logo
Cyber crime: Five hacking groups and syndicates to be aware of

Cyber crime: Five hacking groups and syndicates to be aware of

The National13-03-2025
Following an alleged cyber attack on Elon Musk's platform X this week, speculation over the perpetrators has been rife and generated a renewed interest in hacker and cyber threat groups around the world. Mr Musk said the IP addresses that caused X to be offline for almost an entire day originated near Ukraine but has not elaborated on that accusation. Morey Haber, a chief security adviser at cybersecurity firm BeyondTrust, said while he does not have strong feelings about Mr Musk's Ukraine claims, determining where cyber attacks originate is complicated. 'I would advise caution when blaming the attack on Ukraine, simply based on source IP address,' he said. 'Threat actors typically use bots, virtual private networks and bastion hosts to conduct attacks and obfuscate their identity, so the cyberattack of X/Twitter, if true, should have easily been defendable against an attack based on IP address or geolocation.' Associating a potential cyber attack with an IP address should never be used in a public statement without additional indicators or proof, Mr Haber added. Though it might be tempting to name and shame hackers and cyber threat actors, Mr Haber told The National that by the time the groups become widely known, they've already caused a lot of damage. 'Crime syndicates perform the most damage when they are unnamed, unknown and can operate from the deep shadows of the internet,' he said. Once they have been found and details around their operations leaked, Mr Haber added, their strength and ability to hack diminishes substantially. 'This doesn't negate their threat, but once indicators of compromise, methods of attack and malware become publicly documented, that should allow organisations to strengthen cybersecurity defences.' Mr Haber pointed out that hacking attracts a wide spectrum, with some perpetrators fuelled by politics and others by financial gain, some state-sponsored and others working alone. Here's a look at five of some of the more prominent groups currently on cybersecurity experts' radar and that have made headlines around the world: 'I only believe one cybersecurity syndicate poses the biggest threat worldwide,' said Mr Haber. 'Silk Typhoon, also known as APT27 and has been linked to the US Treasury Department breach in late 2024.' According to the US Cybersecurity and Infrastructure Security Agency and the FBI, Silk Typhoon has been linked to the Chinese government. Microsoft has also echoed that notion. 'Silk Typhoon is an espionage-focused Chinese state actor whose activities indicate that they are a well-resourced and technically efficient group with the ability to quickly operationalise exploits for discovered zero-day vulnerabilities in edge devices,' Microsoft's threat intelligence group has said. China has repeatedly denied the accusations. According to cybersecurity risk-mitigation company Cobalt, Anonymous is perhaps the most well-known hacking group. It first made headlines during the Occupy Wall Street protests in 2011, and Cobalt notes Anonymous has 'targeted PayPal, Visa and MasterCard'. 'Authorities have arrested hackers who claim to be part of Anonymous over the years, but the group's decentralised nature makes tracking down or prosecuting members challenging,' Cobalt wrote on its website. The group has also been known to use distributed denial-of-service (DDoS) attacks that have led to massive website disruptions. Both Norton and Cobalt list Morpho, a group of hackers dedicated to financially motivated cyber attacks, as a worrisome entity. The geographic origins of the group are largely unknown but, according to Norton, Morpho has previously targeted X, Meta, Microsoft and Apple to try to steal confidential information. There are some clues that Morpho has left behind in the cyber mess it causes. 'It's said that they may be of English-speaking origin because the code is entirely composed of English and their encryption keys are named after memes in American pop culture,' Norton said on its website. According to Cobalt, Morpho has also been known to seek intellectual property from health care and technology companies. Cybersecurity firms and technology analysts routinely list Darkside as one of the more prominent hacking groups. It rose to prominence in 2021 when it claimed responsibility for the Colonial Pipeline cyber attack that caused fuel shortages and price increases across the US. Darkside has also been known to run affiliate programmes to help other hacker groups in infiltration attempts. It has been known to use a 'ransomware-as-a-service model', meaning it sells or leases ransomware to others to carry out attacks. According to cybersecurity firm Norton, Darkside likely originates in Eastern Europe. 'This group is known for targeting high-profile corporations worldwide with stolen credentials and manual jacking with testing tools,' Norton said. Though it doesn't necessarily have the same history or name recognition of other hacking groups or cyber threat actors, Mint Sandstorm is quickly stoking fears in the technology security world. Microsoft's threat intelligence group said that Mint Sandstorm is an Iran-affiliated group 'known to primarily target dissidents protesting the Iranian government, as well as activist leaders, the defence industrial base, journalists, think tanks, universities, and multiple government agencies and services, including targets in Israel and the US'. It has been widely speculated that Mint Sandstorm was behind the attempted hack and potential breach of communications within Donald Trump's 2024 presidential campaign. 'Also uses credential harvesting to obtain access to official work accounts as well as personal accounts,' said Microsoft.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Microsoft Vulnerabilities exposed by check point research
Microsoft Vulnerabilities exposed by check point research

