10 Aug 2022

Initial access broker claims to sell access to “central bank” and its SWIFT account for $500,000

The asking price is considerably more expensive than most IAB posts, but the potential payout for attackers is also huge On August 9, an initial access broker (IAB)on a popular Russian-language forum posted that they are selling access to the entire network of a “central bank.” The actor claims to have access to the domain […]

Read More >
Initial access broker claims to sell access to “central bank” and its SWIFT account for $500,000
Initial access broker claims to sell access to “central bank” and its SWIFT account for $500,000

Initial access broker claims to sell access to “central bank” and its SWIFT account for $500,000

Dov Lerner | 10 Aug 2022
The asking price is considerably more expensive than most IAB posts, but the potential payout for attackers is also huge On August 9, an initial access broker (IAB)on a popular Russian-language forum posted that they are selling access to the entire network of a “central bank.” The actor claims to have access to the domain […]
Read More >
Introducing Cybersixgill’s Dynamic Vulnerability Exploit (DVE) Intelligence 

Introducing Cybersixgill’s Dynamic Vulnerability Exploit (DVE) Intelligence 

Benji Preminger | 09 Aug 2022
Vulnerability exploitation is the most common attack vector for cybercriminals. For example, IBM’s XForce estimates that more than a third of all cyberattacks in 2021 used vulnerability exploitation as the initial means of infiltration. To remediate these threats and reduce risk, security teams need to know their vulnerabilities, the probability of exploitation, and the level […]
Read More >
Dear Board Members – Do You Know As Much About Your Company’s Cybersecurity Efforts as Its Finances?  You Should.

Dear Board Members – Do You Know As Much About Your Company’s Cybersecurity Efforts as Its Finances? You Should.

Sharon Wagner | 04 Aug 2022
Sharon Wagner, CEO for Cybersixgill, recently discussed in his Forbes article  Board Members Need to Look At Cybersecurity As More Than Just Protection how and why board members need to be as informed about a company’s cybersecurity efforts as they are about its finances. To be a well-informed and effective fiduciary, board members must now […]
Read More >
Homemade Firearms on the Dark Web

Homemade Firearms on the Dark Web

Adi Bleih | 03 Aug 2022
On July 8, an assassin killed former Japanese Prime Minister Shinzo Abe with a homemade firearm. The assassination jumpstarted discussions in the media about how easy it is for an individual to learn how to build their own weapon. There is a wide variety of privately made firearms, also known as ghost guns. Some are […]
Read More >
Cybersixgill at Black Hat: What’s Different this Year

Cybersixgill at Black Hat: What’s Different this Year

Dani Woolf | 02 Aug 2022
In less than two weeks, I’m heading to Black Hat in Las Vegas with Team Cybersixgill – and I’m beyond excited! This year, we’re approaching things differently. Here’s how: No sales pitch. Instead, we’re hosting a suite at the Four Seasons Hotel that we are transforming into a Dark Lab – away from the hustle […]
Read More >
Underground Financial Fraud H1-2022

Underground Financial Fraud H1-2022

Adi Bleih | 28 Jul 2022
During the first half of 2022, Cybersixgill found more than 4.5 million compromised payment cards for sale on underground credit card markets. For credit card holders, the good news is that this is down from more than 14 million cards found for sale during the last half of 2021. But it’s still a lot of […]
Read More >
Out of Breach: Shanghai Police Breach Leads to Increased Chinese Underground Activity

Out of Breach: Shanghai Police Breach Leads to Increased Chinese Underground Activity

Naomi Yusupov | 27 Jul 2022
On June 30 on a popular underground forum, an actor uploaded a massive amount of data reportedly exfiltrated from the Shanghai National Police (SHGA). This included names, addresses, birthplaces, national IDs, phone numbers and criminal records of 1 billion Chinese citizens—over 70% of China’s total population. The data, 23 TB in total, was advertised for […]
Read More >
Use Case Blog: Threat Monitoring & Hunting

Use Case Blog: Threat Monitoring & Hunting

Michael-Angelo Zummo | 25 Jul 2022
This is the first installment of a monthly use case blog focused on  what we do at Cybersixgill: threat hunting and monitoring on the clear, deep, and dark web.  Essentially, we have created a deep, searchable, data lake with unique access to the most secret and hidden places on the dark web. We have gained […]
Read More >
Are You Afraid Of The Dark? Find Out At Black Hat Las Vegas

Are You Afraid Of The Dark? Find Out At Black Hat Las Vegas

Tracey Moon | 20 Jul 2022
Celebrating its 25th year, Black Hat USA 2022 brings the cyber security community together once more in a live event held at the Mandalay Bay Convention Center, Las Vegas. Black Hat is the prime opportunity to expand your InfoSec knowledge and network with peers.  Cybersixgill will be present at Black Hat this year, featuring our […]
Read More >
The Proliferation of Cracking Packages on the Deep and Dark Web

The Proliferation of Cracking Packages on the Deep and Dark Web

Adi Bleih | 18 Jul 2022
In the hacking world, the term script kiddie is used in a derogatory sense to refer to a clueless novice. Literally, the term means someone that uses the scripts (code) of others because they are unable to program themselves. While condescending, there is truth to the fact that inexperienced hackers use someone else’s code.  One […]
Read More >