How the C2C market sustains ransomware gangs. In Russias war, intelligence services deploy wipers, and hacktivist auxiliaries handle the DDoS. And a look into other corners of the cyber underworld.

Published: Feb. 1, 2023, 9:15 p.m.

b"Microsoft tallies more than a hundred ransomware gangs. Sandworm's NikoWiper hits Ukraine's energy sector. Mobilizing cybercriminals in a hybrid war. Firebrick Ostrich and business email compromise. Telegram is used for sharing stolen data and selling malware. Crypto scams find their way into app stores. Bryan Vorndran of the FBI Cyber Division outlines the services the FBI provides during an incident response. Ann Johnson from Afternoon Cyber Tea speaks with actor producer Tim Murck about the intersection of cyber awareness and storytelling. And we are shocked - shocked! - that there are fraudulent cyber professional credentials circulating online.\\n\\nFor links to all of today's stories check out our CyberWire daily news briefing:\\nhttps://thecyberwire.com/newsletters/daily-briefing/12/21\\n\\nSelected reading.\\nMicrosoft: Over 100 threat actors deploy ransomware in attacks (BleepingComputer)\\xa0\\nSocGholish: A Tale of FakeUpdates (Reliaquest)\\nESET APT Activity Report T3 2022 (WeLiveSecurity)\\xa0\\nPro-Russian DDoS attacks raise alarm in Denmark, U.S. (The Record from Recorded Future News)\\nChristianaCare's website restored after attack; pro-Russia 'hacktivist' group takes credit (Delaware News Journal)\\nUniv. of Iowa Hospitals website possibly hit by cyberattack (KCRG)\\nCyber attack causes problems with UM Health websites (The Detroit News)\\nHow the war in Ukraine has strengthened the Kremlin's ties with cybercriminals (The Record from Recorded Future News)\\nDark Covenant 2.0: Cybercrime, the Russian State, and War in Ukraine (Recored Future)\\nRussia\\u2019s cyberwar against Ukraine offers vital lessons for the West (Atlantic Council)\\xa0\\nBEC Group Uses Secondary Personas & Lookalike Domains in Third-Party\\u2026 (Abnormal Intelligence)\\nTelegram's place in the cyber underworld. (CyberWire)\\nCrypto scams found in the App Store. (CyberWire)\\nExposure to third-party risk. (CyberWire)\\nCyber certification deceit. (CyberWire)"