Group-IB
2.29K subscribers
764 photos
26 videos
2 files
550 links
Your daily source of cybersecurity news brought to you by Group-IB, one of the global industry leaders.
Download Telegram
๐Ÿšจ A new ransomware operation, The Gentlemen, has emerged following an affiliate split revealing how threat actors evolve from partners to independent operators while retaining advanced tooling, infrastructure, and access pipelines.

Our latest analysis explores how this group is operationalizing large-scale attacks by combining exploited network devices, credential harvesting, and advanced defense evasion techniques.

What the blog covers:
๐Ÿ”นThe origins of The Gentlemen and its connection to a prior affiliate dispute on the RAMP forum
๐Ÿ”นSystematic exploitation of CVE-2024-55591 to compromise FortiGate devices, with an observed inventory of approximately 14,700 exposed systems offered to affiliates
๐Ÿ”นOperational tooling for credential harvesting and lateral movement (NetExec, Impacket, DonPAPI)
๐Ÿ”นDefense evasion via Bring-Your-Own-Vulnerable-Driver (BYOVD) techniques to disable EDR/AV protections at kernel level

Read the full technical analysis.

#ThreatIntel #Ransomware #CyberSecurity
๐Ÿ”ฅ8โค2๐Ÿ‘2
๐ŸŽ‰Group-IB was named an Overall Leader in Fraud Reduction Intelligence Platforms by KuppingerCole 2025.

In its 2025 Leadership Compass for Fraud Reduction Intelligence Platformsโ€”eCommerce, KuppingerCole recognized Group-IB across three categories: Overall Leader, Product Leader, and Innovation Leader.

The analyst specifically highlighted our credential intelligence powered by dark web monitoring and Europol/Interpol information-sharing, our device intelligence depth including anti-detect browser and virtual camera detection, and an investigation interface described as "top-notch."

Download the full report.

#FraudPrevention #eCommerce #DarkWeb
๐Ÿ”ฅ6โค4๐Ÿ‘3๐Ÿ‘Œ1
Most cybersecurity strategies are already legacy the moment theyโ€™re approved.
Why? Because theyโ€™re built annually, around frameworks, without real-time threat context

Meanwhile, the business shifts constantly. Attackers adapt even faster.
๐Ÿ‘‰ That gap is where risk lives.

In our latest breakdown, we explore where cybersecurity strategies fail in 2026, including:
โœ… why security operates out of sync with business priorities
โœ… how compliance-first thinking creates blind spots
โœ… where gap analysis breaks down at the board level

Move beyond โ€œall talk, no showโ€ strategies:
๐Ÿ”น Tie security directly to business risk
๐Ÿ”น Shift to modular, adaptable planning
๐Ÿ”น Use threat intelligence to drive decisions
๐Ÿ”น Continuously reassess gaps

Prepare for whatโ€™s actually targeting your business right now. Read more.

#Cybersecurity2026 #RiskManagement #ThreatIntelligence
โค5๐Ÿ”ฅ4๐Ÿ‘3
That RFQ email from a trusted supplier? It might be delivering Phantom Stealer โ€” a toolkit built to harvest your credentials at scale.

Group-IB researchers have identified a sustained phishing campaign targeting European logistics, manufacturing, and tech companies. Across five distinct waves over three months, every email was blocked by Group-IB's Business Email Protection before reaching end users.

The emails mimic legitimate procurement correspondence with professional signatures and spoofed sender identities. But inside the archive attachment is an infostealer that harvests browser credentials, session tokens, and payment data.

Phantom Stealer is part of a growing stealer-as-a-service market - credential theft is now a subscription business, and threats like this are only scaling.

Our latest Email Protection Spotlight breaks down the full campaign and shows how multi-layer detection stopped it at the inbox. Read the full analysis.

#CyberSecurity #Phishing #InfoStealer #EmailProtection
๐Ÿ”ฅ7โค6๐Ÿ‘€1
The regulatory landscape is shifting fast. The UK, Singapore, Australia, the EU, and North America are introducing mandatory fraud intelligence-sharing frameworks. But thereโ€™s a challenge: How can institutions share suspicious activity in real time without violating privacy laws?

The Problem:
๐Ÿ”น Payments settle in 10โ€“40 seconds
๐Ÿ”น Fraud detection takes 3โ€“7 days
๐Ÿ”น Criminals layer funds, convert them to crypto, and move funds offshore
๐Ÿ”น Less than 1% of laundered funds are recovered

Why Standard Solutions Fail: Traditional hashing methods are vulnerable to dictionary attacks, meaning โ€œanonymizedโ€ data can be reversed creating GDPR risks

The Solution: Privacy-preserving distributed tokenization enables institutions to share fraud signals in real time while staying compliant.

Real Results: In a pilot with 46 banks, just two institutions running real-time checks prevented $10โ€“15M in fraud annually.At full participation, projected savings could reach $100โ€“300M.

Read the full framework.

#GDPR #Cybersecurity
๐Ÿ”ฅ7๐Ÿ‘Œ4๐Ÿ‘2
๐ŸšจRemote hiring has opened new opportunities for companies worldwide but it has also created a new attack surface.

