๐จGroup-IBโs first Weaponized AI report reveals how cybercriminals are operationalizing artificial intelligence to drive a fifth wave of cybercrime.
Skills that once required human expertise, such as persuasion, impersonation, and malware development, are now being turned into on-demand services, available at scale and speed. From the abuse of publicly available LLMs to the rise of proprietary Dark LLMs traded on the dark web, AI crimeware is rapidly being commercialized across the underground economy.
Key insights from the report:
โ Mentions of AI on dark web forums surged 371% between 2019 and 2025, signalling rapid adoption by threat actors.
โ AI-powered phishing tools are selling for as little as $30 per month.
โ A growing deepfake-as-a-service market, with synthetic identity kits from US$5 and activity up 52% YoY in 2025.
โ Criminal-grade LLMs sold for $30โ$200 per month, with customer bases exceeding 1,000 users.
๐ Download the full report.
#AI #DarkWeb #Deepfake
Skills that once required human expertise, such as persuasion, impersonation, and malware development, are now being turned into on-demand services, available at scale and speed. From the abuse of publicly available LLMs to the rise of proprietary Dark LLMs traded on the dark web, AI crimeware is rapidly being commercialized across the underground economy.
Key insights from the report:
โ Mentions of AI on dark web forums surged 371% between 2019 and 2025, signalling rapid adoption by threat actors.
โ AI-powered phishing tools are selling for as little as $30 per month.
โ A growing deepfake-as-a-service market, with synthetic identity kits from US$5 and activity up 52% YoY in 2025.
โ Criminal-grade LLMs sold for $30โ$200 per month, with customer bases exceeding 1,000 users.
๐ Download the full report.
#AI #DarkWeb #Deepfake
๐ฅ9
๐ Group-IB announces the launch of Cloud Security Posture Management (CSPM) as part of our Unified Risk Platform. Designed to help organizations reduce risks associated with cloud transformation, it ensures business continuity by identifying misconfigurations, eliminating compliance gaps, and enhancing cloud security from initial development through to deployment.
What makes Group-IB CSPM different:
๐น See the configurations that matter most: By enriching posture findings with real-world exposure data from Group-IB Attack Surface Management and industry-leading Group-IB Threat Intelligence, your team sees cloud risks as attackers would.
๐น Combined with built-in CI/CD misconfiguration checks and a unified Group-IB ecosystem, it goes beyond traditional CSPM to give you deep visibility that closes active cloud risks.
Read the full press release to learn how Group-IB is redefining cloud security posture management.
#CloudSecurity #CSPM #CyberSecurity
What makes Group-IB CSPM different:
๐น See the configurations that matter most: By enriching posture findings with real-world exposure data from Group-IB Attack Surface Management and industry-leading Group-IB Threat Intelligence, your team sees cloud risks as attackers would.
๐น Combined with built-in CI/CD misconfiguration checks and a unified Group-IB ecosystem, it goes beyond traditional CSPM to give you deep visibility that closes active cloud risks.
Read the full press release to learn how Group-IB is redefining cloud security posture management.
#CloudSecurity #CSPM #CyberSecurity
๐5โค4๐ฅ1
โจWe are proud to continue our participation in the Hong Kong Cyber Security Action Task Force, following its extension by the Hong Kong Police Force for another 2 years. This ongoing collaboration reflects the trust placed in Group-IBโs predictive, adversary-focused threat and fraud intelligence, helping authorities and organizations anticipate and disrupt cyber threats before impact.
During the Inauguration Ceremony, Anastasia Tikhonova, Global Threat Research Lead at Group-IB, received the CSATF certificate from Commissioner of Police CHOW Yat-ming in recognition of Group-IBโs contribution to the Cyber Security Action Task Force and its support of law-enforcement efforts in Hong Kong.
At the same event, Vesta Matveeva, Head of Strategic Cybercrime Investigations at Group-IB, was awarded Silver at the Cyber Security Professional Awards 2025 (CSPA), a recognition of investigative excellence and real-world impact.
๐ Read the full press release.
#LawEnforcement #ThreatIntelligence #CyberCrime #CSPA2025
During the Inauguration Ceremony, Anastasia Tikhonova, Global Threat Research Lead at Group-IB, received the CSATF certificate from Commissioner of Police CHOW Yat-ming in recognition of Group-IBโs contribution to the Cyber Security Action Task Force and its support of law-enforcement efforts in Hong Kong.
At the same event, Vesta Matveeva, Head of Strategic Cybercrime Investigations at Group-IB, was awarded Silver at the Cyber Security Professional Awards 2025 (CSPA), a recognition of investigative excellence and real-world impact.
๐ Read the full press release.
#LawEnforcement #ThreatIntelligence #CyberCrime #CSPA2025
๐ฅ8โค3
๐จShadowSyndicate isnโt a single campaign or threat actor, itโs a malicious activity cluster formed by numerous servers sharing the same SSH fingerprints. That infrastructure is used for hosting of various attack frameworks and is involved in multiple, mostly ransomware, cyber operations.
