<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>KELA Archives - Deliver Intelligence - Dibiz JSC</title>
	<atom:link href="https://dibiz.vn/en/category/kela-en/feed/" rel="self" type="application/rss+xml" />
	<link>https://dibiz.vn/en/category/kela-en/</link>
	<description></description>
	<lastBuildDate>Thu, 19 Jun 2025 17:05:15 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://dibiz.vn/wp-content/uploads/2025/06/cropped-cropped-cropped-cropped-3-1-32x32.png</url>
	<title>KELA Archives - Deliver Intelligence - Dibiz JSC</title>
	<link>https://dibiz.vn/en/category/kela-en/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Telegram’s Policy Shift: How Cybercriminals Are Reacting to New Data Sharing Rules</title>
		<link>https://dibiz.vn/en/telegrams-policy-shift-how-cybercriminals-are-reacting-to-new-data-sharing-rules/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 08 Oct 2024 07:27:00 +0000</pubDate>
				<category><![CDATA[KELA]]></category>
		<guid isPermaLink="false">https://dbiz.vn/?p=989657</guid>

					<description><![CDATA[<p>Telegram recently made waves by updating its privacy policy, marking a significant departure from its long-standing reputation as a haven for privacy-focused users, including cybercriminals. The messaging platform, known for its hands-off moderation approach, will now share users’ phone numbers and IP addresses with law enforcement following court orders. This change applies to various criminal...</p>
<p>The post <a href="https://dibiz.vn/en/telegrams-policy-shift-how-cybercriminals-are-reacting-to-new-data-sharing-rules/">Telegram’s Policy Shift: How Cybercriminals Are Reacting to New Data Sharing Rules</a> appeared first on <a href="https://dibiz.vn/en/">Deliver Intelligence - Dibiz JSC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="vgblk-rw-wrapper limit-wrapper">Telegram recently made waves by updating its privacy policy, marking a significant departure from its long-standing reputation as a haven for privacy-focused users, including cybercriminals. The messaging platform, known for its hands-off moderation approach, will now share users’ phone numbers and IP addresses with law enforcement following court orders. This change applies to various criminal investigations, expanding beyond the previous limit of only terror-related offenses. You can read the full details of the new policy on<a href="https://telegram.org/privacy?setln=fa"> Telegram’s Privacy Policy page</a>.</p>
<h4><b>What Telegram’s New Policy Means for Privacy and Security</b></h4>
<p>The update comes amidst increasing legal pressures on Telegram and its founder, Pavel Durov, after his recent detainment in France. Authorities have been pressuring Telegram to combat the illegal activities flourishing on the platform, which ultimately led to this sweeping policy update. For more context on Durov’s detainment, you can check out our blog post:<a href="https://www.kelacyber.com/blog/durov-telegram-ceo-under-arrest/"> Durov’s Arrest and Telegram’s Transformation</a>.</p>
<p>For years, Telegram was a go-to platform for those seeking to operate below the radar of law enforcement. For more context read our report: <a href="https://www.kelacyber.com/wp-content/uploads/2023/02/KELA_Telegram_CEBIN.pdf" data-lf-fd-inspected-lynor8xnwwn4wqjz="true">Telegram: How a messenger turned into a cybercrime ecosystem</a>. This update signals a turning point, as the platform will now cooperate with authorities in criminal investigations.</p>
<h4><b>How Cybercriminals Are Reacting to Telegram’s Policy Update</b></h4>
<p>KELA’s research reveals widespread unease within cybercriminal communities about these changes. Groups like <b>Ghosts of Palestine</b> have publicly declared their intentions to leave Telegram and seek out more privacy-centric platforms. <b>RipperSec</b>, another prominent hacktivist group, has already begun setting up backup channels on <b>Discord</b>, anticipating that Telegram’s cooperation with law enforcement will pose a threat to their anonymity​. <b>Al Ahad</b>, also hacktivists, created a Signal group and promised to close their Telegram channel soon. The <b>GlorySec</b> hacktivists even mentioned they “may or may not created” Facebook and Threads accounts, though without taking any actions.</p>
