Netcrook Logo

Tag: cybercrime

1611 article(s)

Scattered Spider Hacker Pleads Guilty: $8M Crypto Theft Unveiled

20 Apr 2026 news 🌍 Europe

A British man at the helm of the Scattered Spider cybercrime group has pleaded guilty to orchestrating a massive $8 million cryptocurrency heist, revealing the inner workings of one of the most notorious hacking collectives of recent years.

#Crypto Heist | #Cybercrime | #SIM Swapping

How Trusted Tools Became Cybercrime’s Secret Weapons: Inside This Week’s Stealth Attacks

20 Apr 2026 news

Trusted paths—from browser extensions to update channels—are being exploited for stealthy, multi-stage cyberattacks. This week’s feature investigates how the ordinary became the new battleground for malware, supply-chain hacks, and AI-powered scams.

#Cybercrime | #Supply Chain | #Malware

Phantom Phisher: Inside the British-Led $8 Million Crypto Heist

20 Apr 2026 news 🌍 North America

A British national’s confession exposes a sophisticated campaign of phishing and SIM swapping that netted millions in cryptocurrency from major U.S. firms. Here’s how the cybercriminals did it—and what it means for the future of digital security.

#Phishing | #SIM Swapping | #Cybercrime

🏴‍☠️ Ransomware Hits Better House: Payload Gang Targets Real Estate Giant

20 Apr 2026 news 🌍 Africa

Payload, a notorious ransomware group, has named Better House as its latest victim, threatening sensitive data in the high-stakes world of real estate. What does this mean for the industry and those who trust it?

#Ransomware | #Better House | #Cybercrime

🏴‍☠️ Shadow Notes: Stealthy Ransomware Campaign Hits Turkish Users with Adwind RAT

20 Apr 2026 news 🌍 Asia

Turkish users are being targeted by a stealthy ransomware campaign using a modified Adwind RAT, advanced obfuscation, and Tor-based communications. This localized attack demonstrates how smaller cybercriminal groups can evade detection and quietly extort victims for years.

#Ransomware | #Adwind RAT | #Cybercrime

Intel Utility Hijacked: Hackers Use AppDomain Hijacking to Evade Detection

20 Apr 2026 news 🌍 North America

Hackers are exploiting a trusted Intel-signed utility using AppDomain hijacking, bypassing security controls and launching stealthy malware campaigns that are nearly impossible to detect with traditional tools.

#AppDomain Hijacking | #Cybercrime | #Malware

Microsoft-Signed Malware: FUD Crypt Service Delivers Stealth Attacks

20 Apr 2026 news 🌍 North America

A new cybercrime service called FUD Crypt is arming hackers with Microsoft-signed, fully undetectable malware. By abusing Azure Trusted Signing, attackers can deploy persistent backdoors that blend in with legitimate system processes—no coding required.

#Malware | #Microsoft | #Cybercrime

Signed, Sealed, Subverted: Cybercriminals Hijack Microsoft Signing for Stealth Malware

20 Apr 2026 news 🌍 North America

FUD Crypt has weaponized Microsoft’s trusted signing to deliver invisible, command-enabled malware to paying subscribers. This exposé breaks down the platform’s evasion tactics and what it means for cybersecurity.

#Malware | #Cybercrime | #Microsoft

ATHR: The AI Toolkit Supercharging Large-Scale Vishing Attacks

20 Apr 2026 news

A new cybercrime platform called ATHR is making large-scale, AI-powered vishing and phone phishing attacks easier and more dangerous than ever—evading traditional defenses and putting organizations at risk.

#AI vishing | #Cybercrime | #Credential harvesting

Virtual Shadows: QEMU Virtual Machines Fuel Next-Gen Cyber Attacks

20 Apr 2026 news

Attackers are hijacking QEMU virtual machines to create invisible backdoors for credential theft and ransomware, making detection nearly impossible for security teams.

#QEMU | #cybercrime | #credential theft