Our latest research breaks down how reuse of SSH fingerprints performed with OPSEC inaccuracies reveals links between seemingly unrelated activities. Discovered server clusters have the same use as known ones: various C2 frameworks running on servers, connections to multiple cyber campaigns attributed to different threat actors. All of that points to ShadowSyndicateโs likely role as either an Initial Access Broker or a Bulletproof Hosting provider.
For threat intelligence teams, these patterns matter. Infrastructure reuse creates opportunities for earlier detection, stronger correlation, and more effective disruption across the cybercrime supply chain. Read the full technical analysis here.
#CyberSecurity #ShadowSyndicate
Our latest research breaks down how reuse of SSH fingerprints performed with OPSEC inaccuracies reveals links between seemingly unrelated activities. Discovered server clusters have the same use as known ones: various C2 frameworks running on servers, connections to multiple cyber campaigns attributed to different threat actors. All of that points to ShadowSyndicateโs likely role as either an Initial Access Broker or a Bulletproof Hosting provider.
For threat intelligence teams, these patterns matter. Infrastructure reuse creates opportunities for earlier detection, stronger correlation, and more effective disruption across the cybercrime supply chain. Read the full technical analysis here.
#CyberSecurity #ShadowSyndicate
๐ฅ7โค1
๐จMany fraud programs cannot clearly answer two questions: where are we today, and where are we going?
Teams add tools, rules, and processes over time, but visibility and direction often lag behind. The result is fragmented controls, uneven governance, and reactive decisions.
Group-IBโs Unified Counter Fraud Framework provides a structured, seven-step lifecycle that helps organizations assess their current fraud maturity, define a target state, and plan measurable improvement.
Inside the white paper:
๐น A practical implementation methodology
๐น A maturity assessment tool for benchmarking
๐น Guidance for financial institutions, fintechs, and regulators
๐น Detailed mapping to ISO 37003:2025
Download the white paper.
#CyberSecurity #FraudPrevention #FinancialCrime #Fintech #Compliance
Teams add tools, rules, and processes over time, but visibility and direction often lag behind. The result is fragmented controls, uneven governance, and reactive decisions.
Group-IBโs Unified Counter Fraud Framework provides a structured, seven-step lifecycle that helps organizations assess their current fraud maturity, define a target state, and plan measurable improvement.
Inside the white paper:
๐น A practical implementation methodology
๐น A maturity assessment tool for benchmarking
๐น Guidance for financial institutions, fintechs, and regulators
๐น Detailed mapping to ISO 37003:2025
Download the white paper.
#CyberSecurity #FraudPrevention #FinancialCrime #Fintech #Compliance
๐9โค3
๐ Our High-Tech Crime Trends (HTCT) 2026 Report is here!
Supply chain attacks have become the dominant force reshaping the global cyber threat landscape.
Group-IB's HTCT Report 2026 reveals a decisive shift in cybercrime away from isolated intrusions toward ecosystem-wide compromise. Attackers are now exploiting trusted vendors, open-source software, SaaS platforms, and managed service providers to gain inherited access to hundreds of downstream organizations.
Key findings:
๐น Open-source ecosystems under siege npm and PyPI targeted with stolen credentials & automated malware worms
๐น Malicious browser extensions weaponized to harvest credentials and hijack sessions
๐น AI-powered phishing campaigns bypassing MFA through OAuth workflows
๐น Data breaches triggering multi-tenant, cascading downstream impact
๐น Industrialized ransomware supply chains coordinating upstream access
๐ฅ Download the High-Tech Crime Trends Report 2026.
๐ Read the full press release.
#CyberSecurity #SupplyChainAttack #HTCT2026
Supply chain attacks have become the dominant force reshaping the global cyber threat landscape.
Group-IB's HTCT Report 2026 reveals a decisive shift in cybercrime away from isolated intrusions toward ecosystem-wide compromise. Attackers are now exploiting trusted vendors, open-source software, SaaS platforms, and managed service providers to gain inherited access to hundreds of downstream organizations.
Key findings:
๐น Open-source ecosystems under siege npm and PyPI targeted with stolen credentials & automated malware worms
๐น Malicious browser extensions weaponized to harvest credentials and hijack sessions
๐น AI-powered phishing campaigns bypassing MFA through OAuth workflows
๐น Data breaches triggering multi-tenant, cascading downstream impact
๐น Industrialized ransomware supply chains coordinating upstream access
๐ฅ Download the High-Tech Crime Trends Report 2026.
๐ Read the full press release.
#CyberSecurity #SupplyChainAttack #HTCT2026
๐ฅ12โค5โก3
๐คGroup-IB has signed a strategic partnership with the National Polytechnic University of Armenia to advance cybersecurity education, research, and workforce development.
By embedding predictive threat intelligence, real-world investigative methodologies, and industry-grade tools into academic programs, the collaboration connects students to the same ecosystem that supports global cybercrime investigations bridging education with practical defense capabilities.
