• About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
TechTrendFeed
  • Home
  • Tech News
  • Cybersecurity
  • Software
  • Gaming
  • Machine Learning
  • Smart Home & IoT
No Result
View All Result
  • Home
  • Tech News
  • Cybersecurity
  • Software
  • Gaming
  • Machine Learning
  • Smart Home & IoT
No Result
View All Result
TechTrendFeed
No Result
View All Result

Myanmar Rip-off Compound Managers Charged

Admin by Admin
April 24, 2026
Home Cybersecurity
Share on FacebookShare on Twitter


Cybercrime
,
Fraud Administration & Cybercrime

Additionally, Europol Cracks DDoS Networks, Mythos Finds Bugs, France Portal Hit

Pooja Tikekar (@PoojaTikekar) •
April 23, 2026    

Breach Roundup: Myanmar Scam Compound Managers Charged
Picture: Shutterstock/ISMG

Each week, ISMG rounds up cybersecurity incidents and breaches around the globe. This week, rip-off compounds. Attackers exploit flaws pre-disclosure. A crackdown on DDoS-for-hire. No Mythos for CISA, sure for Mozilla. France ID portal breach. Israeli and Venezuelan important infrastructure focused. Russian hacking in Ukraine. An Apache flaw. A ransomware negotiator aided BlackCat.

See Additionally: Why Cyberattackers Love ‘Residing Off the Land’

US Prices 2 Chinese language Nationals for Managing Rip-off Compounds

U.S. federal prosecutors unsealed prison complaints and arrest warrants for 2 Chinese language nationals being held in Thailand. Federal prosecutors say the lads, Jiang Wen Jie and Huang Xingshang, managed rip-off compounds operated by pressured labor within the Southeast Asian nation of Myanmar. They face fees of wire fraud conspiracy.

Prosecutors introduced the complaints Thursday, additionally publicizing the seizure of greater than 503 domains used to defraud U.S. victims via false guarantees of cryptocurrency funding. Prosecutors moreover seized a Telegram messaging app channel used to recruit human trafficking victims to a rip-off compound in Cambodia.

Southeast Asia has turn into a magnet for organized crime compounds utilizing nation utilizing trafficked and compelled staff to perpetuate romance and funding scams. The FBI says People misplaced a minimum of $7.2 billion in 2025 to such scams, a determine it believes is a major underrepresentation of precise losses. Unbiased estimates put the worldwide tally of losses to such scams at tens of billions of {dollars} yearly.

Prosecutors say Jiang straight supervised staff at a compound often called Shunda Park within the village of Min Let Pan earlier than it was seized in November 2025 by a regional militia energetic in Myanmar’s long-standing civil struggle. Jiang’s staff focused People, together with one scammer who defrauded one sufferer of $3 million. Following the seizure, Jiang and Huang tried to function one other rip-off compound in Myanmar earlier than briefly relocating to Cambodia, which has its personal issues with rip-off facilities (see: Breach Roundup: Cambodia Rip-off Middle Crackdown ).

Prosecutors say Thai police earlier this 12 months arrested the pair on immigration fees. Situations for staff pressured to function the scams might be horrific, with an FBI affidavit recounting beatings, electrocutions and homicide.

Attackers Strike Earlier than Zero-Day Disclosure, Research Finds

Attackers are more and more transferring earlier than vulnerabilities are publicly disclosed, utilizing a window of reconnaissance exercise that offers defenders a short however important early warning, in response to a brand new report from risk intel agency GreyNoise.

The examine finds that surges in malicious web site visitors precede CVE disclosures by a median of about 10 to 11 days. The evaluation, based mostly on almost 148 million classes noticed over a 103-day interval, reveals that these spikes are structured probing tied to vulnerabilities which are but to be introduced.

