<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Threats Without Borders]]></title><description><![CDATA[
Explore the Nexus of Cyber-Financial Crime Investigation, Cybersecurity, and Tactical Cyber Threat Intelligence — All Delivered in One Dynamic Newsletter!"
]]></description><link>https://www.threatswithoutborders.com</link><image><url>https://substackcdn.com/image/fetch/$s_!lkkz!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07f3f957-f680-4ee2-b274-e8ca2ac66a24_600x600.png</url><title>Threats Without Borders</title><link>https://www.threatswithoutborders.com</link></image><generator>Substack</generator><lastBuildDate>Sat, 02 May 2026 07:14:56 GMT</lastBuildDate><atom:link href="https://www.threatswithoutborders.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Matt Dotts]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[cyficrime@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[cyficrime@substack.com]]></itunes:email><itunes:name><![CDATA[Matt Dotts]]></itunes:name></itunes:owner><itunes:author><![CDATA[Matt Dotts]]></itunes:author><googleplay:owner><![CDATA[cyficrime@substack.com]]></googleplay:owner><googleplay:email><![CDATA[cyficrime@substack.com]]></googleplay:email><googleplay:author><![CDATA[Matt Dotts]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Threats Without Borders - Issue 284]]></title><description><![CDATA[Cyber-Financial Crime Investigation Newsletter, week ending April 26, 2026]]></description><link>https://www.threatswithoutborders.com/p/threats-without-borders-issue-284</link><guid isPermaLink="false">https://www.threatswithoutborders.com/p/threats-without-borders-issue-284</guid><dc:creator><![CDATA[Matt Dotts]]></dc:creator><pubDate>Tue, 28 Apr 2026 10:30:29 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Gviy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73fe6406-6532-4aed-abf9-5fc5eb77311c_1170x2532.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I had a fun conversation this week.  </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Gviy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73fe6406-6532-4aed-abf9-5fc5eb77311c_1170x2532.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Gviy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73fe6406-6532-4aed-abf9-5fc5eb77311c_1170x2532.png 424w, https://substackcdn.com/image/fetch/$s_!Gviy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73fe6406-6532-4aed-abf9-5fc5eb77311c_1170x2532.png 848w, https://substackcdn.com/image/fetch/$s_!Gviy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73fe6406-6532-4aed-abf9-5fc5eb77311c_1170x2532.png 1272w, https://substackcdn.com/image/fetch/$s_!Gviy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73fe6406-6532-4aed-abf9-5fc5eb77311c_1170x2532.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Gviy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73fe6406-6532-4aed-abf9-5fc5eb77311c_1170x2532.png" width="1170" height="2532" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/73fe6406-6532-4aed-abf9-5fc5eb77311c_1170x2532.png&quot;,&quot;srcNoWatermark&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cbca72dd-d9b7-432e-814e-d7e09455eabc_1170x2532.png&quot;,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2532,&quot;width&quot;:1170,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:396868,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.threatswithoutborders.com/i/195475678?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcbca72dd-d9b7-432e-814e-d7e09455eabc_1170x2532.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Gviy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73fe6406-6532-4aed-abf9-5fc5eb77311c_1170x2532.png 424w, https://substackcdn.com/image/fetch/$s_!Gviy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73fe6406-6532-4aed-abf9-5fc5eb77311c_1170x2532.png 848w, https://substackcdn.com/image/fetch/$s_!Gviy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73fe6406-6532-4aed-abf9-5fc5eb77311c_1170x2532.png 1272w, https://substackcdn.com/image/fetch/$s_!Gviy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73fe6406-6532-4aed-abf9-5fc5eb77311c_1170x2532.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>It&#8217;s called a cash-flipping scam, and this version has been dressed up with an artificial-intelligence angle to make it sound sophisticated. It isn&#8217;t. But the people running it are smarter than you might think, and the way they&#8217;ve structured it creates some real challenges for victims and investigators.</p><p>The target gets an unsolicited text from a stranger promising easy money. The script goes something like this: send me $25, I&#8217;ll use my AI tool to flip it, and I&#8217;ll send you back $250. Simple, fast, and painless. Of course, the moment the money moves, the scammer either disappears or comes back asking for a little more before the payout arrives. There is no AI. There is no payout. Only fraud.</p><p>The $25 is important because the low dollar amount is not random. It&#8217;s a calculated decision. The people running these scams have figured out something that works in their favor at almost every level of the criminal justice system.</p><p>At $25, most victims are embarrassed, frustrated, and ultimately unwilling to take time out of their day to file a police report over a loss that won&#8217;t even cover their gas to get to the station. And honestly, can you blame them? </p><p>So the <strong>first filter</strong> is self-reporting; most of these never get reported at all.</p><p>The <strong>second filter</strong> is law enforcement. Even when a report is filed, no investigator opens an active investigation into a $25 fraud. The caseload doesn&#8217;t allow for it.</p><p>The <strong>third filter</strong> is the prosecutors. Even if someone handed a DA a complete, airtight case involving a $25 theft by a non-local suspect, no prosecutor would entertain charging, let alone extraditing,  a defendant over such a de minimis loss. The scammers know this. They have built their entire business model around staying below the threshold that triggers a system response.</p><p>Live on the West coast of the country and scam people on the East coast for low dollar amounts... bulletproof.</p><p>What they&#8217;re actually doing is running this scheme at volume. A hundred victims at $25 each is $2,500. A thousand victims is $25,000. The individual loss is invisible to the system, but the aggregate is very real money.</p><p>These scams almost always use peer-to-peer payment apps like Cash App, Venmo, or Zelle, and that choice is deliberate too. P2P transfers are fast, feel casual, and are extremely difficult to reverse once completed. There&#8217;s no effective dispute process, unlike with a credit card. When the money moves, it&#8217;s gone.</p><p>But these accounts don&#8217;t exist in isolation. Cash App accounts must be verified with real identity details, including name, date of birth, and Social Security number. Additionally, they are connected to a real bank account. Somewhere within this chain, there&#8217;s a real person involved. It could be the scammer themselves or a money mule, but in either case, a person is associated with a financial institution that keeps records. Law enforcement with proper legal authority can serve a search warrant on Cash App and the linked bank to access this information (Yeah, I know, don&#8217;t hold your breath). The data is available; the key question is whether pursuing it is worth the effort, and that leads me to the most crucial point.</p><p>A single $25 case will go nowhere. But if you bring a prosecutor a case showing that the same Cash App tag, the same phone number, or the same script was used against 200 victims across multiple jurisdictions, resulting in $5,000 or $50,000 in total losses, that is a different conversation entirely. </p><p>Investigators need to connect with each other early and often. When you see one of these cases, get it into IC3 at ic3.gov and the FTC at reportfraud.ftc.gov immediately and make sure your victims do too. Include the Cash App tag, the phone number, the exact wording of the message, and any transaction IDs. Then reach out laterally&#8212;to investigators in neighboring jurisdictions, to fraud units in other agencies, and to your financial crime information networks. Ask whether anyone else is seeing the same tag or the same number.</p><p>The scammer is betting that each of us will look at $25 and walk away. The way we beat that bet is by refusing to work in silos. The case that can&#8217;t be built by one investigator on one complaint can absolutely be built when ten investigators across five states are looking at the same actor. Aggregate the losses, aggregate the evidence, and suddenly the math changes for everyone.  </p><div><hr></div><h4>The News</h4><p>Tennessee joins Indiana in banning cryptocurrency ATMs.  <a href="https://www.yahoo.com/news/articles/tennessee-becomes-second-state-outlaw-204113466.html">https://www.yahoo.com/news/articles/tennessee-becomes-second-state-outlaw-204113466.html</a></p><p>Toronto Police have arrested and charged three men with 44 offenses following an investigation into the first known use of a mobile SMS blaster device in Canada. This technology mimics cellular towers to intercept phone calls and send fraudulent text messages that appear to come from trusted organizations such as banks, often directing victims to fake websites to steal personal and financial information.  