Plus: Hawk AI raises $17M to help clients detect money laundering and financial fraud
Part of Network | |
Presented by |
More than 4,500 WordPress websites have been hacked through a Javascript injection campaign. This campaign is believed to have been active since at least 2017. More: - The malicious code from this operation is deployed through WordPress index.php
- Researchers claim that over 33,000 infected files were found on some of the compromised sites in the past two months.
- The campaign leads users to download a blocker extension that, in addition to the ad-blocking feature, has malicious code that infects the victims' devices. This malicious extension, named Crystal Blocker, has over 120,000 users across different browser platforms.
- Other tools, such as Raccoon Stealer, have also been tracked in this operation, showing that the threat actors behind it aim to steal passwords, cookies, autofill data, crypto wallet information, etc.
| |
At least two U.S. federal agencies have been hacked, according to a statement from CISA. The hackers used phishing to steal critical information from government employees. More: - The hackers sent a phishing email containing a phone number to an employee's government email address.
- The employees are then convinced to log in to their banking accounts and send back a certain amount of money they are told was refunded to them by mistake.
- Hackers use remotely controlled software to deploy this attack. The campaign includes making changes to the bank account statement so that the victims are convinced they have the fund in their possession.
- These emails are part of a social engineering hacking campaign against federal government agencies that has been active since June 2022.
| |
A message from LACEWORK Discover cloud insights and harden your security posture In the latest installment of the Cloud Threat Report series, Lacework Labs covers the significant increase in efficiencies used by cybercriminals. Get insights into these trends that cover how: - Attackers are automating key discovery and exploits, taking advantage of momentary mistakes
- Simple mistakes turn into misconfigurations that attackers use to compromise your cloud identity infrastructure
- Vulnerabilities continue to stick around for months (sometimes even years) and attackers quickly exploit any new vulnerabilities
- Cryptojacking continues to be a staple in cybercriminal tool belts
Discover detailed intelligence about ongoing infrastructure compromise activities and best practices for hardening your cloud security posture. Read the Lacework Labs Cloud Threat Report, Vol. 4 today. get the report | |
Google has shut down a hacking campaign led by the pro-China hacker group Dragonbridge. The tech giant shut down thousands of fake YouTube channels and blogs tied to the group. More: - Google stated that most of the content it found did not contain political messages, but a small portion of the YouTube channels and blog posts spread political propaganda that pushed pro-China ideology.
- Around 5,233 YouTube channels were taken down due to the fact that they were directly tied to operations that are currently under investigation.
- Google has consistently intercepted Dragonbridge's operations. In July 2022, the group tried to hack rare earth mining companies in the U.S., Australia, and Canada. Law authorities claim that the group attempted to spark protests against the mining companies.
- So far, Google has terminated 100,960 accounts tied with Dragonbridge.
- The group is also tracked as Spamouflage Dragon.
| |
Hawk AI has raised a $17M Series B funding round to help its clients detect money laundering schemes and financial fraud. The company aims to help sniff out a portion of the $2T that is laundered annually but never detected. More: - Sands Capital led the funding round, with participation from Picus Capital, DN Capital, Coalition, and BlackFin Capital Partners.
- Hawk AI helps enterprises detect transaction fraud, screen their customers, build their customer risk rating, etc.
- The company has also applied for a patent regarding an AI tool that is able to detect suspicious activity and provide data about that activity in natural language.
- Its platform is used by companies such as:
- VISA
- Moss
- Bancard,
- Banco de Brasil Americas, etc.
- The company is based in Munich, Germany.
| |
A message from ATHLETIC BREWING Giving dry a try this January? Keep the good times going! Enjoy 50% off your first month when you join the Athletic Club. You’ll get our award-winning brews delivered monthly, while also enjoying members-only perks like early access to brews and merch. Athletic Brewing is: - Great tasting with thousands of 5-star reviews, brewed in the USA
- Non-alcoholic (less than 0.5% ABV)
- Vegan-Friendly
- Low Calorie
With the Athletic Club, we even make it easier than ever to try our brews – from releasing crave-worthy styles on the “reg” to offering free delivery 24/7. You shouldn’t have to sacrifice being at your best to enjoy great brews. Get 50% Off Now | |
WhizHack has raised a $3M Pre-Series A to help companies detect and intercept cyber threats. The India-based company has now reached a $40M valuation. More: - WhizHack offers three main products:
- Zero Hack (a triple-layer security solution that enables companies to detect threats in real time),
- Trace (Intercepts cyberattacks and produces analytics), and
- Cyber Range (simulates a cyberattack so that employees can train for these specific conditions).
- Vedswasti Holdings and SAA Capital led the funding round.
- The company is based in Gurugram, India.
- Since its inception in 2020, WhizHack claims it has managed to grow its product market penetration by over 200%.
- The funding will be used to expand to new markets, develop products, and build new facilities.
| |
Quick Hits: - We know that talent development is a major challenge. So we made a planner to lend a helping hand!*
- Hive Ransomware has been hit by an international operation that involved 13 countries. The U.S. DOJ has managed to disrupt the group's ongoing ransomware campaign that was set to enable it to steal $130M.
- A former employee of the Russian search engine Yandex has allegedly leaked source code from the company's database. The source code is circulating on cybercrime internet forums and has 44GB of data.
- CVE-2022-34689, a flaw with a 7.5 CVSS ranking that was tracked by the NSA, has been patched. The flaw could have enabled hackers to falsely perform authorization operations on Microsoft's systems.
- Looking for the right learning and development tools in 2023? Don't decide until you've read this comprehensive checklist.*
*This is sponsored content. | |
Upcoming events at Inside: - January 26 - Growth Experimentation Workshop: From Strategy to Process by GrowthHackers.com (Register Here)
- January 29 - Inside Interview with Lacework - 4 Common Attack Paths in Cloud Security (Register Here)
- January 30 - Inside Coffee Break (Register Here)
- January 31 - Inside Startups Coffee Break (Register Here)
- April 18 - Human Resources Summit'23 (Register Here)
| |
| | Arbër is an Inside writer who also has experience in entrepreneurship. He has experience covering Consumer Tech, Venture Capital, NFTs, Crypto, etc. Arbër holds a Bachelor's degree in Business from XAMK University in Finland. When he is not reading(and writing) business news, he chooses to watch sports or anime...and then read news about sports or anime. | | Editor | Aaron Crutchfield is based in the high desert of California. Over the last two decades, he has spent time writing and editing at various local newspapers and defense contractors in California. When he's not working, he can often be found looking at the latest memes with his kids or working on his 1962 and 1972 Fords. | |
|
|
767 Bryant St. #203, San Francisco, CA 94107 Copyright © 2023 Inside.com | |
|