<p>&nbsp;</p>
<figure id="attachment_28782" class="wp-caption aligncenter" aria-describedby="caption-attachment-28782"><img fetchpriority="high" decoding="async" class="wp-image-28782 size-medium entered lazyloaded" src="https://www.kelacyber.com/wp-content/uploads/2024/09/Telegram-Picture1_very-first-300x195.png" sizes="(max-width: 300px) 100vw, 300px" srcset="https://www.kelacyber.com/wp-content/uploads/2024/09/Telegram-Picture1_very-first-300x195.png 300w, https://www.kelacyber.com/wp-content/uploads/2024/09/Telegram-Picture1_very-first.png 742w" alt="Ghost of Palestine announcing their intention to find alternative to Telegram" width="300" height="195" data-lazy-srcset="https://www.kelacyber.com/wp-content/uploads/2024/09/Telegram-Picture1_very-first-300x195.png 300w, https://www.kelacyber.com/wp-content/uploads/2024/09/Telegram-Picture1_very-first.png 742w" data-lazy-sizes="(max-width: 300px) 100vw, 300px" data-lazy-src="https://www.kelacyber.com/wp-content/uploads/2024/09/Telegram-Picture1_very-first-300x195.png" data-ll-status="loaded" /><figcaption id="caption-attachment-28782" class="wp-caption-text">Ghost of Palestine announcing their intention to find alternative to Telegram</figcaption></figure>
<p>&nbsp;</p>
<figure id="attachment_28776" class="wp-caption aligncenter" aria-describedby="caption-attachment-28776"><img decoding="async" class="wp-image-28776 size-medium entered lazyloaded" src="https://www.kelacyber.com/wp-content/uploads/2024/09/Telegram-Picture1-300x191.png" sizes="(max-width: 300px) 100vw, 300px" srcset="https://www.kelacyber.com/wp-content/uploads/2024/09/Telegram-Picture1-300x191.png 300w, https://www.kelacyber.com/wp-content/uploads/2024/09/Telegram-Picture1.png 487w" alt="Al Ahad claiming to leave Telegram in favor of Signal" width="300" height="191" data-lazy-srcset="https://www.kelacyber.com/wp-content/uploads/2024/09/Telegram-Picture1-300x191.png 300w, https://www.kelacyber.com/wp-content/uploads/2024/09/Telegram-Picture1.png 487w" data-lazy-sizes="(max-width: 300px) 100vw, 300px" data-lazy-src="https://www.kelacyber.com/wp-content/uploads/2024/09/Telegram-Picture1-300x191.png" data-ll-status="loaded" /><figcaption id="caption-attachment-28776" class="wp-caption-text">Al Ahad claiming to leave Telegram in favor of Signal</figcaption></figure>
<p>&nbsp;</p>
<p>Meanwhile, other groups are taking more pragmatic approaches. <b>UserSec</b>, for example, is now offering tutorials on how to maintain anonymity on Telegram, sharing tips on evading detection under the new data-sharing rules. On the <b>BF Repo V3 Chat</b> group, a Telegram chat related to BreachForums’ users, members have even floated the idea of creating a custom messaging platform using Telegram’s GUI as a foundation to continue their activities with less risk of exposure​.</p>
<p>Overall, KELA has witnessed different cybercriminals discussing <b>Jabber, Matrix</b>, and <b>Session</b> as alternatives to Telegram, however, mostly for private messaging or private groups — while Telegram provides them with an opportunity to create open communities around illegal activity. So far only <b>Discord</b> was mentioned as a platform that can provide the same functionality, as well as <b>Signal</b> groups.</p>
<p>Despite these initial responses, there hasn’t yet been a mass exodus of cybercriminals from Telegram. However, these discussions signal potential future movement as groups and individuals weigh their options in response to the platform’s shift.</p>
<h4><b>Will Telegram’s Policy Shift Impact Criminal Activity?</b></h4>
<p>It is yet unclear if this policy change has the potential to significantly disrupt criminal activity on Telegram and drive them to Discord or other platforms. While cybercriminals are definitely expressing their concerns on the matter, their operations on Telegram are just too scaled to be shifted to another platform right away.</p>
