Vietnam hacked CCTV videos selling like hotcakes on Telegram

The Telegram messaging app has emerged as a hub for criminal activities, serving as a platform for data exchange among various illicit networks.
Criminals, ranging from drug and child traffickers to cybercriminals, are increasingly utilizing Telegram to facilitate their nefarious operations.
One recent instance of cybercrime involves the distribution of hacked intimate CCTV videos, which are being sold on the platform.
These videos, featuring content from bedrooms, are in high demand, with a dedicated Telegram channel named Vnexpress offering them for sale.
The videos are priced at $3 per clip, and subscription options for quarterly, half-yearly, and annual plans are available at a cost-effective rate of $29. Particularly disturbing is the demand for videos containing intimate moments from bedrooms, shedding light on the perverse interests of those purchasing such content.
The Vnexpress channel, operating out of Russia, specializes in selling these compromising videos, exposing the private lives of families and businesses in Vietnam.
Notably, certain videos showcase bedroom footage of couples from countries like Canada, the United States, Australia, and Britain.
The content is allegedly hacked from CCTV cameras installed in hotels and resorts, commanding prices ranging from $16 to $19 per clip.
Hackread.com, an online news resource, has highlighted that surveillance camera footage from homes in Vietnam is contributing to the content available to these criminal groups.
The public is urged to refrain from installing CCTV cameras in sensitive areas like changing rooms, trial rooms, bedrooms, and bathrooms, as this footage becomes a valuable resource for criminals.
Despite global prohibitions on the installation of cameras in such private spaces due to privacy concerns, it seems that individuals continue to neglect these regulations.
In light of these developments, there is a growing call for Telegram to implement stringent measures to monitor and control illicit activities on its platform.
Major social media platforms such as Facebook, Twitter, and Google employ AI technology to combat the spread of various crimes, and it is hoped that Telegram will follow suit to effectively curb criminal activities within its user base.


This Cyber News was published on www.cybersecurity-insiders.com. Publication date: Thu, 28 Dec 2023 05:43:05 +0000


Cyber News related to Vietnam hacked CCTV videos selling like hotcakes on Telegram

