Browsing: Cyber Incidents

Recent geopolitical developments in the Middle East have prompted U.S. financial institutions to strengthen their cybersecurity monitoring and preparedness. Security experts warn that periods of international conflict often lead to an increase in cyber activity targeting critical infrastructure. According to industry analysts, banks and financial organizations are currently paying close attention to potential cyber threats that could originate from groups aligned with Iran. These threats may include disruptive actions such as Distributed Denial-of-Service (DDoS) attacks, which attempt to overwhelm servers and temporarily disrupt online services. The financial sector is considered one of the most attractive targets for cyber operations because…

Read More

U.S.-based wealth management firms Mercer Global Advisors and Beacon Pointe Advisors have become the latest financial advisory organizations linked to a cyber intrusion attributed to the hacking group known as ShinyHunters. Cyber threat intelligence platforms observed that data allegedly connected to the firms was being circulated within underground cybercriminal communities. The threat actors behind the activity are known for breaching corporate systems and leveraging stolen information for financial extortion. Security researchers monitoring dark web forums reported that the group claimed to have accessed internal databases containing client-related and operational records. While the authenticity and scope of the data are still…

Read More

Several Iranian government websites and widely used mobile applications reportedly experienced service disruptions following recent U.S.–Israel military strikes. Experts are monitoring potential geopolitical cyber implications. Several government-linked websites and widely used mobile applications in Iran experienced temporary service disruptions following recent military strikes carried out by the United States and Israel, according to international media reports. Multiple online platforms reportedly became inaccessible for a period of time, while some users noticed irregular behavior on certain digital services. Cybersecurity observers noted unusual traffic patterns during the same timeframe, raising questions about possible coordinated digital activity. At this stage, there has been…

Read More

A 45-year-old farmer from Rajkot has filed a complaint with the cybercrime police after allegedly losing ₹24.78 lakh in a work-from-home scam. The case highlights the growing risk of online job fraud targeting individuals through messaging platforms. According to the complaint, the victim was approached with an offer for part-time online work promising easy earnings. Initially, small amounts were credited to build trust. Later, he was asked to deposit money to “unlock higher commissions” and complete assigned online tasks. As the process continued, he was repeatedly instructed to transfer larger sums under different pretexts, including processing charges and account verification.…

Read More

Google’s Threat Intelligence Group (GTIG), in collaboration with Mandiant and other industry partners, has successfully disrupted a large-scale cyber espionage campaign that targeted government institutions and telecommunications providers across the globe. The campaign has been attributed to UNC2814, a highly persistent threat group that has been active since at least 2017. Security researchers believe the group operates in alignment with strategic intelligence-gathering objectives linked to the People’s Republic of China (PRC). According to Google’s findings, the operation impacted 53 confirmed victims across 42 countries, spanning four continents, making it one of the more extensive espionage campaigns observed in recent years.…

Read More

The Ahmedabad Cyber Crime Branch has uncovered a major stock market investment fraud worth ₹1.54 crore, exposing a network linked to a Chinese cyber fraud gang. The investigation revealed the direct involvement of bank officials, including branch managers of a reputed private bank. Police have arrested five accused in connection with the case. How the Fraud Was Executed According to police officials, the fraud began in December 2025. The victim was added to a WhatsApp group named “91 BARCLAYS – Stock Market Pioneer”, where members were lured with promises of high returns through IPOs and stock market investments. The victim…

Read More

Cybersecurity researchers have identified a sophisticated cyberattack attempt targeting a globally deployed enterprise network firewall, allegedly linked to a Russian-speaking threat actor.The incident has gained attention due to the suspected use of artificial intelligence (AI)–assisted techniques to enhance reconnaissance and exploitation efforts. What Was Observed According to threat intelligence observations, the attacker focused on a firewall solution that is widely used across corporate networks, cloud environments, and data centers worldwide.Researchers detected automated scanning activity and adaptive attack behavior, suggesting the use of advanced tooling rather than traditional manual techniques. At this stage, no confirmed large-scale data breach or mass compromise…

Read More

Murshidabad, West Bengal:West Bengal Police’s Special Task Force (STF) has arrested two men from Murshidabad district in connection with an alleged OTP trafficking scam that may have links to Pakistan-based operators. The arrests come after a sustained investigation revealed that the accused shared WhatsApp verification OTPs of Indian SIM cards with handlers abroad in exchange for money. According to police officials, the suspects — identified as Juhab Sheikh and Suman Sheikh, both residents of Gudhia in Murshidabad — reportedly procured SIM cards using identity documents and created WhatsApp accounts. They then sent the one-time verification codes (OTPs) generated during account…

Read More

Adidas is investigating a potential data breach after threat actors claimed to have accessed approximately 815,000 user records, allegedly obtained through a third-party licensing partner. The incident has renewed concerns around supply-chain security and the growing risks posed by external vendor access in large enterprises. According to multiple cybersecurity reports, the exposed data may include user account information such as email addresses, usernames, and other related metadata. At this stage, there is no public confirmation that financial details were compromised, but the investigation remains ongoing. What Is Known So Far The breach claim surfaced on underground forums, where attackers posted…

Read More

A newly identified Linux malware variant has been discovered in the wild, designed to secretly communicate with its operators through encrypted command-and-control (C2) traffic, significantly increasing the difficulty of detection and analysis. Security researchers confirmed that this updated malware variant is an evolution of a previously known Linux threat, but with enhanced stealth capabilities, specifically focused on hiding its C2 communications within encrypted network traffic. This allows attackers to maintain long-term access to compromised systems without triggering traditional security alerts. How the malware operates Once deployed on a Linux system, the malware establishes persistence and begins communicating with a remote…

Read More