The investigation, called Project Lighthouse, began last November and detected thousands of device connections and over 13 million network disruptions across the Greater Toronto Area. <br><a href="https://torontosun.com/news/local-news/toronto-cops-cybercrime-tool-sms-blaster-spam-phones">https://torontosun.com/news/local-news/toronto-cops-cybercrime-tool-sms-blaster-spam-phones</a></p><p>A man from Baltimore faces charges including wire fraud, mail fraud, aggravated identity theft, theft of government property, and making false statements. As a former Social Security Administration (SSA) customer service representative, he had access to sensitive SSA databases with personally identifiable information of benefit claimants. The indictment reveals that between February and April 2023, he planned and carried out a scheme to defraud the SSA. He fraudulently obtained Supplemental Security Income (SSI) benefits intended for others, using them for himself and his associates. He targeted claimants with mental health diagnoses, modifying their records to include bank accounts he controlled and his residential address, enabling him to divert their SSI payments. Additionally, he altered the benefit payment dates in SSA&#8217;s system, creating back payments in the claimants&#8217; names, and redirected these payments to his accounts.   <a href="https://www.justice.gov/usao-md/pr/former-social-security-administration-worker-charged-disability-funds-theft-scheme">https://www.justice.gov/usao-md/pr/former-social-security-administration-worker-charged-disability-funds-theft-scheme</a></p><p>Holy insider threat! A US special forces soldier was arrested for allegedly betting on the capture of Venezuelan President Nicol&#225;s Maduro, earning $400,000. Prosecutors claim he was involved in planning the mission and used insider information to place the bet.<a href="https://www.cnn.com/2026/04/23/politics/us-special-forces-soldier-arrested-maduro-raid-trade"> https://www.cnn.com/2026/04/23/politics/us-special-forces-soldier-arrested-maduro-raid-trade </a></p><p>It&#8217;s Spy vs. Spy. Apple has introduced a software update for iPhones and iPads to fix a serious bug that let law enforcement recover deleted or expiring messages by accessing cached notification content stored on the device for up to a month. The flaw, revealed when the FBI used forensic tools to retrieve deleted Signal messages, was caused by notifications that kept message content in the OS database even after the messages were deleted. Apple fixed this by making sure notifications marked for deletion are no longer stored unexpectedly. The update has also been applied to older iOS 18 versions to enhance user privacy.  <a href="https://techcrunch.com/2026/04/22/apple-fixes-bug-that-cops-used-to-extract-deleted-chat-messages-from-iphones/">https://techcrunch.com/2026/04/22/apple-fixes-bug-that-cops-used-to-extract-deleted-chat-messages-from-iphones/</a></p><p>Kudos to law enforcement in Pittsburgh, PA, for their successful effort. Over two days, federal, state, and local authorities collaborated in the Pittsburgh area, resulting in the seizure of nine illegal card-skimming devices. This operation potentially prevented over $9 million in fraud losses for the public. The U.S. Secret Service, in coordination with Allegheny County Police, Pittsburgh police, the state attorney general, the U.S. Postal Inspection Service, and the state inspector general, visited 272 locations on Monday and Tuesday. During these visits, they examined 883 point-of-sale terminals, 775 gas pumps, and 170 ATM terminals.  <a href="https://triblive.com/local/secret-service-led-operation-nets-9-credit-card-skimming-devices-in-pittsburgh-area/">https://triblive.com/local/secret-service-led-operation-nets-9-credit-card-skimming-devices-in-pittsburgh-area/</a></p><p>The Talos group reports that phishing has reemerged as the most commonly observed means of gaining initial access, accounting for over a third of their engagements in which initial access could be determined. Phishing has not been the top vector for initial access since Q2 2025. <a href="https://blog.talosintelligence.com/ir-trends-q1-2026/"> https://blog.talosintelligence.com/ir-trends-q1-2026/</a></p><p>ADT confirmed a data breach that resulted on the loss of customer data, including names, contact details, dates of birth, and the last four digits of Social Security numbers. ShinyHunters has claimed to possess 10 million records and threatened to leak them unless a ransom is paid. <a href="https://therecord.media/ADT-data-breach-cyberattack">https://therecord.media/ADT-data-breach-cyberattack</a></p><div><hr></div><h4>Feedback</h4><p>Send Feedback to matt(at)threatswithoutborders.com</p><div><hr></div><h4>Investigations</h4><p>The Supreme Court will hear oral arguments in <em>Chatrie v. United States</em>, a case examining the use of &#8220;geofence warrants&#8221; by law enforcement to obtain location data from tech companies like Google. The case centers on Okello Chatrie, who was convicted of bank robbery after authorities used a geofence warrant to identify his cellphone location near the crime scene. Chatrie argues that the warrant violated the Fourth Amendment by conducting a search without sufficient probable cause and that he had a reasonable expectation of privacy in his location data, which the government should not be able to access without a warrant. The government contends that Chatrie had no such privacy expectation because he voluntarily shared his location data with Google, and that the warrant was not a general search but a targeted request. <br><a href="https://www.scotusblog.com/2026/04/court-to-hear-argument-on-law-enforcements-use-of-geofence-warrants/">https://www.scotusblog.com/2026/04/court-to-hear-argument-on-law-enforcements-use-of-geofence-warrants/</a></p><p>I absolutely endorse this message:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!fQlA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fefd8c8b3-6180-4b62-93ad-92493066eb0a_1238x562.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!fQlA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fefd8c8b3-6180-4b62-93ad-92493066eb0a_1238x562.jpeg 424w, https://substackcdn.com/image/fetch/$s_!fQlA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fefd8c8b3-6180-4b62-93ad-92493066eb0a_1238x562.jpeg 848w, https://substackcdn.com/image/fetch/$s_!fQlA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fefd8c8b3-6180-4b62-93ad-92493066eb0a_1238x562.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!fQlA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fefd8c8b3-6180-4b62-93ad-92493066eb0a_1238x562.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!fQlA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fefd8c8b3-6180-4b62-93ad-92493066eb0a_1238x562.jpeg" width="1238" height="562" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/efd8c8b3-6180-4b62-93ad-92493066eb0a_1238x562.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:562,&quot;width&quot;:1238,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:147685,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.threatswithoutborders.com/i/195475678?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fefd8c8b3-6180-4b62-93ad-92493066eb0a_1238x562.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!fQlA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fefd8c8b3-6180-4b62-93ad-92493066eb0a_1238x562.jpeg 424w, https://substackcdn.com/image/fetch/$s_!fQlA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fefd8c8b3-6180-4b62-93ad-92493066eb0a_1238x562.jpeg 848w, https://substackcdn.com/image/fetch/$s_!fQlA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fefd8c8b3-6180-4b62-93ad-92493066eb0a_1238x562.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!fQlA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fefd8c8b3-6180-4b62-93ad-92493066eb0a_1238x562.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.threatswithoutborders.com/?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share Threats Without Borders&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.threatswithoutborders.com/?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share Threats Without Borders</span></a></p><div><hr></div><h4>Cool Jobs</h4><p>Manager of Security Awareness and Learning, Vanguard.  <a href="https://vanguard.wd5.myworkdayjobs.com/en-US/vanguard_external/job/Malvern-PA/Manager--Security-Awareness-and-Learning_177094">https://vanguard.wd5.myworkdayjobs.com/en-US/vanguard_external/job/Malvern-PA/Manager--Security-Awareness-and-Learning_177094</a></p><p>Lead Investigator, National Basketball League.  <a href="https://careers.nba.com/job/NBANBAUSJR000581EXTERNALENUS/Lead-Investigator">https://careers.nba.com/job/NBANBAUSJR000581EXTERNALENUS/Lead-Investigator</a></p><h4>Cool Tools</h4><p>&#8220;Upload a screenshot or photo and get clue-based location reasoning in seconds&#8221;.  Probably not.  But it&#8217;s currently free, so give it a try.  <a href="https://reverseimagelocation.com/">https://reverseimagelocation.com/</a></p><p>DorkEye is an advanced automated dorking and OSINT recon tool that leverages DuckDuckGo.  (Fantastic documentation!)  <a href="https://github.com/xPloits3c/DorkEye">https://github.com/xPloits3c/DorkEye</a></p><div><hr></div><h4>Irrelevant</h4><p>Are you an Advil person or a Tylenol person?  Acetaminophen, ibuprofen, and what doctors probably want you to know.  <a href="https://asteriskmag.com/issues/14/the-mystery-in-the-medicine-cabinet">https://asteriskmag.com/issues/14/the-mystery-in-the-medicine-cabinet</a></p><div><hr></div><h4>Sign Off</h4><p>Thanks for reading this far. Recently, Google started blocking email tracking pixels, which Substack relies on to track open rates. Many other email services have also blocked these trackers, and now Google Gmail has joined them. My open rate was already inconsistent due to these controls, and now it&#8217;s completely useless metric. I really don't know how many subscribers read the newsletter each week. So, I&#8217;ll just keep throwing it at the wall and hoping for the best.  </p><p>Matt</p><p>&#8220;THAT SHIT THAT HAPPENED YESTERDAY, HAPPENED YESTERDAY. MOVE ON.&#8221;</p><div><hr></div><p>Published every Tuesday, Threats Without Borders offers original commentary and educational pieces related to cybercrime investigations and information security topics. We also summarize and comment on news articles concerning active threat intelligence for the financial industry. The newsletter interests everyone tasked with cybersecurity or involved in preventing or investigating technology-enabled fraud, theft, or money laundering.