Vietnam hacked CCTV videos selling like hotcakes on Telegram - The Telegram messaging app has emerged as a hub for criminal activities, serving as a platform for data exchange among various illicit networks. Criminals, ranging from drug and child traffickers to cybercriminals, are increasingly utilizing Telegram ...
6 months ago Cybersecurity-insiders.com
Apple Move iPad Engineering To Vietnam - Fresh reports of Apple shifting manufacturing from China, with iPad product development resources relocated to Vietnam. Apple continues to strengthen its manufacturing and development capabilities outside of mainland China, according to recent media ...
6 months ago Silicon.co.uk
Telegram Emerges as Hub for Cybercrime, Phishing Attacks as Cheap as $230 - Cybersecurity experts raise alarms as Telegram becomes a hotspot for cybercrime, fueling the rise of phishing attacks. In a recent development, cybersecurity researchers shed light on the democratization of the phishing landscape, courtesy of ...
5 months ago Cysecurity.news
The Hamas Threat of Hostage Execution Videos Looms Large Over Social Media - Hadley says his team of 20 typically knows about new terrorist content before any of the big platforms. While tracking verified content from Hamas' military wing or the PIJ, Hadey says the volume of content on the major social platforms is "Very ...
7 months ago Wired.com
Telegram is a Wide-Open Marketplace for Phishing Tools - The encrypted messaging app Telegram has become a veritable marketplace for bad actors who want to launch effective phishing campaigns on the cheap, essentially democratizing the cyberthreat, according to researchers at cybersecurity firm Guardio. ...
5 months ago Securityboulevard.com
Nine 9 tips before putting your Android Smartphone or Apple iPhone for resale - Many Americans are likely considering selling their old smartphones to upgrade to the latest models released by OEMs, featuring innovative features and new operating systems. Before selling your smartphone to a friend or a company, it's crucial to ...
7 months ago Cybersecurity-insiders.com
US SEC's X account hacked to announce fake Bitcoin ETF approval - The X account for the U.S. Securities and Exchange Commission was hacked today to issue a fake announcement on the approval of Bitcoin ETFs on security exchanges. The announcement came this afternoon in a now-deleted tweet from the SEC's hacked X ...
5 months ago Bleepingcomputer.com
E-Crime Rapper 'Punchmade Dev' Debuts Card Shop - The rapper and social media personality Punchmade Dev is perhaps best known for his flashy videos singing the praises of a cybercrime lifestyle. There wasn't much to support a conclusion that Punchmade was actually doing the cybercrime things he ...
5 months ago Krebsonsecurity.com
ID Theft Service Resold Access to USInfoSearch Data - One of the cybercrime underground's more active sellers of Social Security numbers, background and credit reports has been pulling data from hacked accounts at the U.S. consumer data broker USinfoSearch, KrebsOnSecurity has learned. Since at least ...
7 months ago Krebsonsecurity.com
OpenAI's Sora Generates Photorealistic Videos - OpenAI released on Feb. 15 an impressive new text-to-video model called Sora that can create photorealistic or cartoony moving images from natural language text prompts. Sora isn't available to the public yet; instead, OpenAI released Sora to red ...
4 months ago Techrepublic.com
Google to crack down on third-party YouTube apps that block ads - YouTube announced yesterday that third-party applications that block ads while watching YouTube videos violates its Terms of Service, and it will soon start taking action against the apps. Google exposes numerous APIs allowing developers to integrate ...
2 months ago Bleepingcomputer.com
SEC confirms X account was hacked in SIM swapping attack - The U.S. Securities and Exchange Commission confirmed today that its X account was hacked through a SIM-swapping attack on the cell phone number associated with the account. Earlier this month, the SEC's X account was hacked to issue a fake ...
5 months ago Bleepingcomputer.com
CVE-2013-1391 - Authentication bypass vulnerability in the the web interface in Hunt CCTV, Capture CCTV, Hachi CCTV, NoVus CCTV, and Well-Vision Inc DVR systems allows a remote attacker to retrieve the device configuration. ...
4 years ago
Digital Battlefield: Syrian Threat Group's Sinister SilverRAT Emerges - Cyfirma claims that the developers maintain a sophisticated and active presence on multiple hacker forums and social media platforms, as outlined by the cybersecurity company. Besides operating a Telegram channel offering leaked databases, carding ...
5 months ago Cysecurity.news
Over 15,000 hacked Roku accounts sold for 50¢ each to buy hardware - Roku has disclosed a data breach impacting over 15,000 customers after hacked accounts were used to make fraudulent purchases of hardware and streaming subscriptions. BleepingComputer has learned there is more to this attack, with threat actors ...
3 months ago Bleepingcomputer.com
Mandiant's X account hacked by crypto Drainer-as-a-Service gang - The threat actor who took over Mandiant's X social media account used it to share links, redirecting the company's over 123,000 followers to a phishing page to steal cryptocurrency. As Mandiant found during a follow-up investigation into the ...
5 months ago Bleepingcomputer.com
Cybercriminals Exploit X Gold Badge, Selling Compromised Accounts on Dark Web - Organizations could obtain the coveted gold check mark through a monthly subscription. The report reveals that hackers are capitalizing on this feature by selling compromised accounts, complete with the gold verification badge, on dark web ...
6 months ago Cysecurity.news
Beware Weaponized YouTube Channels Spreading Lumma Stealer - Attackers have been spreading a variant of the Lumma Stealer via YouTube channels that feature content related to cracking popular applications, eluding Web filters by using open source platforms like GitHub and MediaFire instead of proprietary ...
5 months ago Darkreading.com
DarkGate Malware Campaigns Linked to Vietnam-Based Cybercriminals - Vietnam-based cybercriminals are believed to be behind to attacks using DarkGate malware, which have targeted organizations in the UK, US and India since 2018. WithSecure researchers have tracked these attacks to an active cluster of cybercriminals ...
7 months ago Infosecurity-magazine.com
GTA 5 source code reportedly leaked online a year after RockStar hack - The source code for Grand Theft Auto 5 was reportedly leaked on Christmas Eve, a little over a year after the Lapsus$ threat actors hacked Rockstar games and stole corporate data. Links to download the source code were shared on numerous channels, ...
6 months ago Bleepingcomputer.com
Hollywood stars duped into creating anti-Ukraine propaganda The Register - An unknown pro-Russia influence group spent time recruiting unwitting Hollywood actors to assist in smear campaigns against Ukraine and its president Volodymyr Zelensky. The videos are then edited to include emojis, links, and overlays to make it ...
6 months ago Go.theregister.com
Best Paid and Free OSINT Tools for 2024 - Open Source Intelligence tools are software applications or platforms used to collect, analyze, and interpret publicly available information from various online sources, aiding in investigations, research, and intelligence gathering. These OSINT ...
2 months ago Hackread.com
Check Point Research Report: Shift in Cyber Warfare Tactics - Highlights: Shift in Cyber Warfare Focus: Recent developments in cyber warfare reveal a shift in the activities of Iranian hacktivist proxies. Initially concentrated on Israel, these groups are now extending their cyber operations to include targets ...
7 months ago Blog.checkpoint.com
Lazarus Group Attacking Crypto Users Via Telegram - In a calculated escalation of cyber warfare, the Lazarus Group, a notorious North Korea hacking unit, has pivoted its focus to cryptocurrency projects, employing intricate phishing scams on the widely-used platform Telegram. SlowMist, a cybersecurity ...
6 months ago Cybersecuritynews.com
CVE-2013-0578 - The Sterling Order Management APIs in IBM Sterling Multi-Channel Fulfillment Solution 8.0 before HF128 and IBM Sterling Selling and Fulfillment Foundation 8.5 before HF93, 9.0 before HF73, 9.1.0 before FP45, and 9.2.0 before FP17, when the API tester ...
6 years ago

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)