Real-Time Security Intelligence

Recorded Future Strengthen Your Defenses with Threat Intelligence

  • Annual Payment Fraud Intelligence Report: 2024
    on January 21, 2025 at 12:00 am

    Explore 2024 payment fraud trends with Recorded Future: e-skimming, scam e-commerce, dark web insights, and 2025 predictions.

  • Cleo MFT: CVE-2024-50623
    on January 21, 2025 at 12:00 am

    Learn about CVE-2024-50623 affecting Cleo MFT products. Patch now to prevent RCE attacks and secure your systems.

  • Chinese State-Sponsored RedDelta Targeted Taiwan, Mongolia, and Southeast Asia with Adapted PlugX Infection Chain
    on January 9, 2025 at 12:00 am

    Between July 2023 and December 2024, RedDelta, a Chinese state-sponsored group, targeted Mongolia, Taiwan, and Southeast Asia using advanced spearphishing campaigns with evolving infection chains and the PlugX backdoor.

  • Hispanic Heritage Month: Path to Collective Power – Part Two
    on January 7, 2025 at 12:00 am

    Discover our 2024 Hispanic Heritage Month series: overcoming adversity, fostering community, and empowering growth through inclusion.

  • Tracking Deployment of Russian Surveillance Technologies in Central Asia and Latin America
    on January 7, 2025 at 12:00 am

    A new report by Recorded Futureā€™s Insikt group finds that countries across Central Asia and Latin America are increasingly basing their digital surveillance practices on Russia’s System for Operative Investigative Activities (SORM). Learn more about the privacy and security risks, as well as risks to corporate organizations operating in these regions.

  • Fraud Funding Terrorism? The Cost of Missing Sanctioned Connections in a Globalized Fraud Ecosystem
    on December 18, 2024 at 12:00 am

    Editor’s note: The following blog post originally appeared on Levi Gundert’s Substack page.IntroductionA past conversation with an undercover federal agent who specializes in money laundering revealed staggering amounts of currency moving across geographic boundaries, skirting traditional Anti-Money Laundering (AML) processes. From local and transnational crime syndicates to presidential spouses and those looking to evade sanctions or tax regimes, the need to wash and move illicit funds into reputable banking channels has never been greater. The FTs recent AML coverage highlights the scale of the problem and provides timely background reading on money laundering networks, suspects, and indictments. One story is particularly relevant as it centers around proof of address compliance failures. Coincidentally, address verification is precisely the problem highlighted by a recent Recorded Future Payment Fraud Intelligence (PFI) report.Big Fraud and a Hong Kong AddressThe address in question is:12th Floor, San Toi Building,137-139Connaught Road Central, Hong KongThe San Toi Building (and 12th-floor visual estimate) provided by Google MapsThe address is linked to two scam website (fraud) clustersdesignated Misspelled and Brand as a Coverwhich share merchant accounts and payment processing logic. The three merchant accounts include CAMHUBSTORE, AQAPAY*xmvmxft, SMARTTECHHK, and gracefashionhub. Hundreds, if not thousands, of scam websites are connected to these merchants.A scam website snapshot. A victim articulates why Camhubstore is a scam site. These merchant accounts that process payments for fraudulent, non-existent goods are tied to the 12th floor of the San Toi Building as the registered business address. The address is even placed directly on some of the sites as a contact address. Heres where it gets interesting. The address is listed on the U.S. Treasury OFAC list for ties to an Iranian terrorism group. The 12th floor is presumably large enough to house multiple businesses and likely sufficiently small such that businesses transit through reasonably often. Of course, it would be difficult to draw a direct connection between these merchant accounts and terrorism based on a shared space address. Still, other questions remain, namely: how are these scam merchants acquiring the ability to process payment cards when their physical address is on the OFAC list? Remedying AML / KYC Compliance FailuresKnowing your customer (KYC) might be difficult when bad actors go to great lengths to obscure their identity and purpose, but this is an egregious case of acquiring banks and payment processors missing obviously problematic contact details.Geoff Whites book, The Lazarus Heist, documented that even routine checks can lead to better outcomes. In it, White details North Korean hackers’ inability to transfer a more significant amount (hundreds of millions of dollars) from Bangladesh Bank to a bank branch in Manila because the branch is located on Jupiter Street, and “Jupiter is also the name of a sanctioned Iranian shipping vessel. Addresses matter. Suppose the US pursues a more friendly regulatory environment for cryptocurrencies under President Trump, and exchanges find it easier to acquire bank accounts. In that case, the potential for money laundering may explode without rigorous AML / KYC / KYT efforts. The SEC may have fewer teeth, but banks and processors are still gambling if anyone can obtain a merchant account with little to no compliance checks. Indeed, the business incentives are aligned to offer maximum merchant accounts to generate more processing fees, and historically, compliance costs have eroded profitability. However, this may be an emerging opportunity for GenAI. Semi-autonomous agents trained to flag basic AML violations (for example, website contact details listed on OFAC, perhaps) and elastic agents that deploy on demand when a new merchant application is submitted would assist AML compliance efforts and help the financial services industry grappling with a tsunami of fraudulent merchant transactions.