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.threatswithoutborders.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Threats Without Borders! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Legal: I am not compensated by any entity for writing this newsletter. Obviously, anything written in this space is my own nonsensical opinions and doesn&#8217;t represent the official viewpoint of my employer or any associated organization. Blame me, not them.</p><p>cybercrime cyficrime financial fraud investigations osint aml cybersecurity </p>]]></content:encoded></item><item><title><![CDATA[Threats Without Borders - Issue 283]]></title><description><![CDATA[Cybercrime Investigation Newsletter, week ending April 19, 2026]]></description><link>https://www.threatswithoutborders.com/p/threats-without-borders-issue-283</link><guid isPermaLink="false">https://www.threatswithoutborders.com/p/threats-without-borders-issue-283</guid><dc:creator><![CDATA[Matt Dotts]]></dc:creator><pubDate>Tue, 21 Apr 2026 10:31:27 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!gnGB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec11d95e-ced3-4599-874c-6076838cd6ca_800x600.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I recently had a question about an IP address that resolved back to &#8220;iCloud Private Relay,&#8221; which is more information than is usually provided, since most of the time addresses just resolve to &#8220;Cloudflare&#8221; or &#8220;Akamai.&#8221; Unfortunately, for most investigations, this also resolves to a roadblock.</p><p>Apple introduced Private Relay as part of iCloud+, and most people think it&#8217;s Apple&#8217;s VPN service.   It isn&#8217;t a VPN. It&#8217;s more accurate to call it a dual-hop proxy. The service is designed to make sure no single entity, not even Apple, knows both who you are and what you&#8217;re looking at. Apple's inclusion in that &#8220;no single entity&#8221; part is either admirable or politically convenient, depending on your level of cynicism.</p><p>When a user browses in Safari with Private Relay enabled, their traffic takes a two-stop detour before reaching its destination. First, it hits an Apple server. Apple sees the user&#8217;s real IP address, but can&#8217;t see where they&#8217;re going because the DNS request is encrypted. The traffic is then handed off to a second relay server operated by a third-party partner like Cloudflare, Akamai, or Fastly. That server knows the destination but has no idea who the user is. The website at the end of that chain sees a generic, temporary IP address shared by potentially thousands of other users in the same general region.</p><p>Nobody has the whole picture. That&#8217;s the whole point.</p><p>Private Relay protects only Safari browsing and encrypts DNS queries on the device. </p><p>It does not protect Third-party browsers like Chrome, Edge, or Firefox.  Instagram, Facebook, email, banking apps, and most other apps on the device are also unprotected. In the absence of some additional masking technology, those will still phone home with the user&#8217;s real IP address.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Cuu0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd6e0e24-51bb-4e0d-94f5-9f3414b75d9b_898x728.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Cuu0!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd6e0e24-51bb-4e0d-94f5-9f3414b75d9b_898x728.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Cuu0!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd6e0e24-51bb-4e0d-94f5-9f3414b75d9b_898x728.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Cuu0!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd6e0e24-51bb-4e0d-94f5-9f3414b75d9b_898x728.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Cuu0!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd6e0e24-51bb-4e0d-94f5-9f3414b75d9b_898x728.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Cuu0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd6e0e24-51bb-4e0d-94f5-9f3414b75d9b_898x728.jpeg" width="898" height="728" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fd6e0e24-51bb-4e0d-94f5-9f3414b75d9b_898x728.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:728,&quot;width&quot;:898,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:108029,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.threatswithoutborders.com/i/194723683?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd6e0e24-51bb-4e0d-94f5-9f3414b75d9b_898x728.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Cuu0!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd6e0e24-51bb-4e0d-94f5-9f3414b75d9b_898x728.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Cuu0!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd6e0e24-51bb-4e0d-94f5-9f3414b75d9b_898x728.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Cuu0!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd6e0e24-51bb-4e0d-94f5-9f3414b75d9b_898x728.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Cuu0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd6e0e24-51bb-4e0d-94f5-9f3414b75d9b_898x728.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>So when trying to unmask a web browser user, our standard move -- get the IP, search warrant to the ISP, get the subscriber -- hits a wall. The destination logs a relay egress IP shared by thousands of users. The ISP can see the device was connected to Apple, but has no record of which sites were visited. And the relay partner doesn&#8217;t store the incoming Apple IP in a way that ties it to the outgoing destination. Nobody has the full picture. By design.</p><p>There are still some investigative avenues.</p><p>First, Apple publishes a list of all Private Relay egress IP ranges at https://mask-api.icloud.com/egress-ip-ranges.csv. Run any suspicious source IP against that list before spending resources on an ISP subpoena. Know what you&#8217;re dealing with upfront.</p><p>Second, Private Relay only masks the IP and DNS. Browser fingerprinting artifacts such as canvas fingerprinting, screen resolution, and installed fonts can still tie a specific Safari instance to activity across multiple sessions.</p><p>Third, look for cross-app leakage. If your subject used any other app on that same device, such as a different browser, a social media app, or any other service for communication across the Internet, those connections bypassed the relay entirely and may have logged the real IP with those respective servers.</p><p>iCloud Private Relay is a headache, a roadblock for sure, but maybe not a dead end. It breaks the attribution chain rather than eliminating it, but sometimes broken chains can still be put back together.</p><div><hr></div><h4>The News</h4><p>Microsoft explains how to prevent domain compromises through &#8220;predictive shielding&#8221;.  Predictive shielding in Microsoft Defender&#8217;s automatic attack disruption helps prevent the spread of identity-based attacks by acting before stolen credentials are fully exploited. Rather than waiting for malicious activity on an account, it detects early signs of credential exposure, such as high-confidence signals of credential theft, and proactively restricts potentially compromised accounts.  <a href="https://www.microsoft.com/en-us/security/blog/2026/04/17/domain-compromise-predictive-shielding-shut-down-lateral-movement/">https://www.microsoft.com/en-us/security/blog/2026/04/17/domain-compromise-predictive-shielding-shut-down-lateral-movement/</a></p><p>Think you won&#8217;t get bitten by a malicious insider? Cryptocurrency exchange, Kraken, is standing up to extortionists and refusing to pay their ransom demands.  Kraken experienced two extortion attempts stemming from &#8220;inappropriate&#8221; access by support team members, not external breaches. Approximately 2,000 accounts were potentially compromised.  <a href="https://www.blockhead.co/2026/04/14/kraken-refuses-extortion-demands-after-criminal-group-films-internal-systems/">https://www.blockhead.co/2026/04/14/kraken-refuses-extortion-demands-after-criminal-group-films-internal-systems/</a></p><p>I recently shared a report from another threat intel company that claimed Docusign is now the most imitated brand in phishing attacks.  Checkpoint doesn&#8217;t even list them in the top ten.  Regardless, I&#8217;m sure this list is applicable. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rRV4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8fdd743-1e24-441d-a1dc-424b750ef8f3_1878x898.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rRV4!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8fdd743-1e24-441d-a1dc-424b750ef8f3_1878x898.jpeg 424w, https://substackcdn.com/image/fetch/$s_!rRV4!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8fdd743-1e24-441d-a1dc-424b750ef8f3_1878x898.jpeg 848w, https://substackcdn.com/image/fetch/$s_!rRV4!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8fdd743-1e24-441d-a1dc-424b750ef8f3_1878x898.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!rRV4!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8fdd743-1e24-441d-a1dc-424b750ef8f3_1878x898.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rRV4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8fdd743-1e24-441d-a1dc-424b750ef8f3_1878x898.jpeg" width="1456" height="696" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f8fdd743-1e24-441d-a1dc-424b750ef8f3_1878x898.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:696,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:117080,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.threatswithoutborders.com/i/194723683?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8fdd743-1e24-441d-a1dc-424b750ef8f3_1878x898.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!rRV4!