Tag selected: cybercrime

Insights about All World Cards and the published 1M credit cards
Table of Contents Introduction Marketing campaign: 1 million credit cards published Analysis of the published credit cards Where were these cards stolen? When were these cards stolen? Geographical distribution of the victims Underground reactions Threat Actors behind All World Cards Conclusions   Introduction “All World Cards” is a new...
State of Underground Card Shops in 2021
(life after Joker’s Stash)   Table of Contents Introduction Active credit card shops FERum Shop Brian’s Club Thefreshstuffs Missing Credit Card Shops ValidCC VaultMarket Rescator Conclusions   Introduction    On February 15, 2021, after nearly 6.5 years in business, the prolific card shop Joker’s Stash closed its doors. Those behind...
RDPalooza: RDPs in the World of Cybercrime
  Key Points  Remote Desktop Protocol (RDP) is a built-in part of the Windows toolkit popular for facilitating remote work. Cybercriminals take interest in compromising RDP endpoints as they provide direct access into a victim environment via a graphic interface.   Internet-facing RDP endpoints – colloquially known among cybercriminals...
The RECON Vulnerability (CVE-2020-6287) and its Threat Context
Key takeaways  CVE-2020-6287 is a vulnerability present in SAP NetWeaver software that hinges on a missing authentication check. Successful weaponization of this vulnerability would allow attackers to abuse internet-facing SAP systems in a way that enables them to gain control over critical business processes. Numerous threat actors would be...
Demo Free Trial MSSP
Program