Threat Spotlight: Stealer Logs & Corporate Access

A navy background with the white text in all caps "Stealer Logs & Corporate Access."

Executive Overview Over the last three years, infostealer malware variants have become a “popular trend” in the cybercriminal Malware-as-a-Service (MaaS) ecosystem. Doing precisely as their category implies, these malware variants steal information from users’ devices. After infecting the device, the malware employs various techniques to remain undetected while sending data to the malicious actors’ command […]

Telegram Hacking Channels: An Emerging Risk

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Telegram Hacking Channels: An Emerging Risk." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Telegram, a popular encrypted messaging app known for its commitment to privacy and security, has ironically become a hub for cybercriminal activities. The platform is increasingly hosting channels that facilitate hacking, distribute stolen data, and provide a marketplace for cybercrime tools and services.  Telegram complements the dark web as an alternate place to gather if […]

Exploit Forum, Initial Access Brokers, and Cybercrime on the Dark Web

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Exploit Forum, Initial Access Brokers, and Cybercrime on the Dark Web." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

The notorious Exploit.in dark web forum is a hotspot for cybercriminals and hosts an auction system. On this forum, malicious actors can share various hacking techniques, malware samples, and proof of concept for exploits.  Some threat actors on Exploit are initial access brokers (IAB), who sell information about accessing organizations’ environments such as with administrative […]

Babuk Ransomware Group: What You Need to Know

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Babuk Ransomware Group: What You Need to Know." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

The Babuk ransomware group emerged into the world of illicit activities relatively recently in 2021. Since then, they have conducted a series of high-profile ransomware attacks across various industries. The group targeted organizations across a wide range of sectors, including healthcare, logistics, and professional services, leaving a trail of encrypted files and ransom demands in […]

Grief Ransomware Group: What You Need to Know

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Grief Ransomware Group: What You Need to Know." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Among the multitude of threat actors dominating the cybersecurity landscape, Grief ransomware group has risen to prominence. Known for their ruthless attacks and uncompromising tactics, Grief has quickly carved a niche for itself in the dark underworld of cybercrime. Understand their methods to better anticipate their moves and boost your defenses. Understanding the Grief Ransomware […]

Threat Spotlight: “Legal” Cybercrime Activities

A navy background with the white text "'Legal' Cybercrime Activities"

Executive Overview We often generalize threat actors as the “attackers” and cyber practitioners as the “defenders.” This simplification can work for many purposes, but what if we’re missing key relationships because of it? Not all activities related to cybercrime require secrecy or direct malicious intent, so cybercriminals utilize a vast network of contractors to develop […]

Top Cybercrime Forums to Monitor in 2023

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Top Cybercrime Forums to Monitor in 2023." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

As cyber threats continue to evolve in complexity and frequency, staying informed about the latest trends and emerging threats is crucial for cybersecurity professionals. One effective way to do this is by monitoring top cybercrime forums, where threat actors often discuss new tactics, techniques, and tools.  This article will provide an overview of the most […]

Threat Tracking: Tracking Threats Across the Dark and Clear Web

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Threat Tracking: Tracking Threats Across the Dark and Clear Web." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

The Internet is a gold mine of threat information that can bolster your cyber defenses if you actively track this data. From news updates to forum discussions on hacker forums, and data dumps to service offerings on marketplaces, there’s a lot to find out that could otherwise slip under the radar.  Tracking cyber threats across […]

Threat Spotlight: The New Dark Web?

A navy background with the white text "The New Dark Web?"

Executive Overview Illicit Telegram channels have become a growing concern in the realm of cybercrime. Threat actors want to connect with each other in fast, reliable, and “anonymous” ways. Telegram has been their answer, and malicious actors are increasingly moving off of Tor and onto the instant messaging platform.  Flare Director of Marketing Eric Clay […]

The Typology of Illicit Telegram Channels

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "The Typology of Illicit Telegram Channels." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Cybercriminals seem to always be looking for new and innovative ways to commit their crimes more efficiently. In the past, the dark web and parts of the deep web were some of the most common places where you can find cybercriminals committing their schemes. However, many criminals have moved over to more secure online messaging […]