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8fdd743-1e24-441d-a1dc-424b750ef8f3_1878x898.jpeg 424w, https://substackcdn.com/image/fetch/$s_!rRV4!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8fdd743-1e24-441d-a1dc-424b750ef8f3_1878x898.jpeg 848w, https://substackcdn.com/image/fetch/$s_!rRV4!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8fdd743-1e24-441d-a1dc-424b750ef8f3_1878x898.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!rRV4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8fdd743-1e24-441d-a1dc-424b750ef8f3_1878x898.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><a href="https://blog.checkpoint.com/research/the-phishing-paradox-the-worlds-most-trusted-brands-are-cyber-criminals-entry-point-of-choice/">https://blog.checkpoint.com/research/the-phishing-paradox-the-worlds-most-trusted-brands-are-cyber-criminals-entry-point-of-choice/ </a></p><p>So, you want to be a darknet drug lord?  <a href="https://pastebin.com/raw/GrV3uYh5">https://pastebin.com/raw/GrV3uYh5</a></p><p>The TidBITS public Slack group (SlackBITS) is being closed after a social engineering attack where the attacker impersonated author Glenn Fleishman by duplicating his profile and display name, then sent a direct message to another user to trick him into installing the OSX.Odyssey infostealer malware. <a href="https://tidbits.com/2026/04/18/shutting-down-slackbits-after-impersonation-based-malware-attack/">https://tidbits.com/2026/04/18/shutting-down-slackbits-after-impersonation-based-malware-attack/</a></p><p>Wine Fraud - Yep. A 59-year-old UK citizen was sentenced to 10 years in federal prison for orchestrating a $97 million wine fraud scheme. Posing as the CFO of a fictitious company, the man and a co-conspirator deceived over 140 investors worldwide by falsely claiming to broker loans secured by high-value wine collections. In reality, the operation was a Ponzi scheme that used new investor funds to pay fake interest to earlier investors. Of the $97 million collected, only ~$14 million was returned, leaving victims with losses exceeding $83 million.  <a href="https://www.justice.gov/usao-edny/pr/united-kingdom-citizen-sentenced-10-years-prison-97-million-wine-fraud-scheme">https://www.justice.gov/usao-edny/pr/united-kingdom-citizen-sentenced-10-years-prison-97-million-wine-fraud-scheme</a></p><div><hr></div><h4>Feedback</h4><p>Send Feedback to matt(at)threatswithoutborders.com</p><div><hr></div><h4>Losing Argument</h4><p>This is for anyone who denies a connection between the rise in cryptocurrency use for fraud and the proliferation of cryptocurrency ATMs. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!EBTn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6cc40a83-c80a-4110-aa42-f0c71a063ef0_1242x714.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!EBTn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6cc40a83-c80a-4110-aa42-f0c71a063ef0_1242x714.jpeg 424w, https://substackcdn.com/image/fetch/$s_!EBTn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6cc40a83-c80a-4110-aa42-f0c71a063ef0_1242x714.jpeg 848w, https://substackcdn.com/image/fetch/$s_!EBTn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6cc40a83-c80a-4110-aa42-f0c71a063ef0_1242x714.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!EBTn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6cc40a83-c80a-4110-aa42-f0c71a063ef0_1242x714.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!EBTn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6cc40a83-c80a-4110-aa42-f0c71a063ef0_1242x714.jpeg" width="1242" height="714" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6cc40a83-c80a-4110-aa42-f0c71a063ef0_1242x714.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:714,&quot;width&quot;:1242,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:278139,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.threatswithoutborders.com/i/194723683?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6cc40a83-c80a-4110-aa42-f0c71a063ef0_1242x714.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!EBTn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6cc40a83-c80a-4110-aa42-f0c71a063ef0_1242x714.jpeg 424w, https://substackcdn.com/image/fetch/$s_!EBTn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6cc40a83-c80a-4110-aa42-f0c71a063ef0_1242x714.jpeg 848w, https://substackcdn.com/image/fetch/$s_!EBTn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6cc40a83-c80a-4110-aa42-f0c71a063ef0_1242x714.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!EBTn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6cc40a83-c80a-4110-aa42-f0c71a063ef0_1242x714.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Cryptocurrency complaints were relatively flat until the first jump in 2021.  And then it skyrockets over the next four years.  </p><p>And sure enough, the Gemini tells us there was a huge influx, or &#8220;Hyper Saturation,&#8221; of machines beginning in 2021.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ZYQC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8b45c99-2dba-41c2-a09e-8d0ba96ffc5e_1248x670.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ZYQC!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8b45c99-2dba-41c2-a09e-8d0ba96ffc5e_1248x670.jpeg 424w, https://substackcdn.com/image/fetch/$s_!ZYQC!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8b45c99-2dba-41c2-a09e-8d0ba96ffc5e_1248x670.jpeg 848w, https://substackcdn.com/image/fetch/$s_!ZYQC!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8b45c99-2dba-41c2-a09e-8d0ba96ffc5e_1248x670.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!ZYQC!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8b45c99-2dba-41c2-a09e-8d0ba96ffc5e_1248x670.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ZYQC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8b45c99-2dba-41c2-a09e-8d0ba96ffc5e_1248x670.jpeg" width="1248" height="670" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f8b45c99-2dba-41c2-a09e-8d0ba96ffc5e_1248x670.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:670,&quot;width&quot;:1248,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:114823,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.threatswithoutborders.com/i/194723683?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8b45c99-2dba-41c2-a09e-8d0ba96ffc5e_1248x670.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ZYQC!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8b45c99-2dba-41c2-a09e-8d0ba96ffc5e_1248x670.jpeg 424w, https://substackcdn.com/image/fetch/$s_!ZYQC!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8b45c99-2dba-41c2-a09e-8d0ba96ffc5e_1248x670.jpeg 848w, https://substackcdn.com/image/fetch/$s_!ZYQC!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8b45c99-2dba-41c2-a09e-8d0ba96ffc5e_1248x670.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!ZYQC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8b45c99-2dba-41c2-a09e-8d0ba96ffc5e_1248x670.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.threatswithoutborders.com/?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share Threats Without Borders&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.threatswithoutborders.com/?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share Threats Without Borders</span></a></p><div><hr></div><h4>Cool Jobs</h4><p>Director of IT Security - Denver Broncos Football Team.  h<a href="https://job-boards.greenhouse.io/denverbroncosteamllc/jobs/5191274008">ttps://job-boards.greenhouse.io/denverbroncosteamllc/jobs/5191274008</a></p><h4>Cool Tools</h4><p>Those who attended my recent talk on quickly triaging websites to determine legitimacy or attribution know that Whois has been replaced by RDAP.  The name changed, but the data remains the same.  And you might need to go back in history to find out not Who Is, but Who Was!  ARIN&#8217;s WhoWas service provides historical registration information for IP addresses and ASNs.  (Registration required)  <a href="https://www.arin.net/reference/research/whowas/">https://www.arin.net/reference/research/whowas/</a></p><div><hr></div><h4>Irrelevant</h4><p>Claude can&#8217;t use a typewriter.  College instructor turns to old school typewriters to curb the use of AI for assignments. </p><blockquote><p>&#8220;What&#8217;s the point of me reading it if it&#8217;s already correct anyway, and you didn&#8217;t write it yourself? Could you produce it without your computer?&#8221; said Phelps.</p></blockquote><p> <a href="https://sentinelcolorado.com/uncategorized/a-college-instructor-turns-to-typewriters-to-curb-ai-written-work-and-teach-life-lessons/">https://sentinelcolorado.com/uncategorized/a-college-instructor-turns-to-typewriters-to-curb-ai-written-work-and-teach-life-lessons/</a></p><div><hr></div><h4>Sign Off</h4><p>I&#8217;ve come to the realization that I&#8217;m a domain hoarder. Domain-rich but cash-poor, I guess.  Every time I think of an awesome web domain name, I purchase it, usually with the idea of starting a business someday. But that never happens, and I just keep paying the yearly domain registration fees. It&#8217;s become expensive enough that I&#8217;ve come to a reckoning. I need to give up some, but it feels like giving up on ideas.  </p><p>Oh, that&#8217;s a great name&#8230;domainhoarder.com!</p><p>Have a great week.  See you all next Tuesday.</p><p>Matt</p><div><hr></div><p>Published every Tuesday, Threats Without Borders offers original commentary and educational pieces related to cybercrime investigations and information security topics. We also summarize and comment on news articles concerning active threat intelligence for the financial industry. The newsletter interests everyone tasked with cybersecurity or involved in preventing or investigating technology-enabled fraud, theft, or money laundering.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.threatswithoutborders.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Threats Without Borders! