Welcome to our

Cyber Security News Aggregator

.

Cyber Tzar

provide a

cyber security risk management

platform; including automated penetration tests and risk assesments culminating in a "cyber risk score" out of 1,000, just like a credit score.

Smart or Stupid? Cybercriminal Group Names Decoded!

published on 2022-02-09 11:09:00 UTC by CISOMAG
Content:

It’s known that cybercriminals always try to advance their hacking skills and change attack strategies to evade security deductions. Apart from hiding their identity, threat actors also make significant efforts in displaying their fake identity by using peculiar or catchy phrases that demand attention. We’ve identified a few cybercriminal groups that showcase attackers’ attitudes and mindsets.

By Rudra Srinivas, Senior Feature Writer, CISO MAG

1. ShinyHunters

ShinyHunters

People with basic cybersecurity knowledge can easily tell that the ShinyHunters black-hat cybercriminal group has been involved in various data breaches, cyberattacks, and extortion schemes on dark web forums. But in general, Shiny Hunter is a character in the Pokémon video game series, who hunts and collects shiny Pokémon that are considered trophies or rewards in the game. Even the Twitter profile of ShinyHunters group has a shiny Pokémon profile picture, representing that they shiny hunt rare or sensitive information that is not readily available or accessible.

2. InfinityBlack

InfinityBlack

The term Infinity indicates limitlessness or without bound, and Black signifies the identity of black-hat hackers. InfinityBlack represents the endless cybercriminal activities of the group to steal online credentials, cryptocurrency wallets, loyalty reward points, and much more. The group was busted last year by the Polish National Police (Policja) in coordination with Eurojust, Swiss law enforcement, and Europol authorities.

3. Silence

This is a simple yet powerful name, indirectly stating that threat actors work in silence, but their cyber activities make noise. The Silence hacking group is known for its extortion schemes with banks and financial institutions globally.

4. Lemon Duck

Lemon Duck

This cute-sounding threat actor group is involved in multiple illicit cryptomining activities using malicious botnets. While there is no solid evidence on where the group name is derived, we suspect that the attackers were inspired by the popular Chinese cuisine Lemon Duck.

5. BackdoorDiplomacy

In general, Backdoor Diplomacy is the process of resolving any political or territorial disputes between two countries out of the public view. Coincidentally, the BackdoorDiplomacy cybercriminal operations involve targeting charitable groups, diplomatic organizations, and Ministries of Foreign Affairs to impact their operations.

6. Fancy Bear

Cybercrimes in COVID-19 Pandemic

Fancy Bear is an infamous Russian cyberespionage group that is responsible for various hacking operations across the globe. The Russian bear symbolizes the country’s nationalism and has been used widely in cartoons and caricatures representing Russia. We suspect that the Fancy Bear group (also known as Cozy Bear) used the word “Bear” to indicate its Russian origin and promote its political interests. The U.K. National Cyber Security Centre (NCSC) has also exposed a cyberattack campaign involving the GRU (which is associated with Fancy Bear and other cybercriminal syndicates) targeting political and governmental institutions.

About the Author:

Rudra Srinivas

Rudra Srinivas is a Senior Feature Writer and part of the editorial team at CISO MAG. He writes news and feature stories on cybersecurity trends.       

Read More from the author.

 

The post Smart or Stupid? Cybercriminal Group Names Decoded! appeared first on CISO MAG | Cyber Security Magazine.

Article: Smart or Stupid? Cybercriminal Group Names Decoded! - published almost 3 years ago.

https://cisomag.eccouncil.org/smart-or-stupid-cybercriminal-group-names-decoded/   
Published: 2022 02 09 11:09:00
Received: 2022 02 28 09:52:07
Feed: Ciso Mag - All
Source: CISO Mag
Category: Cyber Security
Topic: Cyber Security
Views: 1

Custom HTML Block

Click to Open Code Editor