Join the Webscout Weekly Intelligence Webinar scheduled on Thursday, September 29, 09:30AM PDT, on "Data Surveillance: Risks to Personal Data Security"

RESOURCE CENTER

Analyst Reports

Target of Cyberattacks: The Energy Sector

The halt or delay of production or distribution of energy has severe repercussions because almost every sector relies on energy, particularly crucial ones such as health, agriculture, and logistics, and there are already limitations on the quantity and utilization of sources. Due to its critical relevance, politically-motivated threat actors and APT groups have been attracted to the energy sector. The attacks on the energy sector, their outcomes, and the sources of the threat actors' motivation for carrying out these attacks were investigated using the CatchProbe infrastructure. Findings were then analyzed and interpreted by CatchProbe analysts to create this report. The research also highlights potential future risks and the severity of the threat.

LEARN MORE

Threats of E-Commerce

Since the year 2000, e-commerce systems have become more advantageous than traditional marketing methods, as they have facilitated communication and enabled even the smallest retailer to market their products globally. But in the midst of its developments, threat actors were drawn in by the increasing volume and began attacking e-commerce systems for financial gain. Read CatchProbe’s report now to find out how threat actors utilize their skills to make their attacks appear more plausible as revealed by the findings of DarkMap which are procan be investigated further in the subsequent sections of this report.

LEARN MORE

Healthcare Cyber Attacks

In recent years, technological advancements such as the archiving of patient information on electronic media, the remote monitoring of patients using technological methods, the use of medical devices with varying degrees of automation and the integration of institutions into the health sector through a strong and fast communication network have provided numerous benefits, but have also made the health sector susceptible to cyberattacks. CatchProbe experts analyzed and examined the information acquired utilizing the CatchProbe DarkMap infrastructure which uncovered tens of thousands of threat actors, groups, and illegal platforms that have been identified to launch attacks against the healthcare sector to compile this report.

LEARN MORE

Drug Traffic Report

DarkMap continuously monitors Telegram channels to detect threat actors, as Telegram has become a heavily used communication tool in drug dealing. The examination of the discovered platforms reveals that numerous drug cartels have developed their own e-commerce platforms, as well as a delivery chain that ensures that the disruption of one does not affect the others. Moreover, because of the use of cryptocurrencies for payments and the numerous safety measures that are implemented throughout the process of the delivery of the drug, the market for illegal drugs is growing at an alarming rate. Read CatchProbe's report now to find out more.

LEARN MORE

Government Data Breaches: Russia

This report reveals the destructive effects and consequences of the data leaks resulting from cyber operations carried out against countries and public institutions and analyzes the current cyber intelligence activities and the importance of cyber intelligence factor in ensuring public security. The findings revealed and analyzed here were being shared on the dark web to harm the Russian government and its state institutions. Read CatchProbe's report now to learn more about the threats governments face.

LEARN MORE

Latest Leaked: Critical Data Breaches

Cybersecurity is an ongoing battle, with cybercriminals constantly seeking ways to steal information and security experts trying to stop them. Read CatchProbe’s report now to learn about the most recent critical data breaches, active threat groups and heavily targeted sectors as well as the most common causes of information leaks in organizations, and the consequences organizations’ face if they fail to protect data.

LEARN MORE

Cybercrime: Money Laundering

Money laundering techniques, which are integral for preserving the power of criminal organizations, have adapted to technological advancements and have begun to be carried out virtually. Constantly modifying their money laundering strategies, criminal actors are likely already employing the next technique when it is revealed. This demonstrates the significance of cyber intelligence feeds. DarkMap continuously monitors potential threats and illegal platforms. Undoubtedly, knowing the characteristics of the threat actors, the new techniques they employ, and their thoughts will strengthen the fight against this crime. Read the remaining sections of the report to view the findings detected by DarkMap.

LEARN MORE

Malicious Mobile Software & Espionage Activities

The tiny computer that we carry around in our pockets is now the most significant element of our lives, people use them throughout the day, store even the most private information on them, and use numerous sophisticated services. Which is also why our cell phones are susceptible to a wide range of threats. Some threat actors act with political and ideological motivations, while others target smartphones for financial gain. Either way, if the campaign is successful, the outcomes are disastrous. To learn more about the most recent incidents, read CatchProbe's report now.

LEARN MORE

Antisemitic Cyber Attacks

Threat actors favor the Dark Web because browsers cannot index it. Darkmap infrastructure, on the other hand, is continually scanning the environment in order to collect various types of data. DarkMap's scans revealed that, Israeli government entities as well as private websites are constantly attacked by cybercriminals. The scans performed by DarkMap also uncovered a number of leaks that were not motivated by anti-Semitism but yet affected a significant number of Israeli citizens. To learn more, read CatchProbe's report now.

LEARN MORE

Next Target: Moldova

The President of Belarus Alexander Lukashenko’s briefings at the Belarusian Security Council meeting turned the eyes to Moldova while the war between Russia and Ukraine continues. The map President Lukashenko was pointing at had an extremely important detail regarding the war plans in Ukraine: an arrow pointing to Moldova through the city of Odessa. An image that may as well be an announcement of what’s already well-known, an image that seems quite suitable for Russia's war strategies.

LEARN MORE

Pakistan Army & Nadra

By using the CatchProbe product family, the leaked, published and disclosed information regarding the data leaks of Pakistan Army and Nadra on the internet was obtained and analyzed which showed the threats they face. It is noteworthy that the passwords created by the employees of these institutions had used a simple password policy, which pose the most danger to the institution. Moreover, many other leaks such as important customer records, personal data of personnel and immigrants and many passports are found to be being sold online. Explore the CatchProbe's Government Intelligence report to find out more.

LEARN MORE

Cyberwar Between Russia & Ukraine

The war between Russia and Ukraine enter into a different dimension with each passing day while the tension continues to rise. The war continues where it is called the 5th battlefield, the cyberworld. And a point that escaped everyone's attention was when the whole world wasfocused on the military build-up of Russia in the region. Which is the cyberattacks that started long before the military invasion. State-sponsored cyberattacks are undoubtedly at the forefront of Russia's war strategies. As a matter of fact, in 2008, Russia launched two-pronged cyberattacks against Georgia, together with the Russian intelligence agency GRU and state-sponsored hackers.

LEARN MORE

Structured Malware Analysis on Energy Systems of Azerbaijan

This report was created as a result of the cyber intelligence study performed on the cyber-attack campaign that was discovered to be against the public and private sector of Azerbaijan. The malware was found to be a RAT-type malware written specifically for remote control operations. The malware was obtained from the analyses and technically examined with reverse engineering studies to understand the motivation for its creation. The studies discovered and determined a first of its kind "Remote Access Trojan" (RAT) type malware called PoetRAT which was created using advanced techniques. In line with the technique, usage pattern and timing of the campaign, it is predicted that it and similar attacks will continue to be perpetrated.

LEARN MORE
cookies