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Legal: I am not compensated by any entity for writing this newsletter. Obviously, anything written in this space is my own nonsensical opinions and doesn&#8217;t represent the official viewpoint of my employer or any associated organization. Blame me, not them.</p><p>cybercrime cybersecurity cyficime cyber fraud investigations aml osint  </p>]]></content:encoded></item><item><title><![CDATA[Threats Without Borders - Issue 282]]></title><description><![CDATA[Cybersecurity Investigation Newsletter - week ending April 12, 2026]]></description><link>https://www.threatswithoutborders.com/p/threats-without-borders-issue-282</link><guid isPermaLink="false">https://www.threatswithoutborders.com/p/threats-without-borders-issue-282</guid><dc:creator><![CDATA[Matt Dotts]]></dc:creator><pubDate>Tue, 14 Apr 2026 11:49:41 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!gnGB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec11d95e-ced3-4599-874c-6076838cd6ca_800x600.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I generally enjoy AI tools and have found many uses for them. However, it can definitely be a joy killer.</p><p>One of my favorite yearly events is the release of the IC3 Internet Crime Report. I love diving into it to uncover insights that often go unnoticed by most. I call these insights 'nuggets,' a term familiar to regular newsletter readers. This year, things were different. The report was published on Monday afternoon, and within a few hours, I saw detailed analyses appearing on LinkedIn and X. Gary Warner, David Maimon, and a very few others in our field can craft such perfect summaries in just 90 minutes. For everyone else... It&#8217;s likely that a well-designed AI prompt played a significant role in generating many of those impressive analyses.</p><p>And that&#8217;s OK. It&#8217;s one of the things AI does best, breaking down long, complex, highly dense PDFs into something more digestible. </p><p>I&#8217;m not mad about it.  But I am selfishly disappointed.  </p><p>The proliferation of AI-generated analysis takes a little bit of the joy away from those of us who really love doing that type of work&#8230; old-school. And it renders us afterthoughts because by the time we get around to producing something worth publishing, every cybersecurity content mill has already flooded the zone with AI-created &#8220;hot-takes&#8221;.</p><p>I&#8217;m sure you&#8217;ve seen the highlights by now. But you really should take the time to actually read the report yourself.</p><p><a href="https://www.ic3.gov/AnnualReport/Reports/2025_IC3Report.pdf">https://www.ic3.gov/AnnualReport/Reports/2025_IC3Report.pdf</a></p><div><hr></div><h4>I can&#8217;t help myself&#8230; consider this nugget</h4><p>It is well known that most victims do not report their victimization and subsequent losses to any authorities, let alone the Internet Crime Complaint Center. In the 2025 report, the IC3 explicitly states that its figures only represent reports to the FBI via IC3 and do not account for other reporting channels. They also acknowledge that missing data and underreporting can result in &#8220;artificially low&#8221; loss estimates. However, they make no assumptions beyond this.</p><p>In contrast, the recent &#8220;<a href="https://www.ftc.gov/system/files/ftc_gov/pdf/P144400-OlderAdultsReportDec2025.pdf">Protecting Older Consumers 2024-2025</a>&#8221; report by the Federal Trade Commission clearly states, &#8220;we assume Sentinel includes only 2% of all losses from consumers who lost under $1,000 and 6.7% of all losses from consumers who lost $1,000 or more.&#8221;</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6G5e!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5635b5c5-11ce-47f1-8910-4c705b8fcc6a_1326x148.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6G5e!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5635b5c5-11ce-47f1-8910-4c705b8fcc6a_1326x148.jpeg 424w, https://substackcdn.com/image/fetch/$s_!6G5e!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5635b5c5-11ce-47f1-8910-4c705b8fcc6a_1326x148.jpeg 848w, https://substackcdn.com/image/fetch/$s_!6G5e!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5635b5c5-11ce-47f1-8910-4c705b8fcc6a_1326x148.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!6G5e!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5635b5c5-11ce-47f1-8910-4c705b8fcc6a_1326x148.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6G5e!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5635b5c5-11ce-47f1-8910-4c705b8fcc6a_1326x148.jpeg" width="1326" height="148" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5635b5c5-11ce-47f1-8910-4c705b8fcc6a_1326x148.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:148,&quot;width&quot;:1326,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:75162,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.threatswithoutborders.com/i/193960442?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5635b5c5-11ce-47f1-8910-4c705b8fcc6a_1326x148.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6G5e!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5635b5c5-11ce-47f1-8910-4c705b8fcc6a_1326x148.jpeg 424w, https://substackcdn.com/image/fetch/$s_!6G5e!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5635b5c5-11ce-47f1-8910-4c705b8fcc6a_1326x148.jpeg 848w, https://substackcdn.com/image/fetch/$s_!6G5e!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5635b5c5-11ce-47f1-8910-4c705b8fcc6a_1326x148.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!6G5e!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5635b5c5-11ce-47f1-8910-4c705b8fcc6a_1326x148.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>Page 28 for reference.  </p><p>So the FTC &#8220;officially&#8221; assumes its reporting rate is somewhere between 2% and 7%.</p><p>Maybe IC3 is better known, and people are more inclined to report their victimization to them because it&#8217;s a division of the FBI. But can it be that much higher? Maybe a 15% reporting rate?</p><p>The IC3 reports that the total loss from Internet-enabled fraud in 2025 is $ 20.8 billion.</p><p>Imagine if that is only 15% of the true loss. What if it&#8217;s only 2-7%?</p><div><hr></div><h4>Speaking of AI tools&#8230;</h4><p>The cybersecurity world is going through a mind melt over the release, and potential public release, of &#8220;Mythos&#8221;.  </p><p>Anthropic&#8217;s Mythos is a highly advanced AI model focused on cybersecurity, particularly on identifying and analyzing software vulnerabilities.</p><p>Mythos finds exploitable vulnerabilities in software, systems, and networks at scale.</p><p>Think of a house. Every window, door, and air vent is a vulnerability that allows unwanted people to get into the house. We use security measures such as locks, shatterproof glass, reverse hinges, and other safeguards to ensure those vulnerabilities are secure and that only authorized people can enter and exit through them. Mythos finds that one window with a finicky lock, where, if you push a specific-style butter knife between the upper and lower panes, you can just reach the lock lever and pop it. And then it explains what materials you need and provides complete instructions on how to do it.</p><p>So does this mean the end of the vulnerability researcher? Are security companies specializing in this all going to go out of business? Maybe, maybe not. It will come down to cost.</p><p>Running these AI models isn&#8217;t free. While ChatGPT can generate some AI slop for your LinkedIn Hero account at no cost, operating a system that scans a corporate network and compares it against a comprehensive bug library requires substantial computation power, which will incur significant token costs.</p><p>And someone needs to pay real money for that usage. The impact of Mythos on the cybersecurity profession will, as with everything else, come down to economics. If the machine becomes more efficient and less expensive than a human, then we&#8217;ll see movement. But I don&#8217;t see that happening in the near future.</p><p>And I think maybe just the opposite.</p><p>So, a team at Anthropic created this model. Do you really think that China, Russia, North Korea, Iran, and other well-funded nation-state cyber teams won&#8217;t swiftly develop similar capabilities?</p><p>Certainly, and cybersecurity experts will continue to be essential in patching the vulnerabilities before these nation-states and criminal groups can exploit them.</p><p>Should your child still go to college for Cybersecurity? Meh, it&#8217;s still better than Journalism, but I don&#8217;t think tools like Mythos will be the immediate downfall of the entire field.</p><div><hr></div><h4>The News</h4><p>Do you use plugins on your WordPress site?  Someone purchased 30 different plugins and planted backdoors in each.  This author argues &#8220;the WordPress plug-in market has a trust issue.&#8221;  And further claims that <em>WordPress.org has no mechanism to flag or review plugin ownership transfers. There is no &#8220;change of control&#8221; notification to users. No additional code review triggered by a new committer. The Plugins Team responded quickly once the attack was discovered. But 8 months passed between the backdoor being planted and being caught.</em> <a href="https://anchor.host/someone-bought-30-wordpress-plugins-and-planted-a-backdoor-in-all-of-them/">https://anchor.host/someone-bought-30-wordpress-plugins-and-planted-a-backdoor-in-all-of-them/</a></p><p>The Financial Crimes Enforcement Network (FinCEN) has proposed a new rule to reform how financial institutions manage their anti-money laundering (AML) and counter-terrorism financing (CFT) programs under the Bank Secrecy Act. The reform aims to shift the focus from high-volume paperwork compliance to risk-based, effective programs that actually combat illicit finance, while reducing regulatory burden on banks. Maybe, I won&#8217;t hold my breath.  <a href="https://www.fincen.gov/news/news-releases/fincen-proposes-rule-fundamentally-reform-financial-institution-programs">https://www.fincen.gov/news/news-releases/fincen-proposes-rule-fundamentally-reform-financial-institution-programs</a></p><p>The FBI successfully recovered deleted Signal messages from a suspect&#8217;s iPhone by extracting data from the device&#8217;s internal notification storage, even after the Signal app had been removed. This was possible because the defendant had not enabled Signal&#8217;s setting to hide message content from notifications, allowing the full text to be cached locally by iOS. However, Apple recently changed how iOS 26.4 validates push notification tokens, so this method may no longer work.   <a href="https://9to5mac.com/2026/04/09/fbi-used-iphone-notification-data-to-retrieve-deleted-signal-messages/">https://9to5mac.com/2026/04/09/fbi-used-iphone-notification-data-to-retrieve-deleted-signal-messages/ </a></p><p>The CIA is increasingly deploying artificial intelligence to enhance its core intelligence analysis mission. The agency has already produced its first autonomous intelligence report and plans to integrate AI &#8220;co-workers&#8221; across all of its analytic platforms within the next few years to help analysts with tasks such as drafting assessments, testing conclusions, and identifying trends. The agency claims humans will remain responsible for key decisions, but it also noted that it tested 300 AI projects last year and is working to bring AI capabilities to field officers. <a href="https://www.politico.com/news/2026/04/09/cia-ai-intelligence-analysis-00865893">https://www.politico.com/news/2026/04/09/cia-ai-intelligence-analysis-00865893</a></p><p>The first step a skilled attacker takes after gaining unauthorized access to a Microsoft 365 account is to abuse mailbox rules. Rather than deploying malware, they use native M365 features to create rules that automatically forward, hide, delete, or archive emails, enabling covert data exfiltration, suppressing security alerts, and maintaining persistence even after password changes. Proofpoint explains that these rules can be deployed in as little as 5 seconds after compromise and can be fully automated at scale via the Microsoft Graph API. <a href="https://www.proofpoint.com/us/blog/threat-insight/mailbox-rules-o365-post-exploitation-tactic-cloud-ato">https://www.proofpoint.com/us/blog/threat-insight/mailbox-rules-o365-post-exploitation-tactic-cloud-ato</a></p><p>Don&#8217;t end up on the &#8220;Sucker List&#8221;.  <a href="https://www.welivesecurity.com/en/scams/recovery-scammers-hit-when-down-avoid-second-strike/">https://www.welivesecurity.com/en/scams/recovery-scammers-hit-when-down-avoid-second-strike/</a></p><div><hr></div><h4>Feedback</h4><p>Send Feedback to matt(at)threatswithoutborders.com</p><div><hr></div><h4>Evidence</h4><p>Why screenshots fail in court.  <a href="https://lucidtruthtechnologies.com/authenticate-social-media-evidence/">https://lucidtruthtechnologies.com/authenticate-social-media-evidence/</a></p><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.threatswithoutborders.com/?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share Threats Without Borders&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.threatswithoutborders.com/?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share Threats Without Borders</span></a></p><div><hr></div><h4>Cool Jobs</h4><p>Security Operations Associate - National Football League.  <a href="https://job-boards.greenhouse.io/nflcareers/jobs/5127529008">https://job-boards.greenhouse.io/nflcareers/jobs/5127529008</a></p><p>Why MLB?  Why are you still making people work in New York City?  Ugh.  Incident Response and Intel Analyst, Major League Baseball.  <a href="https://hub.globalsportsjobs.com/vacancy/incident-response-intel-analyst-us-glap119784">https://hub.globalsportsjobs.com/vacancy/incident-response-intel-analyst-us-glap119784 </a></p><h4>Cool Tools</h4><p>2026 DIY Opt-Out Manual For Removal From Over 400 Sites.  <a href="https://github.com/thumpersecure/opt-out-manual-2026">https://github.com/thumpersecure/opt-out-manual-2026</a></p><p>Little Snitch (iykyk) but for Linux.  <a href="https://obdev.at/products/littlesnitch-linux/index.html">https://obdev.at/products/littlesnitch-linux/index.html</a></p><div><hr></div><h4>Irrelevant</h4><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!KdhA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed7a14a8-0eb5-47ee-9f00-819df36ebe84_1330x760.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!KdhA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed7a14a8-0eb5-47ee-9f00-819df36ebe84_1330x760.jpeg 424w, https://substackcdn.com/image/fetch/$s_!KdhA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed7a14a8-0eb5-47ee-9f00-819df36ebe84_1330x760.jpeg 848w, https://substackcdn.com/image/fetch/$s_!KdhA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed7a14a8-0eb5-47ee-9f00-819df36ebe84_1330x760.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!KdhA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed7a14a8-0eb5-47ee-9f00-819df36ebe84_1330x760.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!KdhA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed7a14a8-0eb5-47ee-9f00-819df36ebe84_1330x760.jpeg" width="1330" height="760" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ed7a14a8-0eb5-47ee-9f00-819df36ebe84_1330x760.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:760,&quot;width&quot;:1330,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:122816,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.threatswithoutborders.com/i/193960442?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed7a14a8-0eb5-47ee-9f00-819df36ebe84_1330x760.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!KdhA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed7a14a8-0eb5-47ee-9f00-819df36ebe84_1330x760.jpeg 424w, https://substackcdn.com/image/fetch/$s_!KdhA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed7a14a8-0eb5-47ee-9f00-819df36ebe84_1330x760.jpeg 848w, https://substackcdn.com/image/fetch/$s_!KdhA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed7a14a8-0eb5-47ee-9f00-819df36ebe84_1330x760.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!KdhA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed7a14a8-0eb5-47ee-9f00-819df36ebe84_1330x760.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h4>Sign Off</h4><p>I thought I wrote a pretty good newsletter last week, but I somehow finished the week with fewer subscribers than I started with. Tough crowd. I sincerely appreciate everyone who stays with me.</p><p>Enjoy the warmer weather! Those of you in the Midwest should stay in your storm cellars. I&#8217;ll see you all next week.  </p><p>Matt</p><p>&#8220;IT TAKES LESS TIME TO DO A THING RIGHT THAN TO EXPLAIN WHY YOU DID IT WRONG.&#8221;</p><div><hr></div><p>Published every Tuesday, Threats Without Borders offers original commentary and educational pieces related to cybercrime investigations and information security topics. We also summarize and comment on news articles concerning active threat intelligence for the financial industry. The newsletter interests everyone tasked with cybersecurity or involved in preventing or investigating technology-enabled fraud, theft, or money laundering.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.threatswithoutborders.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Threats Without Borders! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Legal: I am not compensated by any entity for writing this newsletter. Obviously, anything written in this space is my own nonsensical opinions and doesn&#8217;t represent the official viewpoint of my employer or any associated organization. Blame me, not them.</p>]]></content:encoded></item><item><title><![CDATA[Threats Without Borders - Issue 281]]></title><description><![CDATA[Cybercrime Investigation Newsletter, week ending April 5, 2026]]></description><link>https://www.threatswithoutborders.com/p/threats-without-borders-issue-281</link><guid isPermaLink="false">https://www.threatswithoutborders.com/p/threats-without-borders-issue-281</guid><dc:creator><![CDATA[Matt Dotts]]></dc:creator><pubDate>Tue, 07 Apr 2026 10:05:25 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!gnGB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec11d95e-ced3-4599-874c-6076838cd6ca_800x600.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-qyh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26c5132c-9044-4ab4-9d03-393c688aeedf_1508x440.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-qyh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26c5132c-9044-4ab4-9d03-393c688aeedf_1508x440.jpeg 424w, https://substackcdn.com/image/fetch/$s_!-qyh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26c5132c-9044-4ab4-9d03-393c688aeedf_1508x440.jpeg 848w, https://substackcdn.com/image/fetch/$s_!-qyh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26c5132c-9044-4ab4-9d03-393c688aeedf_1508x440.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!-qyh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26c5132c-9044-4ab4-9d03-393c688aeedf_1508x440.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-qyh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26c5132c-9044-4ab4-9d03-393c688aeedf_1508x440.jpeg" width="1456" height="425" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/26c5132c-9044-4ab4-9d03-393c688aeedf_1508x440.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:425,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:102396,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.threatswithoutborders.com/i/193308066?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26c5132c-9044-4ab4-9d03-393c688aeedf_1508x440.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!-qyh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26c5132c-9044-4ab4-9d03-393c688aeedf_1508x440.jpeg 424w, https://substackcdn.com/image/fetch/$s_!