Intel 471 Blog
Emotet is back. Here's what we know.Nov 16, 2021
This marks the first time we observed Emotet malware activity after a takedown was announced in January.
How cryptomixers allow cybercriminals to clean their ransomsNov 16, 2021
A thorough understanding of these mixing services' operational underpinnings is key to comprehending how criminals are laundering the money.
Cybercrime underground flush with shipping companies’ credentialsNov 02, 2021
The actors responsible for selling these credentials range from newcomers to the most prolific network access brokers that Intel 471 tracks.
Cybercriminals cash in on black market vaccine schemesOct 20, 2021
Cybercriminals and the forums where they gather online will take on any scheme, no matter how technical, in order to make money.
The public sector is a juicy target for cybercriminalsSep 30, 2021
Intel 471 has observed a greater number of compromises in government institutions at the regional, local and municipal level.
Cybercriminals going after one-time passwords with Telegram-powered botsSep 29, 2021
We’ve seen actors provide access to services that call victims, appear as a legitimate call from a specific bank and deceive victims into typing an OTP or other verification code into a mobile phone.
Manufacturers should focus on protecting their supply chainsSep 22, 2021
Intel 471 has observed ransomware-as-a-service crews and network access brokers target various manufacturing companies in order to carry out their crimes.
How Groove Gang is shaking up the Ransomware-as-a-Service Market to Empower AffiliatesSep 09, 2021
Cybercriminals look to break traditional hierarchies within Ransomware-as-a-Service groups, as new models and collaboration equals more profit.