Group-IB
2.21K subscribers
744 photos
26 videos
2 files
530 links
Your daily source of cybersecurity news brought to you by Group-IB, one of the global industry leaders.
Download Telegram
#cybersecuritytips #breaches

The consequences of data breaches might be devastating for companies. This #CybersecurityAwarenessMonth we want to share with you some recommendations on how to prevent data leakages. Check them out!
๐Ÿ”ฅ8
#report #OPERA1ER

๐Ÿ’ธ OPERA1ER knocking on your door. The prolific French-speaking threat actor, codenamed OPERA1ER (aka Common Raven and DESKTOP-group) managed to carry out more than 30 successful attacks against banks, financial services, and telecommunication companies mainly located in Africa between 2018 and 2022. Many of the victims identified were successfully hit twice, and their infrastructure was then used to attack other organizations.

In collaboration with the researchers from Orange CERT Coordination Center, Group-IB is releasing a new report "OPERA1ER. Playing God without permission".

๐Ÿ“OPERA1ER traces its roots back to 2016. Between 2018 and 2022, the gang managed to steal at least $11 million, and the actual amount of damage could be as high as $30 million.

๐Ÿ“OPERA1ER has been seen targeting companies across in 15 countries: Ivory Coast, Mali, Burkina Faso, Benin, Cameroon, Bangladesh, Gabon, Niger, Nigeria, Paraguay, Senegal, Sierra Leone, Uganda, Togo, Argentina. Africa clearly remains their priority.

๐Ÿ“One of OPERA1ERโ€™s attacks involved a vast network of 400 mule accounts for fraudulent money withdrawals.

Download Group-IB's new report "OPERA1ER. Playing God without permission" to get detailed information about the tactics, techniques, and procedures (TTPs), tools and kill chain of this gang.
๐Ÿ”ฅ10
Group-IB
#report #OPERA1ER ๐Ÿ’ธ OPERA1ER knocking on your door. The prolific French-speaking threat actor, codenamed OPERA1ER (aka Common Raven and DESKTOP-group) managed to carry out more than 30 successful attacks against banks, financial services, and telecommunicationโ€ฆ
#blog #OPERA1ER

Threat actors are constantly developing new TTPs and in August 2022, with the help of Przemyslaw Skowron, Group-IB identified some new servers used by OPERA1ER. The latest IOCs and OPERA1ERโ€™s targets can be found in this blog post๐Ÿ‘ˆ
๐Ÿ‘5
#fraud #conference

Letโ€™s stamp out digital fraud together!

Group-IB teamed up in late October with its partner Versos to host the first ever Fraud Day โ€” Saudi Arabia in Riyadh! The event, organized in collaboration with the Saudi Banking Committee for Information Security (BCIS), brought together thought leaders and representatives from leading Saudi Arabian, Middle Eastern, and global financial institutions to discuss best practices to combat the growing threat of digital fraud.

More details๐Ÿ‘ˆ
๐Ÿ”ฅ12
#scam #phishing

Group-IB uncovered a wide-scale scam campaign that saw malicious actors imitate a leading manpower provider in the Kingdom of Saudi Arabia. In total, Group-IB identified more than 1,000 rogue domains created by the scammers as part of this scheme.

๐Ÿ“Campaign was first observed in April 2021 and peaked in activity this past spring.

๐Ÿ“The malicious actors utilized multi-step social engineering techniques to steal usersโ€™ credentials for banks and online governmental service portals.

๐Ÿ“Scammersโ€™ portfolio includes fake websites and social media pages that contain links to WhatsApp conversations.

๐Ÿ“During WhatsApp conversations, the scammers sent phishing website links to users, who are then tricked into entering their bank account credentials or government service portal logins when asked to make a fake processing payment for sourcing domestic workers.

๐Ÿ“The scammers created scam pages emulating 11 leading regional banks to steal victimsโ€™ bank account details.

In line with Group-IBโ€™s zero-tolerance policy to cybercrime, the Group-IB Computer Emergency Response Team (CERT-GIB) notified its fellow OIC-CERT member Saudi CERT (CERT-SA) of its findings to assist with subsequent steps to mitigate this scam campaign.

Read our new blog post to learn more about the scheme, and to get recommendations on how to avoid falling victim to phishing attacks. Click here๐Ÿ‘ˆ
๐Ÿ”ฅ14๐Ÿ‘3โค2
#conference #BHMEA22

It's a wrap for Black Hat MEA 2022! The event brought together global infosec experts for 3 amazing days of workshops, networking, and sharing first-hand knowledge on how to how to stay ahead of cybercriminals. Group-IB team was beyond happy to meet friends, partners, vendors and cybersecurity experts at the venue.

Group-IB's Head of Dynamic Malware Analysis Team Ivan Pisarev speaking session on "The (Former) Conti Enterprise: The Underground's Booming IT Business" took a deep dive into the notorious ransomware gang. If you want to learn more about Conti, download Group-IB's report "Conti Armada: The ARMattack Campaign"๐Ÿ‘ˆ

Thanks Black Hat MEA for such an outstanding cybersecurity event!
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
โค12๐Ÿ‘4๐Ÿ”ฅ2