  • Breaking the Circle: Chinese Communist Party Propaganda Infrastructure Rapidly Expands
    on December 10, 2024 at 12:00 am

    China’s ICCs reshape global propaganda via targeted messaging, social media, and influence networks to amplify the Communist Party’s voice globally.

  • Operational Disruption, Legal Risk, and Churn From Lost Consumer Trust Drive The Business Impact of Data Breaches
    on December 10, 2024 at 12:00 am

    Discover the rising costs of data breaches, including disruption, legal risks, and lost trust. Learn proactive steps to protect your business from escalating threats.

  • BlueAlpha Abuses Cloudflare Tunneling Service for GammaDrop Staging Infrastructure
    on December 5, 2024 at 12:00 am

    BlueAlpha, a Russian cyber group, uses Cloudflare Tunnels to deploy GammaDrop malware, escalating challenges in targeting Ukrainian entities.

  • 2024 State of Threat Intelligence Infographic
    on December 3, 2024 at 12:00 am

    Discover key insights from 550+ cybersecurity experts on threat intelligence trends, spending, and strategies in our 2024 infographic. Learn more.

  • “Operation Undercut” Shows Multifaceted Nature of SDAā€™s Influence Operations
    on November 26, 2024 at 12:00 am

    Russiaā€™s ā€œOperation Undercutā€ uses AI-driven disinformation to sway opinion on Ukraine, aiming to erode Western support. Explore tactics and impacts.

  • Scam Websites Take Advantage of Seasonal Openings and Established Methods to Maximize Impact
    on November 26, 2024 at 12:00 am

    Discover how scam websites exploit seasonal opportunities and advanced tactics to target cardholders and banks. Learn how threat actors use lures, monetization strategies, and dark web resources to execute fraud.

  • Building Consistent Efforts: Veteransā€™ Causes at Recorded Future
    on November 22, 2024 at 12:00 am

    Building Consistent Efforts: Veteransā€™ Causes at Recorded Future

  • Russia-Aligned TAG-110 Targets Asia and Europe with HATVIBE and CHERRYSPY
    on November 21, 2024 at 12:00 am

    TAG-110, a Russia-aligned threat group, targets organizations across Asia and Europe using HATVIBE and CHERRYSPY malware for espionage. Learn how Recorded Future’s analysis uncovers the groupā€™s tactics, techniques, and indicators of compromise.

  • The Need for Cyber Fraud Fusion Centers
    on November 19, 2024 at 12:00 am

    From Magecart to Mobile Menaces

  • Russian Sabotage Activities Escalate Amid Fraught Tensions
    on November 14, 2024 at 12:00 am

    Russiaā€™s sabotage in Europe threatens NATO allies, targeting infrastructure to weaken Ukraine support. Explore tactics, goals, and risks.

  • Why the Shift to SaaS Amplifies Identity-Based Risk
    on November 12, 2024 at 12:00 am

    Explore why identity is the new security frontier. Learn how credential-based attacks dominate and discover proactive strategies for safeguarding SaaS environments.

  • China-Nexus TAG-112 Compromises Tibetan Websites to Distribute Cobalt Strike
    on November 12, 2024 at 12:00 am

    China-based TAG-112 exploited Tibetan sites to spread Cobalt Strike malware. Recorded Future reveals targeted threats by state-sponsored actors.

  • Predict D.C. and London: The Fight Against Ransomware Enters a New Phase
    on October 31, 2024 at 12:00 am

    Insights from Recorded Futureā€™s Predict: leaders tackle evolving threats, AI risks, ransomware, and resilience strategies to empower security teams globally.

  • Cybersecurity Awareness Month: Gamifying Cybersecurity Training
    on October 28, 2024 at 12:00 am

    Discover how we use gamified training at Recorded Future. Engaging exercises simulate real-world threats, boosting employee preparedness and teamwork

Share Websitecyber