<p>For example, infostealers’ operations use Telegram not only to sell and share harvested data through “clouds of logs”. Read more in our blog: <a href="https://www.kelacyber.com/blog/telegram-clouds-of-logs-the-fastest-gateway-to-your-network/">Telegram Clouds of Logs – the fastest gateway to your network</a>. Commodity infostealers provoked the emergence of cybercriminal gangs and teams working together to infect as many people as possible. To coordinate their activities, many use Telegram, creating all types of tools: channels for hiring new traffers and advertising the team, public and private chats for coordinating activities and discussions, and Telegram bots for automating tasks, payments and more. Such behavior is common among many malware-as-a-service operations, as well as hacktivists and other cybercriminals.</p>
<p>Moreover, Telegram’s new dedicated team of moderators, leveraging AI, is stepping up efforts to monitor and remove illegal content from its search features. This heightened focus on moderation could make it more difficult for cybercriminals to operate openly on the platform​. However, many of them are used to deal with such barriers. As seen with groups like <b>UserSec</b>, some may attempt to exploit loopholes or develop strategies to continue their operations despite these new challenges. KELA is aware of cybercriminals maintaining backup Telegram channels for a while now; usually, once their main channel is banned, they will switch to another one, which was proactively advertised to their followers.</p>
<figure id="attachment_28778" class="wp-caption aligncenter" aria-describedby="caption-attachment-28778"><img decoding="async" class="wp-image-28778 size-medium entered lazyloaded" src="https://www.kelacyber.com/wp-content/uploads/2024/09/Telegram-Picture2-300x211.png" sizes="(max-width: 300px) 100vw, 300px" srcset="https://www.kelacyber.com/wp-content/uploads/2024/09/Telegram-Picture2-300x211.png 300w, https://www.kelacyber.com/wp-content/uploads/2024/09/Telegram-Picture2-450x316.png 450w, https://www.kelacyber.com/wp-content/uploads/2024/09/Telegram-Picture2.png 518w" alt="RipperSec listing their backup channel for subscribers" width="300" height="211" data-lazy-srcset="https://www.kelacyber.com/wp-content/uploads/2024/09/Telegram-Picture2-300x211.png 300w, https://www.kelacyber.com/wp-content/uploads/2024/09/Telegram-Picture2-450x316.png 450w, https://www.kelacyber.com/wp-content/uploads/2024/09/Telegram-Picture2.png 518w" data-lazy-sizes="(max-width: 300px) 100vw, 300px" data-lazy-src="https://www.kelacyber.com/wp-content/uploads/2024/09/Telegram-Picture2-300x211.png" data-ll-status="loaded" /><figcaption id="caption-attachment-28778" class="wp-caption-text">RipperSec listing their backup channel for subscribers</figcaption></figure>
<p>The policy shift won’t eliminate cybercrime on Telegram, but it’s likely to change how threat actors operate in the short and long term.</p>
<h4><b>What This Means for Threat Intelligence: Insights from KELA</b></h4>
<p>For companies like KELA, these changes present both challenges and opportunities. While some cybercriminals may move to other platforms, KELA’s unmatched coverage ensures we continue to track and monitor activity across a wide range of forums and messaging apps. It’s not just about knowing the right sources — it’s about gaining access to these underground communities. KELA’s combination of human expertise and advanced technology provides unique access to forums and channels that are often hidden from other intelligence providers.</p>
<p>This constant vigilance allows us to stay ahead of emerging trends, tracking where threat actors are moving and how they are attempting to evade detection. By adapting quickly to shifts in the cybercrime landscape, KELA ensures our clients receive actionable insights, helping them to stay proactive in their defense strategies, even as platforms like Telegram evolve.</p>
<p>&nbsp;</p>
<h4><b>Conclusion: The Future of Telegram and Cybercrime</b></h4>
<p>Telegram’s recent policy shift is a clear response to mounting legal pressure and a broader need to curb the platform’s use for illegal activities. While the new rules may drive some criminals to more secure platforms, Telegram’s 900 million active users mean it will likely remain a key player in the cybercrime ecosystem for the time being</p>
