Cybercrime & Underground Economy
Coverage of dark web markets, ransomware ecosystems, fraud operations, financial crime services, monetization tactics, and the evolving underground economy driving global cybercriminal activity.
-

Malicious Blender Files Used to Spread Malware
Cybersecurity experts are warning about malicious Blender files being used to spread malware that steals sensitive data. These files, found on platforms like CGTrader, leverage embedded Python scripts to initiate infections when opened. Security firm Morphisec first reported on this Russian-linked campaign, noting its use of malicious .blend files to deploy the StealC V2 data-stealing…
-

JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers
A new cybersecurity campaign, dubbed JackFix, is tricking users into installing malware via fake Windows update pop-ups on adult websites. Attackers use ClickFix lures to deceive victims into running malicious commands. This tactic leverages fake adult sites (like xHamster or PornHub clones), often distributed via malvertising. The “urgent security update” creates psychological pressure on victims,…
-

Ex-Officer Gets Suspended Sentence for Selling Police Files to Journalist Nephew
A former police officer in Yekaterinburg has received a four-year suspended sentence after admitting to selling confidential police files. The court press service confirmed the ruling on Tuesday. Andrei Karpov, the ex-officer, pleaded guilty to charges of bribery and abuse of power. He sold criminal reports, including personal data and pre-trial information, to his nephew,…
-

Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware
Cybersecurity experts reveal a new campaign leveraging Blender 3D assets to spread a dangerous info-stealing malware. This operation has been active for at least six months. Malicious .blend files are being planted on popular platforms like CGTrader. Users unknowingly download these files, which contain embedded Python scripts. Upon opening in Blender, these scripts automatically execute…
-

Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks
Bad actors are deploying Matrix Push C2, a new command-and-control platform for sophisticated phishing attacks. This framework uses web browser notifications to deliver malicious links across various operating systems, employing a fileless approach that bypasses traditional security. Offered as “Malware-as-a-Service” (MaaS), Matrix Push C2 enables threat actors to send deceptive alerts, tricking victims into visiting…
-

Sanctions Hit Russia’s Bulletproof Hosting Provider
U.S., UK, and Australia sanction Russia-based Media Land for providing bulletproof hosting to ransomware groups like LockBit, BlackSuit, and Play, freezing assets and prohibiting transactions.
-

ShadowRay 2.0: Ray AI Flaw Exploited for Cryptomining
ShadowRay 2.0 exploits a Ray AI flaw, creating a self-spreading GPU cryptomining botnet. Attackers use unpatched vulnerabilities, GitLab, and GitHub to spread malware and hijack computing power.
-

RondoDox Exploits Unpatched XWiki Servers (CVE-2025-24893)
RondoDox is exploiting CVE-2025-24893 in XWiki to run miners, gain shells and add servers to DDoS botnets.
-

Fake AI and WhatsApp apps on third‑party Android stores hide spyware, ad fraud
Appknox warns that fake ChatGPT, DALL·E and WhatsApp apps on third‑party Android stores range from harmless wrappers to spyware that intercepts OTPs.
