• The (near) impossibility of tracing Monero

    Bitcoin is not private. Due to its transparent ledger and modern blockchain analysis techniques, the tracing of transactions on its network is relatively simple. Transactions and wallet addresses can be tied to real world identities due to Know Your Customer (KYC) laws. It is currently completely impractical to use Bitcoin anonymously. Monero and its relevance…

  • Cryptocurrency Threat Landscape Report: A Year in Review 2022

    Cryptocurrency and Blockchain technologies have been one of the most prevalent and growing technology industries over the past few years. Threat actors have begun to see cryptocurrency as a highly profitable target for a wide range of reasons, including the ease of laundering, lack of effective testing, and the large number of holders which can…

  • Cyjax White Paper on Russia-Ukraine War: Synopsis

    Cyjax has published a new White Paper which is divided into two distinct sections. First, it provides a historical and contemporary overview of the situation in Ukraine, along with an assessment of President Putin’s rationale for launching the 2022 invasion. The events which took place on 24 February 2022 took the world largely by surprise.…

  • Threat intel report: energy infrastructure on the front line

    Energy infrastructure in Ukraine finds itself on the front line in its war with Russia as nation state cyber threat actors target critical control systems. Chinese companies are developing hardware-based malware as present and future cyber threats to global energy infrastructure rise. In December 2015, a year after the Crimean Peninsula in Ukraine was illegally…

  • Cyber threats and the energy sector: an overview

    The major cyber threats facing the energy sector include ransomware, phishing, malware, vulnerability exploitation, supply chain issues, and DDoS attacks. These attacks may be carried out by state-sponsored threat actors, highly-organised criminal gangs, hacktivist collectives or even individuals acting alone. The energy sector is a prime target for cyber criminals for a variety of reasons:…

  • Monthly Crypto Threat Landscape Report – November 2022

    November has been a rollercoaster month for the crypto landscape after we witnessed FTX, one of the largest exchanges collapse, unleashing all hell onto the cryptocurrency community. However, while this has held the focus, amongst this noise there have been some innovative threats to the sector questioning the importance of anonymity, communication and security testing.…

  • The top ten financial cyber threat actors

    Due to the nature of its business and the way in which it functions, the financial sector is a prime target for cyber criminals. The major cyber threats facing these institutions include ransomware, phishing, malware, digital fraud, vulnerability exploitation, supply chain issues, and DDoS attacks. A brief overview of some of the groups currently targeting…

  • Monthly Crypto Threat Landscape Report – October 2022

    Introduction October held some of the most innovative attack vectors to date, with spam attacks attempting to cripple the efficiency of a chain; the exposure of personal information from hundreds of thousands of users, tied in with their transaction history; and a supply-chain style matter arising from issues covered in last month’s report. Fitting the trend,…

  • Fangxiao: a Chinese threat actor

    Phishing campaigns continue to increase globally. These operations offer an easy route for cybercriminals to generate revenue, steal credentials and spread malware. Cyjax has recently investigated a sophisticated, large-scale phishing campaign that exploits the reputation of international, trusted brands, and targets businesses in multiple verticals including retail, banking, travel, pharmaceuticals, travel and energy. We are…

  • A comprehensive synopsis of 217 subdomain takeover reports

    We are living in extraordinary times. Global conflict has moved from peace time to war footing which is being enhanced by civilian armies of ‘pseudo authorised and encouraged’ cyber volunteers. In addition to this merger between civilian and military, the world is seeing a significant increase in hacktivism, based around a number of ideals, including…

  • Monthly Crypto Report – September 2022

    Despite a previous tumultuous month, with large-scale sanctions and clamp downs on crypto-based cybercrime, September has been no different in the scale and gravitas of attacks. This month holds significance within the crypto community as we saw “The Merge” take place on the Ethereum network, in a big effort to reduce energy consumption. This event…

  • Cyberattacks on the utilities sector

    Utility providers (energy, gas, water, sewage and oil) are targets for both standalone threat actors and large or state-sponsored threat groups. If an Industrial Control System (ICS) or Critical National Infrastructure (CNI) network were to be compromised, threat actors could gain valuable information, disrupt services, and extort money from the providers. Also, customers are vulnerable…

Scroll to Top