<p>As these changes take hold, KELA will continue to provide critical intelligence on how threat actors are adapting to the evolving landscape, ensuring that security teams stay one step ahead of malicious activity.</p>
<p style="text-align: right;">         Nguồn: kelacyber.com</p>
</div>
<p><!-- .vgblk-rw-wrapper --></p>
<p>The post <a href="https://dibiz.vn/en/telegrams-policy-shift-how-cybercriminals-are-reacting-to-new-data-sharing-rules/">Telegram’s Policy Shift: How Cybercriminals Are Reacting to New Data Sharing Rules</a> appeared first on <a href="https://dibiz.vn/en/">Deliver Intelligence - Dibiz JSC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What is Ransomware? And Why is it Such a Big Business?</title>
		<link>https://dibiz.vn/en/what-is-ransomware-and-why-is-it-such-a-big-business/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 08 Oct 2024 07:15:19 +0000</pubDate>
				<category><![CDATA[KELA]]></category>
		<guid isPermaLink="false">https://dbiz.vn/?p=989649</guid>

					<description><![CDATA[<p>Between Q2 2023 and Q2 2024, KELA has tracked more than 5,000 victims of ransomware and extortion actors, and the numbers are only growing year-on-year. Ransomware has become a huge business, and monetization opportunities are far broader than just the ransom demand itself.  Our latest eBook takes a deep dive into the business of the...</p>
<p>The post <a href="https://dibiz.vn/en/what-is-ransomware-and-why-is-it-such-a-big-business/">What is Ransomware? And Why is it Such a Big Business?</a> appeared first on <a href="https://dibiz.vn/en/">Deliver Intelligence - Dibiz JSC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="vgblk-rw-wrapper limit-wrapper">
<div class="post_top">
<p class="text-body"><span style="color: var(--vamtam-widget-text-lighter); letter-spacing: var(--vamtam-primary-font-letter-spacing-desktop,normal); text-transform: var(--vamtam-primary-font-transform,none);">Between Q2 2023 and Q2 2024, KELA has tracked more than 5,000 victims of ransomware and extortion actors, and the numbers are only growing year-on-year. Ransomware has become a huge business, and monetization opportunities are far broader than just the ransom demand itself. </span></p>
</div>
<div class="native--content">
<p>Our latest eBook takes a deep dive into the business of the ransomware supply chain, looking at headline-grabbing attacks, key personas that leverage the cybercrime underground for financial gain, and best practices for protecting your own organization. <a href="https://www.kelacyber.com/resources/guides/the-complete-guideto-combating-ransomware/">Download the eBook here</a>, or keep reading for some choice highlights.</p>
<h4>How Does Ransomware Work?</h4>
<p>When we think of ransomware, we imagine the end game — where attackers encrypt data and demand a ransom for its return. In a double extortion attack, the threat actors threaten to leak the stolen data, and in a triple extortion attack, additional methods are used such as DDoS attacks or a spam campaign, usually intended to up the pressure.</p>
<p>&nbsp;</p>
<p>However, by the time any of these tactics become apparent to the victim, the ransomware attack is at its final stages.</p>
<p>&nbsp;</p>
<p>A ransomware attack begins long before an organization has any idea that they are under fire. First, attackers <b>gather intelligence</b> and conduct active reconnaissance, picking an organization that they believe may lead to a large pay-day. Attackers then need to <b>obtain initial access </b>to the victims’ network<b>.</b> They can do this by purchasing initial access from Initial Access Brokers (IABs) who have done the majority of the legwork, or through compromised employee accounts mostly obtained through infostealers which often infect a system via malicious links and attachments hidden in emails, social engineering, malvertising or perhaps as a result of software vulnerabilities.</p>
<p>&nbsp;</p>
