cybercriminals

AppWizard
May 28, 2025
Google has released an updated fraud and scam advisory in anticipation of its inaugural Scams Summit, highlighting prevalent scam tactics such as customer support, package tracking, and toll road scams. The company has enhanced its Phone and Messages app with advanced scam protection features for Android users, integrating Gemini technology to detect and block potential scams. Google’s updated advisory also addresses risks from malvertising and counterfeit travel websites, while Chrome has received an update featuring AI-driven warnings for potential scams. Additionally, new scam protection features for calls and texts have been introduced, focusing on blocking actions when potential call scams are detected and identifying various scams related to toll roads, billing, cryptocurrency, and financial impersonation.
Tech Optimizer
May 28, 2025
Cybercriminals are executing a sophisticated malware campaign through a counterfeit Bitdefender antivirus website, specifically the domain “bitdefender-download[.]co,” which mimics the legitimate site. This fraudulent site distributes three types of malware: VenomRAT, StormKitty, and SilentTrinity, aimed at stealing financial data and maintaining persistent access to victims’ computers. When users click the “Download For Windows” button, they inadvertently download a ZIP file containing these malicious programs. VenomRAT acts as a remote access tool, allowing attackers to steal files, cryptocurrency wallets, and browser data, including credit card information. StormKitty quickly harvests sensitive credentials, while SilentTrinity provides stealthy long-term access for further exploitation. The fake Bitdefender site is linked to other malicious domains impersonating banks, indicating a coordinated phishing operation. The attackers utilize the same command and control infrastructure, with the IP address 67.217.228.160:4449 identified as a connection point. Bitdefender is working to take down the fraudulent site, and Google Chrome has begun flagging the link as malicious. Security experts recommend verifying website authenticity and downloading software only from official sources.
Winsage
May 28, 2025
Windows 10 and Windows 11 users are experiencing a rise in phishing emails that appear to be from Microsoft, according to Action Fraud, the UK's national fraud and cybercrime reporting center. Over 250 users have reported receiving fraudulent messages claiming their devices are infected with malware, often encouraging them to click on malicious links. These emails may look credible, sometimes using legitimate Microsoft addresses. Action Fraud advises users to verify messages directly with organizations using official contact details and warns that legitimate institutions will never request personal information via email. Microsoft also states it does not send unsolicited emails or calls for personal information and recommends downloading software only from official sources.
Winsage
May 26, 2025
Microsoft will officially discontinue support for Windows 10 on October 14, 2025. Users are encouraged to upgrade to Windows 11, which has specific hardware requirements including a modern processor, a minimum of 4 GB of RAM, and a TPM 2.0 security chip. To check compatibility, users can use the PC Health Check app. If a device does not meet the requirements, hardware upgrades or firmware adjustments may be necessary. If the BIOS mode is set to Legacy, users must convert the hard drive from MBR to GPT using the command mbr2gpt /convert /allowfullOS. It is recommended to back up data before upgrading. Microsoft is also offering an Extended Security Updates (ESU) option for approximately €27, extending support for an additional year.
Winsage
May 25, 2025
Microsoft Windows is a target for cybercriminals, particularly regarding password theft. Trend Micro has reported an increase in fraudulent Captcha attacks that trick users into executing malicious commands through the Windows Run dialog, leading to data theft and malware infections. These attacks utilize PowerShell and can deploy various malware types, including Lumma Stealer and AsyncRAT. Despite efforts to disrupt the Lumma Stealer network, threats persist, exploiting legitimate platforms. Microsoft recommends users adopt safer online practices and outlines seven mitigations for organizations: disable access to the Run dialog, apply least privilege, restrict access to unapproved tools, monitor unusual behavior, harden browser configurations, enable memory protection, and invest in user education.
Tech Optimizer
May 24, 2025
Apple devices, previously considered largely immune to cyber threats, are experiencing a rise in ransomware attacks targeting macOS, as reported by cybersecurity firm Black Fog. This shift is attributed to the increasing popularity of Apple devices and evolving ransomware tactics. Notable ransomware incidents include EvilQuest and MacRansom, with new threats like NotLockBit and FrigidStealer emerging. In response, Arms Cyber has begun offering ransomware protection for macOS, becoming the first firm to provide comprehensive protection across Windows, Linux, and macOS. Their solutions include real-time file entropy analysis, Steal Archival technology for rapid recovery, and Automated Moving Target Defense (AMTD) to thwart attacks. The growing use of Mac devices in critical sectors highlights the need for enhanced security measures, as attackers see opportunities in less protected systems. Managed Security Service Providers (MSSPs) are also being equipped with these protections to strengthen defenses against ransomware.
Tech Optimizer
May 23, 2025
Cloudflare, in collaboration with Microsoft and international law enforcement, has dismantled the infrastructure of LummaC2, an information-stealing malware service. This initiative led to the seizure and blocking of malicious domains and disrupted digital marketplaces used by criminals. Lumma Stealer operates as a subscription service providing threat actors access to a central panel for customized malware builds and stolen data retrieval. The stolen information includes credentials, cryptocurrency wallets, and sensitive data, posing risks of identity theft and financial fraud. Lumma Stealer was first identified on Russian-language crime forums in early 2023 and has since migrated to Telegram for distribution. Its proliferation is facilitated by social engineering campaigns, including deceptive pop-ups and bundled malware in cracked software. Cloudflare implemented measures to block access to Lumma's command and control servers and collaborated with various authorities to prevent the criminals from regaining control. Mitigation strategies for users include restricting unknown scripts, limiting password storage in browsers, and using reputable endpoint protection tools. The operation has significantly hindered Lumma's operations and aims to undermine the infostealer-as-a-service model contributing to cybercrime.
Winsage
May 22, 2025
Microsoft, in collaboration with law enforcement, has taken legal action against the Lumma malware operation, which has affected over 394,000 Windows PCs globally, particularly in Brazil, Europe, and the United States. A federal court authorized the seizure of 2,300 domains used as command and control servers for Lumma, and the Justice Department confiscated five additional domains related to its infrastructure. Lumma is primarily spread through questionable games or cracked applications and extracts sensitive information such as logins, passwords, credit card details, and cryptocurrency wallets, which is then sold to other cybercriminals. Lumma also facilitates the deployment of additional malware, including ransomware, and has been linked to significant cyberattacks on major tech companies like PowerSchool and Snowflake, resulting in substantial data theft.
Search