GreyNoise tracked exercise throughout 18 main community and edge machine distributors and recognized dozens of instances the place uncommon site visitors patterns appeared effectively forward of disclosure. In additional than half of these cases, a associated vulnerability was publicly disclosed inside three weeks of the spike. The information suggests attackers independently uncover flaws or achieve early entry to use flaws earlier than particulars turn into public.

Site visitors builds in waves, typically accelerating as disclosure nears. In a single case involving a Cisco vulnerability, probing exercise intensified throughout a number of surges, compressing from weeks-long intervals to only days earlier than disclosure. In one other, site visitors concentrating on a SonicWall flaw drew three distinct surge occasions within the weeks earlier than its CVE announcement, with exercise peaking on the midpoint earlier than a remaining push simply three days out.

The examine additionally finds that session quantity, not simply the variety of attacking IP addresses, gives the clearest sign. Conventional safety fashions are inclined to deal with widespread scanning as routine web noise. GreyNoise argues that this strategy misses the importance of sharp will increase in interplay quantity, which frequently replicate coordinated pre-exploitation exercise moderately than opportunistic scanning.

The findings reinforce a broader shift within the risk panorama the place exploitation timelines have successfully turned “unfavourable.” Attackers are now not ready for disclosure; in lots of instances, they’re already energetic by the point a vulnerability is assigned a CVE. The report reveals a major share of exploited vulnerabilities are abused on, and even earlier than, the day they’re publicly disclosed.

Europol-Backed Operation Hits DDoS Customers and Providers

A Europol-supported worldwide legislation enforcement operation focused greater than 75,000 people of distributed denial-of-service assault platforms, in a coordinated crackdown on the “DDoS-for-hire” ecosystem.

The trouble, a part of the long-running Operation PowerOFF initiative, introduced collectively authorities from 21 nations and centered on each enforcement and prevention towards prospects of “booter” or “stresser” providers, which allow anybody to launch DDoS assaults for a price.

Authorities made 4 arrests, executed 25 search warrants and dismantled 53 domains. Greater than 100 URLs promoting DDoS-for-hire providers had been faraway from search engine outcomes, and Europol positioned focused advertisements on engines like google to intercept customers actively looking for such instruments. Warning messages had been additionally despatched via blockchains utilized by criminals to course of unlawful funds.

Investigators seized backend techniques from unlawful platforms to find customers and allow coordinated follow-on actions throughout nations. U.S. Division of Justice prosecutors in Alaska seized eight DDoS-for-hire websites, together with “Vac Stresser” and “Legendary Stress,” which launched tens of 1000’s of DDoS assaults per day.

CISA Shut Out of Anthropic’s Mythos AI Entry

The U.S. Cybersecurity and Infrastructure Safety Company lacks entry to Anthropic’s Claude Mythos Preview synthetic intelligence mannequin, at the same time as a Discord group of unauthorized customers has been utilizing it freely because the day it launched (see: Report: Discord Group Makes use of Claude’s Supposedly Secret Mythos).

The AI firm has up to now prolonged entry to greater than 40 organizations, together with Amazon, Microsoft, Apple, Cisco and Mozilla, for managed testing. CISA acquired briefings on the mannequin’s capabilities however didn’t get hold of entry, Axios reported Tuesday. The NSA and the Commerce Division’s Middle for AI Requirements and Innovation are testing the mannequin. Nationwide Cyber Director Sean Cairncross is negotiating broader civilian entry to Mythos, and the Division of the Treasury can be searching for entry.

Mythos AI Identifies 271 Firefox Bugs

Anthropic’s Mythos AI mannequin can now determine software program vulnerabilities in bulk, difficult the belief that zero-days are uncommon and tough to seek out, Firefox browser maker Mozilla mentioned in a Tuesday weblog publish.