<p>Once inside, attackers use<b> lateral movement</b> and privilege escalation to expand their reach, finding sensitive data or gaining control over endpoints. This puts them where they need to be for <b>data exfiltration, </b>which they can then leverage when they threaten to leak the data, or sell it on. Only then do attackers <b>deploy their ransomware</b>, encrypting files and making them inaccessible, and establish a communication channel to<b> demand a ransomware payment. </b></p>
<h4>The Evolution of Ransomware Attacks</h4>
<p>Historically, a single hacker or group might have targeted an enterprise, going through all of these steps in their own silo. However, today ransomware attacks are predominantly the work of different people with different specializations, coming together to make an attack possible through the cybercrime ecosystem.</p>
<p>&nbsp;</p>
<p>Those who have the expertise to build the malware can focus there — while others may be hired as traffers, individuals whose role it is to spread the malware far and wide, or as negotiators, who are highly-skilled in getting ransoms paid quickly. Ransomware-as-a-Service is a growing trend, and Autoshops are also more common than ever — allowing hackers to simply ‘click-to-buy’ what they need, whether that’s attack tools, initial access, or lists of credentials.</p>
<p>&nbsp;</p>
<p>The cybercrime ecosystem isn’t only used to buy things, it’s also a community of threat actors who can use it to recruit and coordinate for attacks, negotiate with victims, and share their own methodologies and support for one another.</p>
<p>&nbsp;</p>
<p>These changes have allowed ransomware efforts to scale beyond what anyone could have imagined, giving attackers many more opportunities to target organizations, and providing a greater chance of financial gain.</p>
<h4>Where Do Criminals Find Initial Access in the Cybercrime Ecosystem?</h4>
<p>&nbsp;</p>
<p>In the past year compromised valid accounts (<a href="https://attack.mitre.org/techniques/T1078/">MITRE ID: 1078</a>) and user credentials have become the <a href="https://www.ibm.com/reports/threat-intelligence">top initial access vector</a> for cyber attacks. Criminals can find<a href="https://www.kelacyber.com/from-data-leaks-to-bot-led-takeovers-understanding-leaked-credentials-vs-compromised-accounts/"> credentials and compromised accounts</a> from a combination of four main sources:</p>
<p>&nbsp;</p>
<ul>
<li aria-level="1"><b>Botnet markets:</b> These offer threat actors a list of data and logs to sift through and choose from, starting from as little as $0.50.</li>
<li aria-level="1"><b>Telegram cloud of logs:</b> By subscribing to a monthly channel, criminals can gain access to all credentials from compromised machines.</li>
<li aria-level="1"><b>ULP files: </b>These credential lists can often contain millions of plaintext credentials, which are usernames and passwords with a corresponding URL.</li>
<li aria-level="1"><b>Initial access brokers:</b> IABs directly sell remote access to a compromised organization, so criminals can step in at the final stage and launch the attack.</li>
</ul>
<h4>Identity Security Offers Proactive Defense against Ransomware</h4>
<p>Keeping a spotlight on these sources is a core part of protecting your organization against ransomware. After all, your attack surface is no longer about perimeter security — it’s about knowing what the attackers know about you. By onboarding a robust identity security platform like KELA Identity Guard, you get exactly this vantage point.</p>
<p>&nbsp;</p>
<p>KELA Identity Guard monitors illicit dark web marketplaces, cybercrime forums, and messaging and bot marketplaces, so that any compromised credentials related to organizational domains, SaaS tools and IP addresses can be intercepted in real-time. It offers a wide range of insights into infostealer and bot-related information, including threat trends, compromised service categories, and more.</p>
<p style="text-align: right;">Nguồn: kelacyber.com</p>
</div>
</div>
<p><!-- .vgblk-rw-wrapper --></p>
<p>The post <a href="https://dibiz.vn/en/what-is-ransomware-and-why-is-it-such-a-big-business/">What is Ransomware? And Why is it Such a Big Business?</a> appeared first on <a href="https://dibiz.vn/en/">Deliver Intelligence - Dibiz JSC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
