The rapid and recent rise of cyber threat actor group Indonesian Cyber Jawa represents a pivot within the Indonesian cyber underground towards a more sophisticated attack toolkit from a relatively underrepresented underground criminal faction. The group is concentrating its defacement efforts on online retailers while simultaneously attempting to defraud targets in the same business vertical.
Vigilante wishes to highlight a threat actor or threat actor group on an exclusive Russian-language Dark Web forum that is currently advertising the Ransomware-as-a-Service (RaaS) known as “Smaug”. Although this type service is not entirely new, the Smaug RaaS platform is a particularly attractive option for lower-tier or unskilled cyber criminals to enter the Ransomware threat space, increasing the proliferation…
Vigilante wishes to highlight two more ransomware groups that have adopted the Maze Team model of extorting their victims to pay: NetWalker and Ako. Under the Maze model, once the group has the victim’s data in its possession, it demands two separate ransoms; the first ransom amount is for providing a decryption key and the second is to delete all the data they copied and exfiltrated before locking up the victims’ files.
Vigilante found several malicious campaigns emanating from threat actors in the underground economy, which are targeting Canadian citizens who qualify for economic relief from the COVID-19 pandemic under Canada’s Economic Response Plan.
Prolific hacktivist group, Ghost Squad Hackers—also known as “GSH”— announced several new hacks of various government-affiliated sites and servers in a probable attempt to undermine public confidence in government at a time of universal unease due to the COVID-19 pandemic.
Vigilante discovered an emerging threat actor group attacking large online retailers using brute force checkers with large, frequently updated combo lists of login credentials.