Group-IB
2.21K subscribers
744 photos
26 videos
2 files
530 links
Your daily source of cybersecurity news brought to you by Group-IB, one of the global industry leaders.
Download Telegram
Group-IB has analyzed an ongoing advanced persistent threat campaign that we believe, with moderate confidence, was launched by a new threat actor. This new APT group, codenamed Dark Pink by Group-IB researchers, is notable due to their specific focus on attacking branches of the military, and government ministries and agencies.

Group-IB discovered that, as of December 2022, Dark Pink APT breached the security defenses of six organizations in five APAC countries (Cambodia, Indonesia, Malaysia, Philippines, and Vietnam), and one organization in Europe (Bosnia and Herzegovina).

Group-IB, in line with its zero-tolerance policy to cybercrime, has issued proactive notifications to all potential and confirmed targets of Dark Pink. Read our fresh blog post to get the details about the new threat actor๐Ÿ‘ˆ

#APT #DarkPink
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ12๐Ÿ‘1
This media is not supported in your browser
VIEW IN TELEGRAM
โšก๏ธGroup-IB Hi-Tech Crime Trends 2022/2023 report is out!

Group-IB presents the 11th edition of its annual report Hi-Tech Crime Trends 2022/2023 โ€” a comprehensive threat report, that analyzes various aspects of the cybercriminal world, examines attacks, and shares predictions for what lies ahead๐Ÿ”ฎ

What will you find in the report?

โ€ข Analysis of current trends in cyber space
โ€ข Forecasts for 2023
โ€ข Detailed analysis of the global threat landscape
โ€ข Security recommendations

Who is this report intended for?

The Hi-Tech Crime Trends 2022/2023 report is a practical guide for building effective cybersecurity strategies. It is intended for IT directors, heads of cybersecurity teams, technical specialists, including ะกISOs, SOC and DFIR teams, researchers and malware analysts, as well as threat hunting experts.

Want some spoilers?

โ€ข Ransomware is the number one threat across all industries. Surprised? itโ€™s unlikely to change soon.
โ€ข Initial Access Brokers (IABs) make the attacks of ransomware gangs and other threat actors more affordable.
โ€ข Amount of databases leaked worldwide has doubled and continues to grow.
โ€ข Information stealers and clouds of logs โ€” a simple but serious threat.

Where can you get the full report?

The Hi-Tech Crime Trends 2022/2023 report is already available for downloading. Click here ๐Ÿ‘ˆ

#HiTechCrimeTrends #report
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ13๐Ÿ‘3โค2๐Ÿ†2
Let's dive a little bit deeper into the ransomware threat. According to the latest edition of Group-IBโ€™s annual Hi-Tech Crime Trends report, ransomware will remain the top threat for organizations and businesses in 2023.

Here are some highlights:

๐Ÿ“Across the globe, 2,886 companies had their information, files, and data published on ransomware DLS between H2 2021 โ€“ H1 2022.

๐Ÿ“The top five most affected countries were the United States, Germany, United Kingdom, Canada, and Italy.

๐Ÿ“The largest number of ransomware-related data leak victims were found in the following sectors: manufacturing, real estate, professional services, and transportation industries.

๐Ÿ“The most active ransomware groups in H2 2021 โ€“ H1 2022 were Lockbit, Conti, and Hive.

Want to learn more about Group-IB's findings on ransomware and other cyberthreats? Download our newest report Hi-Tech Crime Trends 2022/2023๐Ÿ‘ˆ

#HiTechCrimeTrends #report #ransomware
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ7๐Ÿ‘1๐Ÿ‘1
๐Ÿ”ฎA little cybersecurity forecast never hurt nobody. We have put together the top cyber threats that you need to be aware of in 2023, according to Group-IB's annual Hi-Tech Crime Trends report.

Make sure to download the full report๐Ÿ‘ˆ

#HiTechCrimeTrends #report
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘7
Sharing is caring, and sharing data with the cybersec community is one of our contributions to the global fight against cybercrime. The Group-IB Threat Intelligence team now has its own Twitter account: make sure to follow for the latest research, analytics, IOCs and threat alerts ๐Ÿ‘‰ https://twitter.com/GroupIB_TI

#ThreatIntelligence
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘4๐Ÿ”ฅ2๐Ÿ˜ฑ1
๐Ÿ“จ It all started with an email...

In the summer of 2022, the Group-IB Managed Extended Detection and Response (MXDR) solution successfully detected and blocked an email carrying a malicious attachment. This email was intended for Group-IBโ€™s employees.

While analyzing this attack, the Group-IB Threat Intelligence team found patterns in the actions of the attackers and attributed the observed TTPs to the Tonto Team (aka HeartBeat, Karma Panda, CactusPete, Bronze Huntley, Earth Akhlut). What else did we find out about the threat actor?

โ–ช๏ธThe attackers used phishing emails to deliver malicious Microsoft Office documents created with the Royal Road Weaponizer, a tool widely used by Chinese nation-state threat actors.

โ–ช๏ธDuring the attack, Group-IB researchers noticed the use of the Bisonal.DoubleT backdoor. Bisonal.DoubleT is a unique tool developed by the Tonto Team APT.

โ–ช๏ธThe attackers used a new downloader that Group-IB analysts named TontoTeam.Downloader (aka QuickMute).

Check out our fresh blog where we provide indicators of compromise associated with the Tonto Team campaign and detailed analysis of the tools, techniques, and procedures (TTPs) of the threat actor. This information is useful for organizations fighting cybercrime and information security professionals โ€” chief information officers, SOC analysts, and incident responders โ€” in other sectors targeted by the Tonto Team. Read๐Ÿ‘ˆ

#APT #TontoTeam
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ10๐Ÿ‘5
โœ‰๏ธ The Group-IB Computer Emergency Response Team has analyzed malicious email campaigns detected by Group-IB Managed XDR in Q4 2022. Here are the highlights:

โ–ช๏ธArchives remained the primary pathway for malware delivery, although the proportion of campaigns that used this vector fell compared to Q3.

โ–ช๏ธIn Q4 2022, the top 3 widely used malware in phishing emails were SnakeKeylogger, AgentTesla, and FormBookFormgrabber. They accounted for 67% of all malicious email campaigns in Q3 2022. In 2023, stealers will remain one of the top cyber threats.

โ–ช๏ธThreat actors most often used hosting providers located in the United States, Netherlands, and Germany to host their C2 servers. 45% of phishing websites were hosted on .com domains.

#CERT #MXDR
๐Ÿ”ฅ10๐Ÿ‘3