Digital Criminal Ontology; Trading Pistols for Programmers

Since computers were first connected with Ethernet cables, Hollywood started romanticizing hackers.
The movie was a science fiction thriller starring Matthew Broderick and Ally Sheedy as high school students who accidentally hacked a military supercomputer using an acoustic coupler, a device that connects phone lines with computers to send and receive data.
The fascination with hacking continues today as Hollywood scriptwriters poured out pages of epic hacker-related entertainment from The Matrix in 1999 to Mr. Robot in 2019.
As fictional as these stories may be-real life holds even stranger, true hacker tails.
The damage from hackers can result in the bizarre to the devastating.
In July 2017, the BBC reported how two individuals could hack into a Laserwash to make it attack vehicles once inside.
Equifax let several security areas lapse and allow attackers access to sensitive Personally Identifiable Information, including date of birth, social security numbers, addresses, driver's license numbers, etc.
In a bizarre example of reality following the fictional WarGames movie, in 2021, the Colonial Pipeline, an American fueling company, was the target of hackers who unleashed the DarkSide ransomware via a legacy Virtual Private Network system that did not have multi-factor authentication.
Today, hackers have organized into well-structured businesses that compete for top talent, from CEOs and HR to project managers and coders.
Several hacking groups are more prolific than others, and a few have become infamous in the last few years-the Hive group is one such gang.
Not shy about boasting about its crimes, the group even posts details of some of them on its dark web blog.
Instead of stopping solely conducting attacks, Hive realized it could make even more money by selling its software to other groups or individuals, creating the Ransomware-as-a-Service model.
This model allows the group to concentrate on just one stage of the cyber-attack chain rather than trying to manage every step, selling access and tools to other groups who want to take advantage of it.
It sometimes makes it harder for them to identify which group has conducted which crime because multiple groups use Hive's code.
Known for its aggressiveness and frequent attacks, its members work hard to evolve their tactics, techniques and procedures to keep security experts from blocking its objectives.
Naturally, few crime groups declare how much money they make, and most organizations that have suffered from ransomware attacks don't like to state how much they have paid out.
Along the transition from tape to digital storage, criminals began to trade in their pistols for programmers as a less physical method for stealing money.
Hacker organizations are growing too quickly and too smart, outpacing many IT staff in knowledge, technique, and passion.
Third-party cybersecurity experts have unique insights into the latest hacking techniques and are prepared to identify and respond accordingly.
Invest in expert cybersecurity help-because hacking organizations are outpacing your budget, knowledge, and desire.


This Cyber News was published on www.cyberdefensemagazine.com. Publication date: Fri, 22 Dec 2023 06:13:05 +0000