-qyh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26c5132c-9044-4ab4-9d03-393c688aeedf_1508x440.jpeg 848w, https://substackcdn.com/image/fetch/$s_!-qyh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26c5132c-9044-4ab4-9d03-393c688aeedf_1508x440.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!-qyh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26c5132c-9044-4ab4-9d03-393c688aeedf_1508x440.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This was a DTMF attack. And it&#8217;s so damn clever!</p><p>When you press a key on your phone&#8217;s keypad, it generates a specific pair of audio tones. This system is called DTMF, or Dual-Tone Multi-Frequency signaling. Each key, 0 through 9, along with the asterisk and pound, produces a unique combination of two tones that phone systems use to identify what was pressed. It&#8217;s the same technology that lets you &#8220;press 1 for English&#8221; or enter your account number on an automated line. But those tones are just sounds, and anyone on the call with you can hear, record, and decode them.</p><p>That&#8217;s exactly what the scammer did.</p><p>When this Redditor called the balance verification number using three-way calling with the buyer on the line, they entered the card number and PIN using their keypad. Those DTMF tones traveled directly through the call to the scammer&#8217;s end in real time. The scammer either recorded the call or used software to decode the tones as the victim pressed them, translating each beep back into the exact digits entered. Once they had the card number and PIN, they hung up, logged into the gift card issuer&#8217;s website or called the automated line themselves, and drained the balance. The entire process likely took just minutes.</p><p>The technology behind this isn&#8217;t complex. Tools for recording and decoding DTMF tones are readily available and free. However, what made this attack so effective wasn&#8217;t the technology; it was the social engineering. The scammer didn&#8217;t hack anything; they simply created a situation where the victim willingly entered the credentials while they listened. The three-way call seemed like a normal, cooperative action. A buyer wanting to verify a balance before purchasing makes complete sense. That&#8217;s exactly why it succeeded. Social engineering attacks don&#8217;t target systems; they exploit trust.</p><p><a href="https://en.wikipedia.org/wiki/DTMF_signaling">https://en.wikipedia.org/wiki/DTMF_signaling</a></p><p><a href="https://nhollmann.github.io/DTMF-Tool/">https://nhollmann.github.io/DTMF-Tool/</a></p><div><hr></div><h4>Wilmington? </h4><p>Last week, I spoke at the Delaware Fraud Working Group conference in Wilmington, Delaware. What a pleasant event! I&#8217;m disappointed I had another commitment and couldn&#8217;t spend the entire day.</p><p>The host venue at Delaware Technical Community College was fantastic&#8212;truly one of the best places I&#8217;ve spoken at. I was also pleasantly surprised by Wilmington. I&#8217;ve long written off cities like Philadelphia and New York and generally refuse to attend any event hosted there. Heavy traffic, limited parking, panhandlers, dirt, and chaos make the inconveniences and costs too high to justify the effort.  </p><p>Wilmington probably has those issues, but I didn&#8217;t experience them. The drive into the city from the West was smooth, and parking was straightforward and, best of all, free. The only problem I faced was the haze of marijuana smoke in the parking garage stairwell.  </p><p>I&#8217;m not sure whether the DFWG will host next year's event at DelTech, but if you&#8217;re within a reasonable drive, attend.</p><div><hr></div><h4>Reader Mail</h4><p><em>Matt, your take on the Darksword exploit is one of the most balanced I&#8217;ve read. You should push that to a publication with a much wider reach. It&#8217;s genuinely better than most things I&#8217;ve seen in any of the major news outlets. </em> - JohnS</p><p><em>I was an examiner with a 3 letter agency for eight years, and now I work for an incident response firm. I can&#8217;t stress enough how important it is for people to keep their devices updated. We recently had an incident in which the owner of a business was using an iPhone XR running iOS 17.7. How does that happen? It&#8217;s really that simple. Keep your devices on the most recent version, and you eliminate 99.9% of remote exploits. </em>- KS</p><p>See Issue 280 for context.</p><div><hr></div><h4>The News&#8230;</h4><p>David Maimon explains the fraud known as &#8220;Pell Running&#8221; that is crushing the American federal student loan system.  <a href="https://resources.sentilink.com/blog/inside-pell-running-the-federal-student-aid-fraud-congress-is-trying-to-stop">https://resources.sentilink.com/blog/inside-pell-running-the-federal-student-aid-fraud-congress-is-trying-to-stop</a></p><p>AI-generated deepfake audio has raised concerns about the integrity of evidence. With voice cloning tools becoming affordable and widely available, it&#8217;s now simple to produce realistic fake audio recordings of voicemails, calls, or confessions that can be used as evidence in legal proceedings, insurance claims, or business disagreements. <a href="https://www.forbes.com/sites/larsdaniel/2026/03/15/beyond-cybersecurity-deepfake-audio-is-an-evidence-crisis/">https://www.forbes.com/sites/larsdaniel/2026/03/15/beyond-cybersecurity-deepfake-audio-is-an-evidence-crisis/</a></p><p>It&#8217;s tax season and that means tax scam season. Proofpoint has identified over 100 malicious campaigns using tax-themed lures to deliver malware, Remote Monitoring &amp; Management tools, credential phishing, and fraud. <a href="https://www.proofpoint.com/us/blog/threat-insight/security-brief-tax-scams-aim-steal-funds-taxpayers">https://www.proofpoint.com/us/blog/threat-insight/security-brief-tax-scams-aim-steal-funds-taxpayers</a></p><p>A recently identified phishing-as-a-service platform is targeting C-suite executives using highly personalized, QR-code-based emails that impersonate SharePoint notifications. These emails bypass detection using techniques such as randomized HTML noise, fake email threads, and Unicode QR codes that evade image scanners. When scanned, victims are led through a multi-layered &#8220;gate&#8221; that prevents automated tools and researchers from proceeding, before being redirected to credential harvesters. More worrisome, the exploit functions within Microsoft&#8217;s authentication system, making traditional MFA ineffective as a key line of defense.  <a href="https://abnormal.ai/blog/venom-phishing-campaign-mfa-credential-theft">https://abnormal.ai/blog/venom-phishing-campaign-mfa-credential-theft</a></p><p>I currently hold two SANS/GIAC certifications and recently let a third (GSEC) expire. The exams and their preparation are quite demanding. The crucial aspect is really the preparation process itself. Although the exams are open book, spending too much time looking up answers will result in you running out of time. You will need to look up some answers quickly, and this is where the index becomes essential. Here is a good take on creating an effective index.  <a href="https://aerobytes.io/writeups/giac-indexing-guide/">https://aerobytes.io/writeups/giac-indexing-guide/</a></p><p>Two individuals have pleaded guilty in federal court in Rhode Island for their roles in a transnational fraud and money laundering scheme targeting elderly victims across the U.S. and Canada. The scheme involved fraudsters posing as representatives of financial institutions and government agencies, such as the FTC and the Federal Reserve, convincing victims that their accounts were compromised and directing them to transfer funds via wire transfers, cryptocurrency, cash, or gold bars. The scheme defrauded approximately 300 victims across 37 states, with known losses exceeding $5 million. <a href="https://www.justice.gov/usao-ri/pr/two-defendants-plead-guilty-transnational-fraud-scheme-targeting-elderly-victims">https://www.justice.gov/usao-ri/pr/two-defendants-plead-guilty-transnational-fraud-scheme-targeting-elderly-victims</a></p><p>Uno is a good boy.  <a href="https://cdapress.com/news/2026/apr/01/coffee-with-a-k9/">https://cdapress.com/news/2026/apr/01/coffee-with-a-k9/</a></p><div><hr></div><h4>DFIR</h4><p>Tsurugi Linux released update version 26.03 on iso or ova.  <a href="https://tsurugi-linux.org/downloads.php">https://tsurugi-linux.org/downloads.php</a></p><div><hr></div><h4>Cool Tools</h4><p>FTC Sentinel Fraud Dashboard.  <a href="https://public.tableau.com/app/profile/federal.trade.commission/viz/FraudReports/FraudFacts">https://public.tableau.com/app/profile/federal.trade.commission/viz/FraudReports/FraudFacts</a></p><p>Who is giving money to whom?  <a href="https://www.opensecrets.org/">https://www.opensecrets.org/</a></p><h4>Cool Job</h4><p>Card Fraud Manager, Members 1st Federal Credit Union.  <a href="https://careers.members1st.org/jobs/2682/Card%20Fraud%20Manager">https://careers.members1st.org/jobs/2682/Card%20Fraud%20Manager</a></p><p>Vice President of Consumer and Banking Fraud Strategy. JP Morgan Chase <a href="https://jpmc.fa.oraclecloud.com/hcmUI/CandidateExperience/en/sites/CX_1001/job/210699592">https://jpmc.fa.oraclecloud.com/hcmUI/CandidateExperience/en/sites/CX_1001/job/210699592</a></p><div><hr></div><h4>Irrelevant</h4><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ivhR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa064f124-1173-457e-a0ce-40df43c53d77_1340x1288.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ivhR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa064f124-1173-457e-a0ce-40df43c53d77_1340x1288.jpeg 424w, https://substackcdn.com/image/fetch/$s_!ivhR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa064f124-1173-457e-a0ce-40df43c53d77_1340x1288.jpeg 848w, https://substackcdn.com/image/fetch/$s_!ivhR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa064f124-1173-457e-a0ce-40df43c53d77_1340x1288.