The Shadow Brokers group that has been leaking alleged NSA hacking tools, is now threatening to launch a "Dump of the Month" service that will deliver more stolen tools and data to paying subscribers.
Three Chinese hackers were ordered by a Federal Judge in Manhattan to pay a combined total of approximately $9 million in fines.
Two recent cybertheft campaigns targeting South Koreans employed a three-stage downloader framework that installed the Blackmoon banking trojan on geo-targeted machines, according to a report Thursday from Fidelis.
A zero-day bug in Microsoft Office and WordPad that hackers exploited to spy on targeted users, implant malware, and steal banking credentials took nine months to fix, according to news reports.
Investigators from seven Southeast Asian nations collaborated on a joint Interpol operation that identified approximately 8,800 C2 servers in eight countries and nearly 270 compromised websites, including government portals.
A recently discovered malvertising campaign called Binary Options is redirecting Internet users to a fake trading company webpage, before infecting some of these victims with a banking trojan via the RIG exploit kit.
Three New York-area men have separately pleaded guilty in federal court to one count of conspiracy to commit bank fraud, in relation to the theft of at least $428,581 in funds from various New Jersey banking locations.
Malwarebytes researchers spotted an uptick in United States Postal Service (USPS) themed malspam delivering one of three banking trojans.
Hackers launched an attack against Union Bank of India that was very similar to the attack Bangladesh bank heist that resulted in the theft of $81 million.
Kaspersky Lab on Tuesday revealed further details about a memory-only "fileless malware" campaign that a cybercriminal organization has been employing to steal money remotely from ATMs while leaving behind virtually no trace of malicious activity.
Authorities are reportedly closing in on the culprit behind the February 2016 Bangladesh Central Bank heist. Not only does the FBI officially believe the robbers to be state sponsored, but unofficially authorities suspect they are North Korean.
The author of a powerful banking trojan has reportedly leaked his own source code in order to get back into the good graces of the greater cybercrime community, which shunned him for breaches of rules and etiquette on cybercrime forums.
Switzerland's cognitive security operations centre will be built around IBM Watson for Cyber Security and provide in-country support to the banking sector.
U.S. prosecutors are reportedly building a case against Nort. Korea to examine the nation's potential role in the 2016 Bangladesh Bank digital heist
It's no secret that calculating an individual or company's risk varies between each task as the economics of cybersecurity remain uncertain.
Russian national Mark Vartanyan pleaded guilty on Monday to one count of computer fraud in related to his role in co-developing and distributing Citadel malware under the hacker alias Kolypto.
FireEye's annual M-Trends report finds that financial attacks have reached nation-state level of sophistication.
Nine out of 10 fraudulent applications for bank accounts and other financial products made online.
Fake HSBC emails are being spread, asking users to install a malicious version of Rapport, a legitimate security program designed to protect online bank accounts from fraud.
Developers behind Dridex have launched a major new version of the banking trojan, one that employs a unique method for injecting malicious code based on a technique called AtomBombing. And UK banks already feel the heat.
Preying on Russian businesses that rely on Remote Banking Systems, the cybercrime group RTM is using backdoor malware to first silently compromise systems, and then perform reconnaissance, swipe data and steal funds.
The number of cyberattacks targeting financial institutions and their customers soared to new heights in 2016, according to Kaspersky Lab, which observed nearly 1.09 million banking trojan attacks on users in 2016.
Malware samples recovered from watering hole attacks recently targeting banks across the globe contain false flags that fraudulently suggest Russian actors are behind the campaign, even though the most likely culprit is the Lazarus Group.
A company payroll worker was likely duped by a W-2 phishing scam resulting in cybercriminals filing false returns using stolen data.