Hungarian and Romanian police arrested four young suspects linked to coordinated swatting and doxing campaigns that prompted repeated false bomb threats and emergency responses across the region. Authorities seized computers and phones during raids, charged a 17‑year‑old Romanian with terrorism‑related and false‑reporting offenses, and continue analyzing data while a separate probe…
Search Results for: SWAT
The FBI warns about The Com, a loosely organized cybercriminal group that engages in a wide range of illegal activities, including ransomware, swatting, extortion, and child exploitation. The group recruits minors and uses increasingly sophisticated methods to mask their operations, with some members involved in extreme violence and crimes targeting young…
A Romanian man, Thomas Szabo, has pleaded guilty to orchestrating a series of swatting and bomb threats targeting dozens of government officials and institutions. This cybercriminal activity included targeting high-profile individuals such as members of Congress, law enforcement officials, and even threatened violence against the U.S. Capitol. #Swatting #Threats #ThomasSzabo…
Kya Christian Nelson, a 23-year-old US citizen, admitted his involvement in a nationwide "swatting" scheme that targeted Ring doorbell cameras and livestreamed police responses to bogus emergency calls. Nelson and his co-conspirators used unauthorized access to victims' Ring devices to broadcast live police confrontations on social media.
Nelson, currently serving time on unrelated charges, faces federal charges for conspiracy and unauthorized access to protected computers. According to the plea agreement, from November 7 to November 13, 2020, Nelson and his group accessed victims' Ring doorbell cameras after obtaining login information for their Yahoo! email accounts.
The conspirators used the credentials to place false emergency calls to local law enforcement, triggering armed police responses to the victims' homes. While the police were on the scene, Nelson and his co-conspirators livestreamed the events, taunting officers through the Ring cameras.
Nelson is scheduled for sentencing on May 1, 2025, and faces up to five years in prison for each count. One of his co-conspirators, James Thomas Andrew McCarty, was sentenced to seven years in federal prison in June 2024 for his involvement in the same scheme.
### #CriticalInfrastructureThreats #OTSecurityAcquisition #PhishingExploits Summary: Securin’s 2024 report highlights the alarming rise in cyberattacks on critical infrastructure sectors, revealing the tactics employed by sophisticated threat actors. The report emphasizes the urgent need for enhance…
The Russia-based SWAT USA Drop reshipping service, a major operation laundering stolen merchandise, was hacked, exposing its internal operations, finances, and organizational structure. The leak details how “drops” and “stuffers” use stolen credit cards to buy…
Google API keys embedded in client-side code can now authenticate to the Gemini AI assistant, enabling attackers who find exposed keys to access private data and make costly API calls. Researchers found nearly 3,000 live exposed keys across public sites, prompting Google and TruffleSecurity to implement mitigations and advise developers to audit and rotate keys. #Gemini #Google
Researchers disclosed a cryptojacking campaign that uses pirated software bundles to lure victims and deploy a bespoke XMRig miner via a modular binary that functions as installer, watchdog, payload manager, and cleaner. The operation leverages BYOVD via WinRing0x64.sys (CVE-2020-14979) to escalate privileges and boost RandomX hashrates, spreads like a worm via…
CVE-2026-1731 is a critical pre-authentication remote code execution vulnerability in BeyondTrust Remote Support’s thin-scc-wrapper WebSocket handler that Unit 42 has observed being actively exploited to deploy web shells, backdoors (including SparkRAT and VShell), create accounts, move laterally, and exfiltrate data across multiple sectors and countries. CISA added the vulnerability to its…
SecurityWeek’s Cyber Insights 2026 gathers experts who warn that cyberwarfare – driven by nation-state pre-positioning, AI-enabled operations, and rising geopolitical tensions – will escalate faster than criminal cybercrime in 2026. The report highlights blurred lines between criminal and state actors, the difficulty of attribution, and the need for improved detection, resilience,…
MS-ISAC reporting shows total malware notifications rose 7% from Q3 to Q4 2025, with SocGholish accounting for 30% of detections and CoinMiner and Agent Tesla also prominent. New and returning families observed include ACR Stealer, Calendaromatic, SombRAT, and Arechclient2, with notable vectors like malvertisement, malspam, WMI-based spread, and multiple persistence and…
The 2025 State of Detection Engineering at Elastic summarizes detection engineering work from October 2023 to October 2024, covering real-world incident responses, rule development lifecycles, CI/Detections-as-Code practices, and extensive telemetry and integration enhancements across endpoint, cloud, and SaaS platforms. Key highlights include rapid coverage for the CUPS RCE disclosures, detection and analysis of activity group REF6138 and a DPRK malicious NPM campaign, expansion of kernel and macOS telemetry, an AWS CloudTrail/Okta rule audit (50+ tunings, 40+ new rules, 17 hunting queries), and operational metrics such as processing 500+ malware samples/day with a 99% detection goal. #CUPS #CVE-2024-47076 #REF6138 #ElasticDefend #AWSCloudTrail #Okta #ScatteredSpider #Panix #SWAT #DEBMM #ElasticSecurityLabs #NPM #DPRK
Daily Recap, The day’s cybersecurity news shows ongoing exploitation of the WinRAR CVE-2025-8088 to drop silent payloads into Windows Startup folders by nation-state and criminal groups. It also highlights high-severity flaws such as Grist Core RCE in Pyodide, React2Shell deserialization, Fortinet FortiOS SSO bypass, and other attacks, underscoring urgent patching and proactive defense. #WinRAR #React2Shell
New Chainalysis research finds Chinese-language money laundering networks processed roughly 20% of illicit cryptocurrency in 2025, averaging $44 million laundered per day (about $16.1 billion) and contributing to an estimated $82 billion laundered on-chain last year. These professionalized operations advertise on Telegram, use “guarantee” marketplaces, money mules, swapping and “Black U”…
This week highlights emerging cybersecurity threats including a critical Redis remote code execution vulnerability and sophisticated malware evasion techniques by BaoLoader. It also covers global efforts to regulate and monitor cyber activities, such as the arrest related to AVCheck and China’s ban on foreign cybersecurity tools. #RedisCVE2025-62507 #BaoLoader #TurlaKazuar #CrazyHunter…