Netcrook

Credential Theft

269 article(s)

Crypto Chaos: FTC Orders Nomad to Repay Millions After Massive Hack

🗓 17 Dec 2025 · 👤 INTEGRITYFOX · 🌍 North America

After a $186 million crypto heist, the FTC demands Nomad compensate victims and overhaul security, highlighting a saga of ignored warnings and industry-wide lessons.

Inside APT28’s Relentless Phishing Attacks on Ukrainian UKR.net Users

🗓 17 Dec 2025 · 👤 WHITEHAWK · 🌍 Europe

APT28, Russia’s notorious Fancy Bear hacking group, is targeting Ukrainian UKR.net users with a sophisticated phishing campaign. Using fake login pages, anonymized tunneling, and relentless tactics, the group continues its cyber-espionage operations amid the ongoing war.

AWS Crypto Mining Hack: How Compromised IAM Credentials Fueled a Massive Cloud Heist

🗓 16 Dec 2025 · 👤 BYTESHIELD · 🌍 North America

A sophisticated attack campaign exploited compromised AWS IAM credentials to deploy large-scale crypto mining operations, leveraging advanced persistence and anti-remediation tactics to evade detection and maximize cloud resource abuse.

SantaStealer Malware Exposed: New Info-Stealer Campaign Targets Credentials, Crypto, and More

🗓 16 Dec 2025 · 👤 HEXSENTINEL

SantaStealer, a new info-stealer malware-as-a-service, is targeting credentials, documents, and crypto wallets, but operational blunders are making it easier for defenders to detect and counteract. Our feature unpacks the campaign’s methods, risks, and what you need to know to stay safe.

DraftKings Hack: Third Hacker Pleads Guilty in $600,000 Credential Stuffing Case

🗓 15 Dec 2025 · 👤 NEONPALADIN · 🌍 North America

A third member of the DraftKings hacking ring has pleaded guilty to a credential stuffing scheme that compromised over 60,000 betting accounts and netted $600,000. The case highlights the dangers of password reuse and the persistence of credential-based attacks.

JSCEAL Malware: The New Stealth Threat Targeting Windows and Crypto Users

🗓 13 Dec 2025 · 👤 INTEGRITYFOX

The JSCEAL malware campaign is infiltrating Windows systems under the guise of cryptocurrency apps, using advanced scripting and stealth tactics to steal sensitive financial data. Learn how this evolving threat operates and what it means for online security.

Leaky Containers: How Docker Hub Images Are Exposing Global Production Secrets

🗓 12 Dec 2025 · 👤 PHANTOMINTEGRITY

A Netcrook investigation uncovers how thousands of Docker Hub images are leaking AI, cloud, and database credentials—giving attackers direct access to production systems across major industries.

Inside the JSCEAL Malware: How a New Infostealer Campaign is Hitting Windows Crypto Users

🗓 12 Dec 2025 · 👤 NEONPALADIN

A new wave of JSCEAL infostealer attacks is quietly targeting Windows users in the cryptocurrency sector. Discover how this malware is evolving, the tricks it uses to evade detection, and why defenders must adapt to stay ahead.

AI-Powered Phishing Kits and MFA Bypass: Inside the New Wave of Credential Theft

🗓 12 Dec 2025 · 👤 BYTESHIELD

A new generation of phishing kits is arming cybercriminals with AI-driven automation and MFA bypass tools, enabling mass credential theft and targeting major brands and European banks. Discover how these kits work and what defenders must do to keep up.

Secrets in the Cloud: The Docker Hub Credential Leak Exposing Industry Giants

🗓 12 Dec 2025 · 👤 PHANTOMINTEGRITY

Over 10,000 Docker Hub images have leaked sensitive credentials from more than 100 companies, including industry giants. This feature investigates how a simple developer mistake—and shadow IT—can unlock entire corporate environments for attackers.

« Prev 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 Next »