Zawya

time2 hours ago

  • Zawya

Microsoft Vulnerabilities exposed by check point research

Check Point Research uncovered six fresh vulnerabilities in Microsoft Windows, including one critical flaw with potential for wide-reaching impact. These weaknesses could trigger system crashes, enable arbitrary code execution, or expose sensitive data across networks. Following a responsible disclosure process, Check Point privately reported these issues to Microsoft, with the final patch delivered on August 12 Patch Tuesday. Check Point customers are already protected—our security solutions actively detect and block attempts to exploit these vulnerabilities. Microsoft released the final patches for six newly discovered Windows vulnerabilities identified by Check Point Research, including one rated as critical. These vulnerabilities could crash entire systems or allow attackers to run malicious code, posing real risks to business operations. Additionally, one of the vulnerabilities marks what is likely the first publicly disclosed bug in a Rust-based component of the Windows kernel, raising important questions about the limits and challenges of memory safety in modern software. We strongly encourage all Microsoft users to apply the August updates right away. Check Point customers are already protected—our security solutions detect and block these threats. Read on to learn more about each vulnerability, the potential risks they pose, and how Check Point customers remain protected. Breaking Down the Vulnerabilities Check Point Research identified six vulnerabilities in Microsoft Windows, ranging from critical to moderate severity. In this section, we'll focus on the three most significant flaws, explaining their potential impact and why they matter—before briefly summarizing the remaining ones. 1. Vulnerability in Rust-Based Windows Kernel Component — System Crash Risk Check Point Research uncovered what is probably the first-ever publicly disclosed security flaw in a Rust-based component of the Windows kernel —Microsoft's foundational operating system layer. This vulnerability can cause a total system crash, forcing a hard reboot and instantly knocking users offline. Rust is widely praised for its ability to prevent memory bugs that have long challenged software security. Its introduction into Windows aimed to enhance system safety. In this case, the vulnerability emerged because Rust detected an underlying issue—but instead of containing the problem gracefully, it triggered a system-wide failure. For organizations with large or remote workforces, the risk is significant: attackers could exploit this flaw to simultaneously crash numerous computers across an enterprise, resulting in widespread disruption and costly downtime. This discovery highlights that even with advanced security technologies like Rust, continuous vigilance and proactive patching are essential to maintaining system integrity in a complex software environment. 2. Memory Corruption Vulnerabilities Enabling Arbitrary Code Execution Among the remaining vulnerabilities, two are especially concerning due to their exploitability, one of which is classified as critical and was patched Tuesday, August 12th. Both vulnerabilities, tracked as CVE-2025-30388 and CVE-2025-53766, allow attackers to execute arbitrary code on the affected system, effectively giving them the ability to run any malicious software they choose. This could include installing remote control tools or launching other damaging attacks, leading to a full system compromise. The attack vector involves interacting with a specially crafted file. When a user opens or processes this file, the vulnerability is triggered, allowing the attacker to take control. 3. Additional Memory Corruption and Information Disclosure Vulnerabilities The remaining three vulnerabilities also involve memory corruption, but with a different twist: they lead to information disclosure. Typically, information leaks are less immediately dangerous because an attacker would need a way to obtain the data leaked on a local system. However, one of these vulnerabilities, identified as CVE-2025-47984, can leak memory contents directly over the network, potentially exposing sensitive information beyond the local system. This network-linked memory leak raises the stakes, as attackers could remotely access data they shouldn't see without needing physical access to the computer. While these issues are generally considered less critical than full system compromise, they still represent important security risks and relevant patches should be applied. Secure Your Systems: Patch Now and Remain Protected The six Windows vulnerabilities uncovered by Check Point Research, including a system crash due to a flaw in a Rust-based kernel component, highlight the ongoing challenges of securing even the most mature and widely used operating systems. These vulnerabilities could lead to system crashes, remote code execution, and sensitive data leaks, all of which pose serious risks to organizations of any size. We strongly urge all Microsoft users to apply the August Patch Tuesday updates as soon as possible to protect their systems from these threats. Check Point customers are already safeguarded: our security solutions detect and block exploitation attempts related to these vulnerabilities, ensuring continuous protection even before patches are applied. Staying proactive with updates and threat detection is key to maintaining a strong security posture in today's evolving landscape.

