Criminals Exploiting FBI Emergency Data Requests

I’ve been writing about the problem with lawful-access backdoors in encryption for decades now: that as soon as you create a mechanism for law enforcement to bypass encryption, the bad guys will use it too.

Turns out the same thing is true for non-technical backdoors:

The advisory said that the cybercriminals were successful in masquerading as law enforcement by using compromised police accounts to send emails to companies requesting user data. In some cases, the requests cited false threats, like claims of human trafficking and, in one case, that an individual would “suffer greatly or die” unless the company in question returns the requested information…

Continue reading Criminals Exploiting FBI Emergency Data Requests

US charges suspected Redline infostealer developer, admin

The identity of a suspected developer and administrator of the Redline malware-as-a-service operation has been revealed: Russian national Maxim Rudometov. Infrastructure takedown As promised on Monday when they announced the disruption of the Redline a… Continue reading US charges suspected Redline infostealer developer, admin

Police hacks, disrupts Redline, Meta infostealer operations

The Dutch National Police, along with partner law enforcement agencies, has disrupted the operation of the Redline and Meta infostealers and has collected information that may unmask users who paid to leverage the infamous malware. Screenshot of the Re… Continue reading Police hacks, disrupts Redline, Meta infostealer operations

Enhancing national security: The four pillars of the National Framework for Action

In this Help Net Security interview, John Cohen, Executive Director, Program for Countering Hybrid Threats at the Center for Internet Security, discusses the four pillars of the National Framework for Action, emphasizing how these measures can combat t… Continue reading Enhancing national security: The four pillars of the National Framework for Action

4 new LockBit-related arrests, identities of suspected Evil Corp members, affiliates revealed

The third phase of Operation Cronos, which involved officers from the UK National Crime Agency (NCA), the FBI, Europol and other law enforcement agencies, has resulted in the arrest of four persons for allegedly participating in the LockBit ransomware-… Continue reading 4 new LockBit-related arrests, identities of suspected Evil Corp members, affiliates revealed

Telegram will share IP addresses, phone numbers of criminal suspects with cops

Telegram will start handing over the IP addresses and phone numbers of users who violate their Terms of Service “to relevant authorities in response to valid legal requests”, Telegram founder and CEO Pavel Durov has announced on Monday. Thi… Continue reading Telegram will share IP addresses, phone numbers of criminal suspects with cops

Ghost: Criminal communication platform compromised, dismantled by international law enforcement

Another encrypted communication platform used by criminals has been dismantled and its alleged mastermind arrested, the Australian Federal Police has announced on Tuesday. “AFP Operation Kraken charged a NSW man, aged 32, for creating and adminis… Continue reading Ghost: Criminal communication platform compromised, dismantled by international law enforcement

Australian Police Infiltrate Encrypted Messaging App Ghost and Arrest Dozens

Australian police have infiltrated encrypted messaging app Ghost, which has been used for illegal activities, and arrested dozens of people.
The post Australian Police Infiltrate Encrypted Messaging App Ghost and Arrest Dozens appeared first on Securi… Continue reading Australian Police Infiltrate Encrypted Messaging App Ghost and Arrest Dozens

Cost of a data breach: Cost savings with law enforcement involvement

For those working in the information security and cybersecurity industries, the technical impacts of a data breach are generally understood. But for those outside of these technical functions, such as executives, operators and business support functions, “explaining” the real impact of a breach can be difficult. Therefore, explaining impacts in terms of quantifiable financial figures […]

The post Cost of a data breach: Cost savings with law enforcement involvement appeared first on Security Intelligence.

Continue reading Cost of a data breach: Cost savings with law enforcement involvement