The initiative reinforces a shared commitment to developing future cybercrime fighters, strengthening Armeniaโs cyber resilience, and building a new generation of professionals ready to anticipate and disrupt evolving threats. Read the full announcement here.
#IncidentResponse #Cybersecurity #ThreatIntelligence #Infosec
By embedding predictive threat intelligence, real-world investigative methodologies, and industry-grade tools into academic programs, the collaboration connects students to the same ecosystem that supports global cybercrime investigations bridging education with practical defense capabilities.
The initiative reinforces a shared commitment to developing future cybercrime fighters, strengthening Armeniaโs cyber resilience, and building a new generation of professionals ready to anticipate and disrupt evolving threats. Read the full announcement here.
#IncidentResponse #Cybersecurity #ThreatIntelligence #Infosec
๐ฅ10
๐ How to share suspicious fraud data without breaking privacy laws
Until now, banks couldn't share intelligence on suspicious accounts without risking GDPR violations.
Group-IB's Cyber Fraud Intelligence Platform solves this with Bureau Veritas-validated Distributed Tokenization.
Watch our 18-minute panel discussion with experts explaining:
โ Why SHA-256 hashing fails privacy standards
โ How distributed tokenization enables compliant collaboration
โ How to stop APP scams as early as during the warm-up phase before any losses
๐ Watch now!
Until now, banks couldn't share intelligence on suspicious accounts without risking GDPR violations.
Group-IB's Cyber Fraud Intelligence Platform solves this with Bureau Veritas-validated Distributed Tokenization.
Watch our 18-minute panel discussion with experts explaining:
โ Why SHA-256 hashing fails privacy standards
โ How distributed tokenization enables compliant collaboration
โ How to stop APP scams as early as during the warm-up phase before any losses
๐ Watch now!
๐ฅ5
๐จ Indonesiaโs tax season exposed a coordinated fraud campaign powered by industrialized malware infrastructure.
Our latest technical deep dive reveals how the GoldFactory threat cluster leveraged shared infrastructure to deploy multiple malware families across an entire national digital ecosystem.
Key highlights:
๐น A highly synchronized campaign targeted ~67 million tax residents during the 2026 tax season.
๐น Infrastructure extended beyond tax services, abusing 16+ trusted brands with an estimated USD 1.5โ2M systemic impact.
๐น A multi-stage attack chain combined phishing, vishing, and malicious APK sideloading for full device takeover.
๐น 228 new Gigabud.RAT and MMRat samples were identified, highlighting rapid malware evolution.
๐น Attribution confirms GoldFactoryโs shift toward unified, cross-border fraud infrastructure.
๐น Proactive infrastructure mapping reduced fraud success to just 0.027% among protected, compromised devices
Read the full technical breakdown.
#CyberSecurity #MalwareAnalysis
Our latest technical deep dive reveals how the GoldFactory threat cluster leveraged shared infrastructure to deploy multiple malware families across an entire national digital ecosystem.
Key highlights:
๐น A highly synchronized campaign targeted ~67 million tax residents during the 2026 tax season.
๐น Infrastructure extended beyond tax services, abusing 16+ trusted brands with an estimated USD 1.5โ2M systemic impact.
๐น A multi-stage attack chain combined phishing, vishing, and malicious APK sideloading for full device takeover.
๐น 228 new Gigabud.RAT and MMRat samples were identified, highlighting rapid malware evolution.
๐น Attribution confirms GoldFactoryโs shift toward unified, cross-border fraud infrastructure.
๐น Proactive infrastructure mapping reduced fraud success to just 0.027% among protected, compromised devices
Read the full technical breakdown.
#CyberSecurity #MalwareAnalysis
โค10
๐จMuddyWater is back, and Operation Olalampo reveals how the actor continues to refine its intrusion tradecraft. This campaign combines macro-delivered payload chains, stealthy in-memory loaders, and a Rust-based Telegram C2 backdoor to maintain persistence and evade detection. Our analysis exposes sandbox-evasion techniques, fragmented encrypted communications, infrastructure reuse, and operator telemetry that provides rare insight into post-exploitation behavior.
Key highlights include the discovery of new malware variants, selective loader execution paths, AI-assisted development indicators, and backend infrastructure revealing how victims are tracked and managed with defensive recommendations including RMM tool restrictions, Telegram API monitoring, and memory integrity controls.
Dive into the full technical breakdown to understand the tooling, tactics, and defensive implications behind MuddyWater's latest operation.
#CyberSecurity #ThreatIntelligence #MalwareAnalysis #MuddyWater #Infosec
Key highlights include the discovery of new malware variants, selective loader execution paths, AI-assisted development indicators, and backend infrastructure revealing how victims are tracked and managed with defensive recommendations including RMM tool restrictions, Telegram API monitoring, and memory integrity controls.
Dive into the full technical breakdown to understand the tooling, tactics, and defensive implications behind MuddyWater's latest operation.
#CyberSecurity #ThreatIntelligence #MalwareAnalysis #MuddyWater #Infosec
๐ฅ9๐1