China's Tencent posts strong Q2 revenue growth as AI race heats up
China's Tencent posts strong Q2 revenue growth as AI race heats up

Al Etihad

time4 hours ago

  • Al Etihad

China's Tencent posts strong Q2 revenue growth as AI race heats up

13 Aug 2025 14:22 BEIJING (AFP)Chinese internet giant Tencent on Wednesday reported a third consecutive quarter of double-digit revenue growth, beating forecasts, as it began rolling out AI services in its games and messaging Tencent is the operator of China's multifunctional app WeChat and a major player in the global gaming firm also has a presence in cloud computing, entertainment and AI, with its Yuanbao chatbot one of the most popular AI services in revenue in the three months to June 30 was 184.5 billion yuan ($25.7 billion), a filing to the Hong Kong Stock Exchange showed, up 15 percent compared to the same period last figure exceeded a Bloomberg estimate of an 11 percent for the first half of 2025 was up 14 percent a breakdown of sales, Tencent said that revenue from domestic games increased 17 percent year-on-year in the second quarter, while international games saw a 35 percent firm's net profit for the latest quarter also jumped 17 percent year-on-year to reach 55.6 billion yuan."We delivered double-digit revenue and... operating profit growth on a year-on-year basis, as we invested in, and also benefited from, utilising AI," the firm said in a added that it had "enriched AI features" in its WeChat app, and "deployed AI tools" in fellow domestic tech giants Alibaba and ByteDance, Tencent has been funnelling resources into the competitive field of AI since the release of Chinese company DeepSeek's chatbot in January. The little-known DeepSeek caused a global stir because it appeared to have developed the chatbot at a fraction of the price of Western industry leaders.

Israel pressures ceasefire talks with threat to deport Gazans to countries like South Sudan
Israel pressures ceasefire talks with threat to deport Gazans to countries like South Sudan

The National

time4 hours ago

  • The National

Israel pressures ceasefire talks with threat to deport Gazans to countries like South Sudan

Israel is pressuring Gaza ceasefire talks by forcing residents to 'leave' and floating the idea of relocating them to African countries such as South Sudan, Palestinian political sources have said. Prime Minister Benjamin Netanyahu repeated that his army would 'allow' Palestinians to leave Gaza. At the same time, AP reported that Israel is in talks with South Sudan to host Gazans. The reports came days after Israel announced plans to reoccupy Gaza, amid renewed efforts to secure a ceasefire in the devastated territory, where Israeli forces have killed more than 61,000 Palestinians since October 2023. 'There are desperate attempts to improve Israel's negotiating terms,' one of the Palestinian political sources told The National on Wednesday. 'What Netanyahu is doing is an attempt to show he is taking action amid his internal crisis: what to do with the Gaza war,' said the official, a former minister. Calls to forcibly resettle Palestinians from Gaza have previously drawn widespread condemnation, especially from Arab countries, who reject the idea of "emptying" Gaza, as previously suggested by US President Donald Trump. Mr Netanyahu told a televised interview that 'Israel will give them the opportunity to leave," adding that he felt he was on a 'historic and spiritual mission,' and was 'very' attached to the vision of a Greater Israel, which includes parts of Jordan and Egypt. Pressure tactic AP previously reported that Israel and the US approached Sudan, Somalia, and the breakaway Somali region of Somaliland with similar resettlement proposals. The status of those talks is unclear. On Wednesday, Israeli media reported that Deputy Foreign Minister Sharren Haskel would hold a series of meetings in South Sudan, the first official visit to the East African country by an Israeli government representative. 'Israel and Netanyahu are in crisis, and global shifts are exerting significant pressure on them. They need desperate measures and desperate propaganda to push their way through,' said a Palestinian source. Last week, Israel's cabinet approved Mr Netanyahu's plans to occupy Gaza city in the north and displace half of the population by forcing them south. Sources told The National that invading the city would mark the start of reoccupying the entire territory, 20 years after Israel's so-called 'disengagement' from Gaza. The Israeli military said on Wednesday it had approved the "framework" for a new assault. Many see this as another pressure tactic in ceasefire negotiations, which Israel wants to avoid tying to an obligation to end the war and withdraw from Gaza, a condition Hamas insists on. 'The Israeli army is present throughout Gaza, and talk of a new offensive is an Israeli pressure tactic. It will cost them many men and much money. The chances of a battle are slim,' the former minister said.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store