Mozilla’s earlier check utilizing Anthropic’s Opus 4.6 mannequin scanned almost 6,000 C++ information throughout Firefox’s codebase, producing 112 distinctive reviews of which 22 had been confirmed as security-sensitive vulnerabilities – 14 of them categorized as high-severity, representing nearly a fifth of all high-severity Firefox vulnerabilities remediated in the entire of 2025. These fixes shipped in Firefox 148. A subsequent run utilizing the extra superior Claude Mythos Preview mannequin, a part of Anthropic’s restricted Venture Glasswing initiative, noticed 271 vulnerabilities, all patched on this week’s Firefox 150 launch, the report says.

Mozilla described software program flaws as “finite” and mentioned it discovered “no class or complexity of vulnerability that people can discover that this mannequin cannot.”

Safety Incident Hits France’s Authorities ID Portal

A safety incident impacted France’s Nationwide Company for Safe Paperwork authorities portal liable for processing passports, nationwide id playing cards, driving licenses and residence permits, the French Inside Ministry mentioned Monday.

The company detected the breach on April 15 and confirmed days later that information linked to roughly 12 million consumer accounts might have been compromised. The uncovered information consists of names, e mail addresses, login identifiers, dates of delivery and account IDs, with some data additionally containing postal addresses, locations of delivery and telephone numbers.

Authorities mentioned supporting paperwork submitted throughout administrative processes weren’t affected and that the uncovered information can’t be used to straight entry consumer accounts.

A risk actor working below the identify “breach3d” claimed accountability, alleging possession of as much as 19 million data.

Earlier this 12 months, a cyberattack on France’s Ministry of Training uncovered private information linked to roughly 243,000 public faculty workers, most of them academics, via the centralized Compass human sources platform (see: Breach of French Training Platform Impacts 243,000 Workers).

New OT Malware Seeks to Disrupt Israeli Water Infrastructure

A brand new pressure of operational expertise malware designed to control water remedy processes in Israeli industrial management techniques can alter chlorine dosing and water strain ranges, current evaluation from cybersecurity firm Darktrace discovered.

The malware, dubbed ZionSiphon, is engineered to determine industrial management environments linked to water remedy and desalination operations and activate solely below particular circumstances. It checks for Israeli IP ranges and the presence of processes or information related to water techniques earlier than executing its payload.

As soon as deployed, ZionSiphon scans networks for industrial protocols equivalent to Modbus, DNP3 and Siemens S7 to map and work together with OT environments. Researchers mentioned the malware makes use of customary intrusion methods together with privilege escalation, persistence mechanisms and propagation through detachable media.

The code incorporates embedded strings with politically pushed messaging referencing hurt to Israeli cities, and the malware is narrowly configured to keep away from execution outdoors Israeli water infrastructure.

Regardless of these capabilities, the present pattern seems non-functional. A important flaw within the malware’s personal country-validation logic – the IsTargetCountry() operate – causes it to set off its self-destruct routine moderately than deploy its payload. Darktrace assessed the pattern as both a improvement construct, a prematurely deployed model, or an deliberately defanged check variant.

Wiper Malware Strikes Venezuela’s Power Sector

A beforehand unknown and extremely damaging malware was deployed in a focused assault towards Venezuela’s power and utilities sector, mentioned Russian cybersecurity agency Kaspersky.

The malware, dubbed Lotus Wiper, was designed to completely destroy compromised techniques by overwriting bodily drives. Researchers say the assault relied on two batch scripts to organize the atmosphere earlier than the ultimate payload deploys: disabling consumer accounts, forcing logoffs, blocking cached logins and shutting down community interfaces to isolate machines.

As soon as energetic, Lotus Wiper operates on the disk degree through IOCTL calls, clearing USN journal entries, wiping restore factors and overwriting bodily sectors. The batch scripts pile on additional with diskpart clear all to zero out drives, robocopy to overwrite listing contents and fsutil to fill remaining disk area, closing off any restoration path. Locked information are queued for deletion on reboot, and the destruction cycle runs a number of instances to make sure nothing survives.

The malware was seemingly compiled in September 2025 and later uploaded from a system in Venezuela in December 2025.