Our latest research dives into how DPRK-linked IT worker operations are infiltrating global companies by posing as remote developers. Instead of relying on traditional cyber intrusions, these actors exploit legitimate hiring processes using synthetic identities, AI-assisted workflows, and trusted developer platforms.

Key highlights:
๐Ÿ”นA coordinated ecosystem of fake developer personas operating across GitHub, portfolio sites, and freelancing platforms.
๐Ÿ”นReusable identity infrastructure including resumes, email accounts, and repositories.
๐Ÿ”นEvidence of AI-assisted job application workflows and templated interview responses
๐Ÿ”นArchived โ€œpersona packagesโ€ containing identity documents, portfolio assets, and operational instructions.
๐Ÿ”นMonitoring the activities of a specific intruder โ€œgroupโ€ from 2021 to March 2026.

Read the full blog here.

#ThreatIntelligence #CyberSecurity #InsiderThreat #DPRK
๐Ÿ”ฅ7โคโ€๐Ÿ”ฅ6โค4โšก1๐Ÿ‘1
๐Ÿ’ซWe are proud to announce that Group-IB is an initial data contributor to the newly released MITRE Fight Fraud Frameworkโ„ข (F3) developed by MITRE Corporation.

By contributing our proprietary fraud taxonomy and intelligence derived from real-world investigations, we are helping shape a standardized framework that enables organizations to classify, understand, and respond to fraud threats more effectively.

This collaboration goes beyond classification. By integrating the framework into Group-IBโ€™s Fraud Matrix, organizations will be able to connect standardized fraud techniques with live adversary intelligence, detection methodologies, and mitigation strategies strengthening predictive fraud defense across industries.

Fraud doesnโ€™t begin with a transaction. It begins with an attacker and understanding adversary behavior is key to staying ahead.

Read the full announcement here.

#CyberSecurity #FinancialSecurity #FraudPrevention #ThreatIntelligence #FraudMatrix
๐Ÿ”ฅ13๐Ÿ‘7โค3
๐Ÿšจ W3LL wasn't just another phishing operation, it was a mature phishing-as-a-service ecosystem that industrialized BEC at scale. Over 7+ years, the actor built a closed, referral-only marketplace powering 500+ cybercriminals with AiTM tooling designed to bypass MFA, hijack sessions, and compromise Microsoft 365 accounts.

This investigation reveals not just the tools, but the infrastructure, operational model, and key weaknesses behind the W3LL phishing ecosystem.

Key highlights:
๐Ÿ”น AiTM-based W3LL Panel engineered for MFA bypass and session cookie theft
๐Ÿ”น W3LL Store: a full-service PhaaS marketplace with tooling, data, and infrastructure
๐Ÿ”น License validation APIs exposing backend links to the operator
๐Ÿ”น Analysis of 700+ weaponized phishing samples that supported victim and campaign mapping
๐Ÿ”น OpSec failures across forums, infrastructure, Telegram, and Indonesian-speaking hacking community ties

Read the full technical analysis.

#ThreatIntel #Cybercrime #Phishing #BEC #CyberSecurity #Infosec
๐Ÿ”ฅ8โค5๐Ÿ‘€1
๐Ÿ˜ง In 2025, a hacktivist group filmed itself blocking biomass fuel supply and triggering emergency alarms at a Polish factory, then posted the video on Telegram.

Group-IB's Threat Intelligence team analyzed the 2025โ€“early 2026 threat landscape targeting European manufacturing across six countries.

What we detected โฌ‡๏ธ
โ–ช๏ธ200 hacktivist incidents targeting European manufacturers
โ–ช๏ธ57 cases of claimed access to industrial control systems

โ€ผ๏ธ The shift is real: hacktivist groups have moved beyond website takedowns to physical control of production systems, manipulating boiler temperatures, ventilation pressure, and biomass fuel supply.

Hacktivism is only one of five threat categories covered in our new report, Inside Europe's Manufacturing Cyber Threat Landscape. The other four are just as urgent.

Read more to predict and prevent attacks on your organization.

#CyberSecurity #Hacktivism #ThreatIntelligence
๐Ÿ‘7๐Ÿ‘€2โค1
๐Ÿšจ Our latest research suggests that a significant share of newly registered business accounts in France may be linked to mule activity, highlighting how business-grade payment infrastructure combined with fast remote onboarding has created an attractive entry point for large-scale financial crime operations

Key Highlights:
๐Ÿ”นVerified mule business accounts are sold on underground markets for $300โ€“$700, with sellers offering escrow services, replacement guarantees, and daily inventory.
๐Ÿ”นThreat actors bypass KYC by using real victims harvesting PII via phishing and socially engineering them to complete identity verification.
๐Ÿ”นOperations rely on SIM farms, anti detect environments, and cheap Android devices to scale account creation and maintain infrastructure.
๐Ÿ”นDetecting these operations requires analysing the entire account lifecycle, since sign up, KYC, and first login can appear legitimate in isolation.

Read the full technical analysis.

#FraudPrevention #FintechSecurity #CyberSecurity
๐Ÿ”ฅ4โค3๐Ÿ‘3