Posts in Category

Illicit communities

Vulnerability Management
China is Exploiting Network Providers and Devices, Says US Cybersecurity Advisory
On June 7, the US Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), ...
Read post
Current events
US Seizes SSNDOB Market, Which Sold PII of 24 Million People
The DOJs takedown of SSNDOB is the latest in a series of seizures of illicit marketplaces, forums, and shops, ...
Read post
Cyber Threat Intelligence
After Hydra: Telegram, Cash-out Services, Decentralization, and a Slew of Struggling Alternatives
The fight between various marketplaces for their place under the sun demonstrates the significance of Hydra in ...
Read post
Cyber Threat Intelligence
Definitive Guide to Ransomware: What It Is and How Your Organization Can Prevent, Detect, and Respond to a Ransomware Attack
A guide to defining, explaining, and understanding ransomware to bolster your organizations security posture ...
Read post
Cyber Threat Intelligence
Raid Forums Is Down. Who’s Behind Its Apparent Seizure? [Updated]
Updated April 12: Today, the US Department of Justice (DOJ) issued a press release confirming their seizure of ...
Read post
Cyber Threat Intelligence
German Authorities Seize Hydra’s Servers, Close the Largest Russian-Language Darknet Market [Updated]
German authorities announced today that they had taken down the Germany-based servers of Hydra Market—the ...
Read post
Current events
Breach Forums Is Marketing Itself as a Raid Forums Successor
On March 16, just about three weeks after Raid Forums was seized, a threat actor named “pompompurin,” ...
Read post
Cyber Threat Intelligence
All About LAPSUS$: What We Know About the Extortionist Group [Updated]
On March 23, Bloomberg released an article tying the group’s ringleader to the online aliases “white” and ...
Read post
Cyber Threat Intelligence
Who’s Behind Iranian Cyber Threat Actor Group MuddyWater?
On January 12, US Cyber Command attributed the Iranian cyber threat group “MuddyWater” to Iran’s Ministry ...
Read post
Cyber Threat Intelligence
Fact or Fiction? Four Myths About the Deep and Dark Web, Debunked
Rumors about the deep and dark web abound, but which of them are true, which are malarkey, and which are a bit of ...
Read post
Cyber threat intelligence
Illicit Communities Vs. Deep and Dark Web: Why the Full Intelligence Picture Depends on Both
In order to identify emerging cyber and physical threats, fraud, and other malicious activity, CTI and SOC teams ...
Read post
Cyber threat intelligence
RAMP Ransomware’s Apparent Overture to Chinese Threat Actors
Flashpoint has observed an increase in recent weeks of Mandarin and Chinese-speaking threat actors on RAMP as ...
Read post