Bleeping Computer: North Korean hackers using Chrome extensions to steal Gmail emails

Bleeping Computer: North Korean hackers using Chrome extensions to steal Gmail emails. “Kimsuky (aka Thallium, Velvet Chollima) is a North Korean threat group that uses spear phishing to conduct cyber-espionage against diplomats, journalists, government agencies, university professors, and politicians. Initially focused on targets in South Korea, the threat actors expanded operations over time to target entities in the USA and Europe.”

Krebs on Security: Two U.S. Men Charged in 2022 Hacking of DEA Portal

Krebs on Security: Two U.S. Men Charged in 2022 Hacking of DEA Portal. “Two U.S. men have been charged with hacking into a U.S. Drug Enforcement Agency (DEA) online portal that taps into 16 different federal law enforcement databases. Both are alleged to be part of a larger criminal organization that specializes in using fake emergency data requests from compromised police and government email accounts to publicly threaten and extort their victims.”

Organized Crime and Corruption Reporting Project: LockBit Gang Using Musk’s Internet Services, Laundering BitCoin in Hong Kong, China

Organized Crime and Corruption Reporting Project: LockBit Gang Using Musk’s Internet Services, Laundering BitCoin in Hong Kong, China. “A security strategist who spent months undercover on the darkweb published a report on Monday that offers insight into one of the world’s most notorious ransomware groups, claiming its members are using internet services owned by billionaire Elon Musk and laundering money through Hong Kong and China.”

Bleeping Computer: Google says former Conti ransomware members now attack Ukraine

Bleeping Computer: Google says former Conti ransomware members now attack Ukraine. “Google says some former Conti cybercrime gang members, now part of a threat group tracked as UAC-0098, are targeting Ukrainian organizations and European non-governmental organizations (NGOs). UAC-0098 is an initial access broker known for using the IcedID banking trojan to provide ransomware groups with access to compromised systems within enterprise networks.”

Krebs on Security: Ransomware Group Debuts Searchable Victim Data

Krebs on Security: Ransomware Group Debuts Searchable Victim Data. “Cybercrime groups that specialize in stealing corporate data and demanding a ransom not to publish it have tried countless approaches to shaming their victims into paying. The latest innovation in ratcheting up the heat comes from the ALPHV/BlackCat ransomware group, which has traditionally published any stolen victim data on the Dark Web. Today, however, the group began publishing individual victim websites on the public Internet, with the leaked data made available in an easily searchable form.”

Bleeping Computer: Conti ransomware targeted Intel firmware for stealthy attacks

Bleeping Computer: Conti ransomware targeted Intel firmware for stealthy attacks. “Researchers analyzing the leaked chats of the notorious Conti ransomware operation have discovered that teams inside the Russian cybercrime group were actively developing firmware hacks. According to messages exchanged between members of the cybercrime syndicate, Conti developers had created proof-of-concept (PoC) code that leveraged Intel’s Management Engine (ME) to overwrite flash and gain SMM (System Management Mode) execution.”

The Register: Even Russia’s Evil Corp now favors software-as-a-service

The Register: Even Russia’s Evil Corp now favors software-as-a-service. “The Russian-based Evil Corp is jumping from one malware strain to another in hopes of evading sanctions placed on it by the US government in 2019. You might be wondering why cyberextortionists in the Land of Putin give a bit flip about US sanctions: as we understand it, the sanctions mean anyone doing business with or handling transactions for gang will face the wrath of Uncle Sam. Evil Corp is therefore radioactive, few will want to interact with it, and the group has to shift its appearance and operations to keep its income flowing.”