[NCSC-FI News] Follow the Money: How eCriminals Monetize Ransomware

Cybercrime has evolved over the past several years from simple “spray and pray” attacks to a sophisticated criminal ecosystem centered around highly effective monetization techniques that enable adversaries to maximize success and profitability
Monetization is the step attackers take to receive a payout when an operation is complete. Threat actors are constantly evolving their methods through trial and error to avoid getting caught. A greater understanding of how this process works including transaction details, value of recent compromises and participating adversaries can help organizations fight modern threat actors
CrowdStrike threat intelligence offers IT and security decision-makers insights into eCrime monetization through our eCrime Index intelligence reports. Here, we dig into our recent observations and share key takeaways for defenders.

Source: Read More (NCSC-FI daily news followup)

You might be interested in …

[ZDNet] Rust takes a major step forward as Linux’s second official language

All posts, ZDNet

Linux is getting more Rust in it by the day. Source: Read More (Latest topics for ZDNet in Security)

Read More

[SecurityWeek] FTC: Patch Log4j Vulnerability to Avoid Potential Legal Action

All posts, Security Week

The U.S. Federal Trade Commission (FTC) on Tuesday informed companies that they could face legal action if their customers are impacted by an attack that involves exploitation of the recent Log4j vulnerabilities. read more Source: Read More (SecurityWeek RSS Feed)

Read More

[ThreatPost] Where Bug Bounty Programs Fall Flat

All posts, ThreatPost

Some criminals package exploits into bundles to sell on cybercriminal forums years after they were zero days, while others say bounties aren’t enough . Source: Read More (Threatpost)

Read More