Category | Details |
---|---|
Threat Actors | Cryptor developers, Loader service operators, Drainer developers, IntelBroker, Ransomware groups, Hacktivists in the Middle East |
Campaign Overview | Increase in cryptor and loader tools, rise of crypto asset drainers, persistent use of black traffic schemes, continued activity in Bitcoin mixers, high-profile law enforcement actions, ransomware group fragmentation. |
Target Regions | Middle East (hacktivism, ransomware), Global (general activity on dark web forums, data breaches). |
Methodology | Use of underground markets for cryptors/loaders, invite-only Telegram channels for drainers, reliance on trusted relationships to exploit contractors, fragmentation of ransomware groups, rise in MaaS models. |
Products Targeted | Cryptocurrencies (tokens, NFTs), corporate databases, IT/cloud service platforms. |
Malware Reference | Stealers, drainers, loaders, ransomware (e.g., LockBit, DarkVault). |
Tools Used | Cryptors, loaders, drainers, dark web DLS (Dedicated Leak Sites), MaaS models. |
Vulnerabilities Exploited | Trusted relationships (contractor breaches), phishing tactics, malicious ad landing pages for black traffic. |
TTPs | Obfuscation for AV evasion, multiple programming languages in malware, invite-only channels, leveraging leaked source codes, DLS mimicry, focus on geopolitical tensions for hacktivism. |
Attribution | IntelBroker linked to breaches of Nokia, Ford, and others; ransomware groups fragmenting for flexibility; hacktivist focus tied to geopolitical instability in the Middle East. |
Recommendations | Strengthen supply chain security, improve monitoring of dark web and Telegram activity, prioritize protection of crypto assets, enhance awareness of black traffic tactics, collaborate with law enforcement on intelligence. |
Source | Securelist by Kaspersky |
Read full article: https://securelist.com/ksb-dark-web-predictions-2025/114966/
The above summary has been generated by an AI language model
Leave a Reply