakeSecurity JS-sniffer
RDoS attacks by fake Fancy Bear hit banks in multiple locations
Meet the JS-Sniffers 4: CoffeMokko Family
Meet the JS-Sniffers 3: Illum Family
Meet the JS-Sniffers 2: G-Analytics Family
Meet the JS-Sniffers 1: ReactGet Family
Gustuff: weapon of mass infection
Silence: Moving into the Darkside
Cobalt Renaissance: new attacks and joint operations
In a Risk Group
MoneyTaker: hunting for the invisible being
NotPetya pulls BadRabbit out of the hat
BadRabbit
Secrets of Cobalt
Hacktivists unmasked
Petya starts with Ukraine and then goes global
LAZARUS ARISEN
INVESTIGATIONS
Shedding light on the dark web
The Fraud Family
Hacktivists unmasked
Cron has fallen
DIGITAL RISK PROTECTION
Scam-free Christmas: 8 online scams to protect your customers from
Hired hand: Scammers mimic Saudi manpower provider
Scam is rising
Scamopedia
Scammers make off with $1.6 million in crypto
Empty Box
Ready-made fraud
Protecting your brand online
Scamdemic outbreak
Inside Classiscam
In a Queue for a Scam
‘Black spot’ for pirates
Airline companies "landing" on fake pages
Ghost flights
The end of torrents era in Russia
CERT-GIB
Letting off steam
Fake investment scams in Europe
Swiss Army Knife Phishing
Scamopedia
Scammers make off with $1.6 million in crypto
RUNLIR - phishing campaign targeting Netherlands
Deep water: exploring phishing kits
Inside Classiscam
DIGITAL FORENSICS
DeadBolt ransomware: nothing but NASty
Fat Cats
Inside the Hive
The Darker Things
It's alive!
The Brothers Grim
REvil Twins
Connecting the Bots: Hancitor fuels Cuba Ransomware Operations
Masters of disguise
The source of everything: digital forensic examination of incidents involving source code leaks
The Locking Egregor
Big Game Hunting: Now in Russia
Lock Like a Pro: Dive in Recent ProLock’s Big Game Hunting
Digital forensics specialist's bookshelf
ATT&CKing ProLock Ransomware
Reconstructing User Activity for Forensics with FeatureUsage
Chromium-based Microsoft Edge from a Forensic Point of View
Hunting for Nextcloud Cloud Storage Forensic Artifacts on Endpoints
A Shortcut to Compromise: Cobalt Gang phishing campaign
No Time to Waste: How Windows 10 Timeline Can Help Forensic Experts
50 Shades of Ransomware
Tools up: the best software and hardware tools for computer forensics
Following the RTM
GROUP-IB PRODUCTS
Group-IB's Fraud Intelligence: How can you find mule accounts lurking in your digital payments?
Take control of your shadow IT
Challenge accepted
Under the Hood. Group-IB Managed XDR
Group-IB introduces the Unified Risk Platform
Lost & Found: Group-IB Unveils AssetZero
Cleaning the atmosphere
How MITRE ATT&CK helps users of Threat Intelligence & Attribution
Under the hood. Group-IB Threat Intelligence & Attribution. Part 2
Under the hood. Group-IB Threat Intelligence & Attribution
Group-IB Fraud Hunting Platform
Group-IB unveils its graph
CYBER SECURITY
Mitigating Spring4Shell with Group-IB
Top 5 recommendations for preventing ransomware for 2022
Mitigating Log4Shell in Log4j with Group-IB
In a Risk Group
Insecure venture
Kronos devouring its children
Targeted attacks on banks
Echoes of cyberwar
Receive insights on the latest cybercrime trends
originating from Russia and Emerging Markets
Subscribe
Данные успешно отправлены. Спасибо!