Investigators from seven Southeast Asian nations collaborated on a joint Interpol operation that identified approximately 8,800 C2 servers in eight countries and nearly 270 compromised websites, including government portals.
A recently discovered malvertising campaign called Binary Options is redirecting Internet users to a fake trading company webpage, before infecting some of these victims with a banking trojan via the RIG exploit kit.
Three New York-area men have separately pleaded guilty in federal court to one count of conspiracy to commit bank fraud, in relation to the theft of at least $428,581 in funds from various New Jersey banking locations.
Malwarebytes researchers spotted an uptick in United States Postal Service (USPS) themed malspam delivering one of three banking trojans.
Hackers launched an attack against Union Bank of India that was very similar to the attack Bangladesh bank heist that resulted in the theft of $81 million.
Kaspersky Lab on Tuesday revealed further details about a memory-only "fileless malware" campaign that a cybercriminal organization has been employing to steal money remotely from ATMs while leaving behind virtually no trace of malicious activity.
Authorities are reportedly closing in on the culprit behind the February 2016 Bangladesh Central Bank heist. Not only does the FBI officially believe the robbers to be state sponsored, but unofficially authorities suspect they are North Korean.
The author of a powerful banking trojan has reportedly leaked his own source code in order to get back into the good graces of the greater cybercrime community, which shunned him for breaches of rules and etiquette on cybercrime forums.
Switzerland's cognitive security operations centre will be built around IBM Watson for Cyber Security and provide in-country support to the banking sector.
U.S. prosecutors are reportedly building a case against Nort. Korea to examine the nation's potential role in the 2016 Bangladesh Bank digital heist
It's no secret that calculating an individual or company's risk varies between each task as the economics of cybersecurity remain uncertain.
Russian national Mark Vartanyan pleaded guilty on Monday to one count of computer fraud in related to his role in co-developing and distributing Citadel malware under the hacker alias Kolypto.
FireEye's annual M-Trends report finds that financial attacks have reached nation-state level of sophistication.
Nine out of 10 fraudulent applications for bank accounts and other financial products made online.
Fake HSBC emails are being spread, asking users to install a malicious version of Rapport, a legitimate security program designed to protect online bank accounts from fraud.
Developers behind Dridex have launched a major new version of the banking trojan, one that employs a unique method for injecting malicious code based on a technique called AtomBombing. And UK banks already feel the heat.
Preying on Russian businesses that rely on Remote Banking Systems, the cybercrime group RTM is using backdoor malware to first silently compromise systems, and then perform reconnaissance, swipe data and steal funds.
The number of cyberattacks targeting financial institutions and their customers soared to new heights in 2016, according to Kaspersky Lab, which observed nearly 1.09 million banking trojan attacks on users in 2016.
Malware samples recovered from watering hole attacks recently targeting banks across the globe contain false flags that fraudulently suggest Russian actors are behind the campaign, even though the most likely culprit is the Lazarus Group.
A company payroll worker was likely duped by a W-2 phishing scam resulting in cybercriminals filing false returns using stolen data.
To combat alert fatigue among its security analysts, transportation service Uber applies specially customized data sets to flagged incidents to help distinguish between genuine threats and non-malicious activities.
Users who install the malware might find their mobile devices held to ransom or bank accounts emptied.
One or more unidentified hacker groups are leveraging free and commonly available pen testing tools to attack enterprises in the finance, government and telecom sectors with "fileless" malware that resides only in a machine's RAM, making it extremely difficult to detect and analyze.
The InterContinental Hotels Group announced 12 of its U.S. hotels were affected by a payment card breach.
Arbor Networks researchers spotted the Flokibot malware family to target Point of Sale Infrastructure in Brazil and other countries.