APT28 Cyberespionage Focused Ukrainian Prosecutors By way of Roundcube Exploits

A cyberespionage marketing campaign by Russia’s GRU Navy Unit 26165 focused Ukrainian prosecutors and anti-corruption companies via Roundcube webmail exploits, compromising greater than 170 e mail accounts, analysis from Ctrl-Alt-Intel discovered.

Ukrainian authorities mentioned attackers executed malicious code when victims opened emails within the Roundcube platform. Researchers recognized an uncovered command-and-control server used within the operation that remained accessible for months and contained stolen emails, credentials and operational tooling.

Attackers harvested credentials, exfiltrated inboxes and mapped contact networks throughout compromised accounts. Researchers additionally recognized greater than 140 e mail forwarding guidelines configured to redirect communications to attacker-controlled inboxes.

Attackers maintained persistence by extracting time-based, one-time password secrets and techniques. Affected Ukrainian establishments embrace the Specialised Anti-Corruption Prosecutor’s Workplace and the Asset Restoration and Administration Company. Extra victims had been recognized in Romania, Bulgaria, Greece and Serbia.

GRU Navy Unit 26165 is tracked by risk intel corporations as APT28, Fancy Bear, BlueDelta and Forest Blizzard. Ukrainian authorities mentioned the marketing campaign seems to be a part of a broader operation tracked since 2023, with CERT-UA figuring out three waves of assaults.

Ukraine Busts 20,000-Account Bot Farm Fueling Russian Disinformation Campaigns

Ukraine’s Safety Service, in coordination with the Nationwide Police, dismantled a large-scale bot farm operation within the northwestern metropolis of Zhytomyr used to assist Russian info warfare efforts.

Authorities arrested the alleged operator, who’s accused of making and promoting greater than 3,000 faux Telegram accounts every month to Russian patrons. The accounts had been used to amplify Kremlin propaganda, unfold disinformation about Ukraine’s navy and home state of affairs, and ship nameless messages falsely reporting bomb threats at varied amenities.

The bot farm relied on Ukrainian cell numbers and SIM playing cards to create credible-looking accounts, which had been then offered through underground on-line platforms. Investigators say Russian intelligence providers used the infrastructure to conduct affect operations and psychological campaigns.

Legislation enforcement seized laptop techniques, USB modem hubs, cell units and roughly 2,000 SIM playing cards in the course of the raid. Practically 20,000 faux accounts linked to the operation have been blocked.

Apache ActiveMQ Vulnerability Beneath Lively Exploitation

A high-severity vulnerability in a now-patched Apache ActiveMQ is below energetic exploitation, with researchers warning {that a} built-in administration function might be abused to realize remote-code execution on uncovered techniques.

The flaw, tracked as CVE-2026-34197, impacts ActiveMQ Basic and stems from its integration with Jolokia, a JMX-over-HTTP interface used for dealer administration. Researchers at Horizon3.ai mentioned the difficulty permits attackers to execute arbitrary instructions by invoking authentic administration operations in unintended methods.

The weak point lies in how Jolokia exposes inner MBeans. Attackers can use these capabilities to pressure the dealer to load exterior configuration information and execute system-level instructions.

Researchers mentioned an attacker can ship crafted requests to the Jolokia endpoint, invoking the dealer’s addNetworkConnector operation with a malicious discovery URI that instructs the dealer to fetch and course of a distant configuration file, finally executing instructions on the host machine.

Default or weak credentials cut back the barrier to entry, as many environments nonetheless run ActiveMQ with default admin credentials. On variations 6.0.0 via 6.1.1, a separate vulnerability – CVE-2024-32114 – inadvertently exposes the Jolokia interface with none authentication, making CVE-2026-34197 successfully an unauthenticated remote-code execution flaw on these variations.

The flaw has existed for greater than a decade, embedded in broadly deployed messaging infrastructure used throughout sectors together with finance, healthcare and authorities. Compromise of an ActiveMQ dealer can expose delicate information in transit and supply a foothold into linked techniques, analysis warns.

