12/06/2021 Key Findings Gemini analysts have identified 316 e-commerce sites worldwide infected with trojanized Google Tag Manager (GTM) containers as part of an ongoing Magecart campaign. This tactic has become increasingly popular this year. The abuse of this legitimate Google service is concerning because it provides threat actors free infrastructure upon which they can host […]
Read moreThe intelligence in this report was gathered by a source who was recruited by “Bastion Secure”. Gemini Advisory’s investigation and analysis of the source’s information has been ongoing for the past several months. Although sensitive information has been redacted from this report to protect the source, Gemini Advisory has provided law enforcement with the complete […]
Read moreKey Findings When selling stolen payment cards, dark web marketplaces or individual fraudsters often use “testing services”, which allow them to test whether a card is valid for conducting fraudulent activity or whether it has been flagged as stolen. Gemini analysts have uncovered a method in which cybercriminals use nonprofit organizations that accept donations to […]
Read moreKey Findings Phishing attacks sharply increased in 2020 with the FBI reporting a 110% increase in phishing victims. Gemini Advisory identified a 72% increase in the volume of dark web forum posts referencing phishing and a 101% increase in the volume of compromised US payment cards with a high likelihood of being phished that were […]
Read moreThe HackMachine cybercriminal software provides hackers with a simple tool to gain access to web applications and conduct schemes such as payment card fraud, ransomware, brute-forcing attacks, stealing login credentials, and more.
Read moreKey Findings A recent “public” dispute on the dark web between actors affiliated with the “REvil” ransomware group and an actor offering to negotiate with victims has shed light on the rise of “ransomware consultants” and revealed the operational methods of ransomware hackers. Ransomware consultants research victims to gather intelligence for realistic ransom demands and […]
Read more