Cyber News related to Digital Criminal Ontology; Trading Pistols for Programmers

Binary Options Trading Signals: A Deep Dive - Binary options trading, a form of financial trading where the payout is either a fixed amount or nothing at all, has seen significant growth in popularity. Central to this growth is the development and use of sophisticated trading signals. These ...
1 year ago Feeds.dzone.com
Teaching Digital Ethics: Navigating the Digital Age - In today's digital age, where technology permeates every aspect of our lives, the need for ethical behavior in the digital realm has become increasingly crucial. This article explores the significance of digital ethics education in our society and ...
1 year ago Securityzap.com
Building a Culture of Digital Responsibility in Schools - In today's technologically-driven world, schools have a critical role in cultivating a culture of digital responsibility among students. Promoting digital responsibility involves educating students about the potential risks and consequences ...
1 year ago Securityzap.com
Digital Criminal Ontology; Trading Pistols for Programmers - Since computers were first connected with Ethernet cables, Hollywood started romanticizing hackers. The movie was a science fiction thriller starring Matthew Broderick and Ally Sheedy as high school students who accidentally hacked a military ...
1 year ago Cyberdefensemagazine.com
Digital Citizenship Lessons for Students - This article aims to emphasize the significance of digital citizenship lessons for students, focusing on three key aspects: the definition and scope of digital citizenship, online etiquette, and safe online behavior. By equipping students with ...
1 year ago Securityzap.com
Criminal IP and Quad9 Collaborate to Exchange Domain and IP Threat Intelligence - Criminal IP, a renowned Cyber Threat Intelligence search engine developed by AI SPERA, has recently signed a technology partnership to exchange threat intelligence data based on domains and potentially on the IP address to protect users by blocking ...
1 year ago Hackread.com
Strengthening Cybersecurity: The Role of Digital Certificates and PKI in Authentication - Data protection remains integral in our wide digital world. This has been possible because of the increasing awareness amidst enterprises, small and large, across industries on the paramount need for the protection of sensitive data, securing digital ...
1 year ago Feeds.dzone.com
What a Digital ID Means to How Australians Interact With Businesses Online - Australia is about to get a national online ID system - the Digital ID - which promises to improve the security and privacy of data online. In just a few months, Australians will have access to a new form of ID, which aims to make identification ...
1 year ago Techrepublic.com
Cyber Insights 2023: Criminal Gangs - The result is more than a dozen features on subjects ranging from AI, quantum encryption, and attack surface management to venture capital, regulations, and criminal gangs. Despite some geopolitical overlaps with state attackers, the majority of ...
2 years ago Securityweek.com
Does Your App Accept Digital Wallets? - Digital wallets are electronic systems that securely store payment information digitally. Digital wallets are designed for convenience and often include security features to protect your financial data. How Digital Wallets Function Digital wallets ...
1 year ago Feeds.dzone.com
MITRE Launches New D3FEND CAD Tool to Create Precise Cybersecurity Scenarios - This new tool enables security practitioners to create structured, detailed cybersecurity scenarios grounded in the D3FEND ontology, transforming how organizations model and respond to cyber threats. Developed through collaboration between MITRE, the ...
2 months ago Cybersecuritynews.com
Digital Forensics In 2025: How CSOs Can Lead Effective Investigations - Digital forensics now encompasses a broad spectrum of investigative techniques and methodologies used to extract, preserve, and analyze data from computers, smartphones, servers, cloud platforms, and a wide array of Internet of Things (IoT) devices. ...
2 months ago Cybersecuritynews.com
Teaching Digital Literacy and Online Safety - It is crucial for educators to prioritize teaching online safety to ensure that students are equipped with the necessary skills to protect themselves online. This article aims to explore the importance of teaching digital literacy and online safety, ...
1 year ago Securityzap.com
A Deep Dive Into How Digital Pound Can Menace Financial Stability - The UK's expedition into releasing a digital pound has triggered a strong debate among policymakers and finance experts. The House of Commons Treasury Committee has shown concerns, cautioning that bringing a central bank digital currency in the UK ...
1 year ago Cysecurity.news
Cyber Crime Wave: Chinese Scammers Target Europe with Fake Designer Brands - In the last couple of weeks, there has been an increase in the number of people who have been duped into sharing their card details and other personal information with a network of fake online designer shops that are operated from China, which appear ...
1 year ago Cysecurity.news
Criminal IP and Tenable Partner for Swift Vulnerability Detection - Criminal IP, a prominent Cyber Threat Intelligence search engine developed by AI SPERA, has recently established a technical partnership with Tenable, a global leader in exposure management. This partnership is designed to equip users with a robust ...
1 year ago Bleepingcomputer.com
Online safety laws: What's in store for children's digital playgrounds? - As children's safety and privacy online becomes a matter of increasing urgency, lawmakers around the world push ahead on new regulations in the digital realm. Tomorrow is Safer Internet Day, an annual awareness campaign that started in Europe in 2004 ...
2 years ago Welivesecurity.com
Digital ID adoption: Implementation and security concerns - As digital transformation accelerates, understanding how businesses are preparing for and implementing digital ID technologies is crucial for staying ahead in security and efficiency, according to Regula. The role of digital identity in efficiency ...
1 year ago Helpnetsecurity.com
Hackers Attacking Investors Via Fraud Networks to Steal Financial Data - A sophisticated cybercriminal campaign targeting Indian investors through fraudulent stock and cryptocurrency schemes has escalated, with hackers leveraging social engineering, fake mobile applications, and compromised government websites to steal ...
2 months ago Cybersecuritynews.com
Criminal IP ASM: A new cybersecurity listing on Microsoft Azure - AI SPERA, a leader in Cyber Threat Intelligence-based solutions, today announced that Criminal IP ASM is now available on the Microsoft Azure Marketplace. As an officially certified ISV partner of Microsoft, AI SPERA offers services and technology ...
1 year ago Bleepingcomputer.com
Pig Butchering: Fake Trading Apps Target Crypto on Apple, Google Play Stores - Pig Butchering scam targets crypto users with fake trading apps on Apple and Google Play Stores. These apps, found on Apple’s App Store and Google Play, and on phishing sites, are part of a Pig Butchering scam targeting cryptocurrency investors ...
8 months ago Hackread.com
International Criminal Court systems breached for cyber espionage - The International Criminal Court provided additional information about the cyberattack five weeks ago, saying that it was a targeted operation for espionage purposes. The intergovernmental organization disclosed the breach on September 19, a few days ...
1 year ago Bleepingcomputer.com
Authorities Arrested 17 Criminal Bankers, EUR 4.5 Million Seized - The arrested individuals, predominantly of Chinese and Syrian nationality, operated what investigators describe as a parallel underground financial system structured in at least two distinct branches, one catering to Arabic-speaking criminal ...
1 month ago Cybersecuritynews.com
‘Pig butchering’ trading apps found on Google Play, App Store - Group-IB also warns that the UniShadow Trade apps can mimick a variety of legitimate cryptocurrency and trading platforms, providing the following extensive list with potential names that could be used in impersonation attempts. Fake trading ...
8 months ago Bleepingcomputer.com
OKX suspends DEX aggregator after Lazarus hackers try to launder funds - OKX Web3 has decided to suspend its DEX aggregator services to implement security upgrades following reports of abuse by the notorious North Korean Lazarus hackers, who recently conducted a $1.5 billion crypto heist. OKX is a leading global ...
3 months ago Bleepingcomputer.com Lazarus Group