The vulnerability has additionally been added to CISA’s Recognized Exploited Vulnerabilities catalog.

Ransomware Negotiator Pleads Responsible to Aiding BlackCat Assaults

A Florida-based ransomware negotiator pleaded responsible to conspiring with cybercriminals to deploy ransomware assaults towards U.S. corporations, whereas concurrently advising victims on the right way to reply.

Angelo Martino, 41, admitted to working with the BlackCat/ALPHV ransomware group in 2023, the U.S. Division of Justice introduced Monday.

Martino labored as a negotiator at DigitalMint, a crypto dealer that helps ransomware victims negotiate and pay calls for. Prosecutors say he exploited that place by feeding BlackCat operators confidential consumer particulars, together with insurance coverage coverage limits and inner negotiation methods.

Prosecutors mentioned the insider entry helped drive multimillion-dollar payouts, with some victims paying ransoms exceeding $25 million after negotiations Martino influenced.

His two co-conspirators, Ryan Clifford Goldberg, 33, a former Sygnia incident response supervisor from Georgia, and Kevin Tyler Martin, 28, a fellow DigitalMint negotiator from Texas, already pleaded responsible to the identical cost in December 2025. All three used their cybersecurity experience to function as BlackCat associates, paying the ransomware group’s directors a 20% reduce of proceeds in trade for entry to its platform.

U.S. authorities have seized greater than $10 million in belongings from Martino, together with $9.2 million in cryptocurrency, two properties, a trailer, a luxurious fishing boat and a 1999 Nissan Skyline.

Different Tales From This Week

With reporting by ISMG’s David Perera in Northern Virginia.



Tags: ChargedCompoundmanagersMyanmarscam
Admin

Admin

Next Post
The Smiling Man’, ‘Gundam Breaker 4’, Plus Right this moment’s Different Releases and Gross sales – TouchArcade

The Smiling Man’, ‘Gundam Breaker 4’, Plus Right this moment’s Different Releases and Gross sales – TouchArcade

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Trending.

Discover Vibrant Spring 2025 Kitchen Decor Colours and Equipment – Chefio

Discover Vibrant Spring 2025 Kitchen Decor Colours and Equipment – Chefio

May 17, 2025
Flip Your Toilet Right into a Good Oasis

Flip Your Toilet Right into a Good Oasis

May 15, 2025
Reconeyez Launches New Web site | SDM Journal

Reconeyez Launches New Web site | SDM Journal

May 15, 2025
Apollo joins the Works With House Assistant Program

Apollo joins the Works With House Assistant Program

May 17, 2025
Safety Amplified: Audio’s Affect Speaks Volumes About Preventive Safety

Safety Amplified: Audio’s Affect Speaks Volumes About Preventive Safety

May 18, 2025

TechTrendFeed

Welcome to TechTrendFeed, your go-to source for the latest news and insights from the world of technology. Our mission is to bring you the most relevant and up-to-date information on everything tech-related, from machine learning and artificial intelligence to cybersecurity, gaming, and the exciting world of smart home technology and IoT.

Categories

  • Cybersecurity
  • Gaming
  • Machine Learning
  • Smart Home & IoT
  • Software
  • Tech News

Recent News

The Smiling Man’, ‘Gundam Breaker 4’, Plus Right this moment’s Different Releases and Gross sales – TouchArcade

The Smiling Man’, ‘Gundam Breaker 4’, Plus Right this moment’s Different Releases and Gross sales – TouchArcade

April 24, 2026
Myanmar Rip-off Compound Managers Charged

Myanmar Rip-off Compound Managers Charged

April 24, 2026
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us

© 2025 https://techtrendfeed.com/ - All Rights Reserved

No Result
View All Result
  • Home
  • Tech News
  • Cybersecurity
  • Software
  • Gaming
  • Machine Learning
  • Smart Home & IoT

© 2025 https://techtrendfeed.com/ - All Rights Reserved