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!ivhR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa064f124-1173-457e-a0ce-40df43c53d77_1340x1288.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ivhR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa064f124-1173-457e-a0ce-40df43c53d77_1340x1288.jpeg" width="1340" height="1288" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a064f124-1173-457e-a0ce-40df43c53d77_1340x1288.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1288,&quot;width&quot;:1340,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:333897,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.threatswithoutborders.com/i/193308066?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa064f124-1173-457e-a0ce-40df43c53d77_1340x1288.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ivhR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa064f124-1173-457e-a0ce-40df43c53d77_1340x1288.jpeg 424w, https://substackcdn.com/image/fetch/$s_!ivhR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa064f124-1173-457e-a0ce-40df43c53d77_1340x1288.jpeg 848w, https://substackcdn.com/image/fetch/$s_!ivhR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa064f124-1173-457e-a0ce-40df43c53d77_1340x1288.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!ivhR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa064f124-1173-457e-a0ce-40df43c53d77_1340x1288.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Credit: Varun.ch</p><div><hr></div><h4>Feedback</h4><p>matt (at) threatswithoutborders.com</p><div><hr></div><h4>Sign Off</h4><p>Wow, a lot of new subscribers this week. </p><p>So, what&#8217;s this all about? See that issue number, 281&#8212;that&#8217;s how many consecutive weeks the Threats Without Borders Newsletter has been published. Yep, every Tuesday morning for five years and four months. Never a miss. What I lack in quality, substance, and style, I make up for in tenacity.  </p><p>Welcome.  And when your email provider drops the newsletter or your company decides newsletters are a time-suck and creates a &#8220;unsubscribe and delete&#8221; rule, you can always find every issue published at www.threatswithoutborders.com.</p><p>Or install the Substack app on your smartphone and ensure delivery each week.  </p><div class="install-substack-app-embed install-substack-app-embed-web" data-component-name="InstallSubstackAppToDOM"><img class="install-substack-app-embed-img" src="https://substackcdn.com/image/fetch/$s_!lkkz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07f3f957-f680-4ee2-b274-e8ca2ac66a24_600x600.png"><div class="install-substack-app-embed-text"><div class="install-substack-app-header">Get more from Matt Dotts in the Substack app</div><div class="install-substack-app-text">Available for iOS and Android</div></div><a href="https://substack.com/app/app-store-redirect?utm_campaign=app-marketing&amp;utm_content=author-post-insert&amp;utm_source=cyficrime" target="_blank" class="install-substack-app-embed-link"><button class="install-substack-app-embed-btn button primary">Get the app</button></a></div><p>Thanks for checking us out and I hope to see you all next week.  </p><p>Matt</p><p>&#8220;DON&#8217;T LET A BAD DAY MAKE YOU FEEL LIKE YOU HAVE A BAD LIFE.&#8221;</p><div><hr></div><p>Published every Tuesday, Threats Without Borders offers original commentary and educational pieces related to cybercrime investigations and information security topics. We also summarize and comment on news articles concerning active threat intelligence for the financial industry. The newsletter interests everyone tasked with cybersecurity or involved in preventing or investigating technology-enabled fraud, theft, or money laundering.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.threatswithoutborders.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Threats Without Borders! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Legal: I am not compensated by any entity for writing this newsletter. Obviously, anything written in this space is my own nonsensical opinions and doesn&#8217;t represent the official viewpoint of my employer or any associated organization. Blame me, not them.</p>]]></content:encoded></item><item><title><![CDATA[Threats Without Borders - Issue 280]]></title><description><![CDATA[Cybercrime Investigation Newsletter, week ending March 29, 2026]]></description><link>https://www.threatswithoutborders.com/p/threats-without-borders-issue-280</link><guid isPermaLink="false">https://www.threatswithoutborders.com/p/threats-without-borders-issue-280</guid><dc:creator><![CDATA[Matt Dotts]]></dc:creator><pubDate>Tue, 31 Mar 2026 10:46:52 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!gnGB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec11d95e-ced3-4599-874c-6076838cd6ca_800x600.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>A few weeks ago, I addressed a concern in this space about Apple iPhone users claiming, &#8220;Wasn&#8217;t me, my phone was hacked.&#8221; My response was straightforward: unless they are a direct target of a nation-state, the iPhone was not secretly compromised.</p><p>Well... news recently broke about an iPhone exploit called Darksword, and it has me reevaluating my stance on the issue.    </p><h4><strong>Yes, your iPhone can be hacked; no, you&#8217;re probably not interesting enough to justify the price tag.</strong></h4><p>That tension, between what&#8217;s possible and what&#8217;s probable, is getting lost in the conversation around advanced mobile exploits like DarkSword. Headlines and social media chatter tend to flatten everything into the same message: your phone is vulnerable at any time. Technically, that&#8217;s true. Practically, it&#8217;s sensational trash.</p><p>DarkSword isn&#8217;t a typical piece of malware you download or install. It&#8217;s an exploit chain, a carefully engineered sequence of vulnerabilities that allows an attacker to break into an iPhone, escalate privileges, and extract data. It&#8217;s not a virus but a master key that unlocks multiple doors in sequence. Once inside, it can deploy tools to collect messages, access apps, or monitor activity, often without leaving much evidence behind.</p><p>That kind of capability has not just been rare, but elite. Building something like this requires deep expertise, time, and significant financial investment. For years, these tools were almost exclusively in the hands of nation-states and a small number of highly specialized surveillance vendors. And because they were so valuable, they were used sparingly, against very specific, high-value targets.</p><h4>The ceiling hasn&#8217;t changed. These are still highly sophisticated, expensive, and complex attacks. But the floor has dropped.</h4><p>The challenge of developing these capabilities remains very high, but the difficulty of accessing them is decreasing. We&#8217;re observing the same trend that has occurred in other areas of cybercrime. There was a time when launching a ransomware attack required significant technical skill. Now, ransomware-as-a-service has made it much more accessible. The expertise hasn&#8217;t disappeared; it has been packaged, productized, and distributed.</p><p>Bad guys who previously could not develop an iPhone exploit chain can now sometimes access or lease that capability. This doesn&#8217;t mean &#8220;anyone&#8221; can do it, but it does expand the pool of potential attackers. It&#8217;s no longer limited to intelligence agencies and top-tier operators; it may now include smaller governments, private intelligence firms, and well-funded criminal groups. </p><p>Yes, it is now more possible for a broader range of attackers to use these tools. No, it is still not probable that they will be used against the average person.</p><p>There are a few reasons for that.</p><p><strong>First, these exploits remain costly assets.</strong> Even as access becomes more available, it&#8217;s not free or simple. Using one involves risk for the attacker. Each deployment raises the likelihood that the exploit will be discovered, analyzed, and patched. Burning a valuable capability on a random target offers little economic or operational benefit.</p><p><strong>Second, these attacks still require targeting.</strong> Even a &#8220;one-click&#8221; exploit&#8212;where a user simply taps a link&#8212;relies on getting that link in front of the right person at the right time. That involves reconnaissance, delivery methods, and often some level of social engineering. This is not spray-and-pray activity. It&#8217;s intentional.</p><p><strong>Third, and what I&#8217;ve been saying for a long time, is that there are far easier ways to compromise people.</strong></p><p>Most cybercriminals don&#8217;t need a complicated exploit chain to succeed. Phishing emails, fake login pages, password reuse, SIM swapping, and social engineering are much cheaper and easier to scale. If they aim for financial gain, these methods provide a higher return on investment. Why invest heavily in a complex iPhone exploit when a convincing text message can trick someone into giving up their credentials?</p><p>This is why, for the average iPhone user, the biggest risks remain the same as they were before: scams, phishing, weak passwords, and account takeovers. Not zero-day exploits.</p><p>But that doesn&#8217;t mean nothing has changed.</p><p><strong>The important shift is in who might now be considered &#8220;worth it.&#8221;</strong></p><p>Previously, the range of targets for these attacks was very limited. Now, it has expanded, not to include everyone, but to include more individuals than before. Those now at risk include journalists, business leaders, government workers, activists, and anyone with access to confidential information or financial assets, even if they don&#8217;t operate internationally.</p><p>Additionally, there is a risk of spillover. As these tools become more widely used, there&#8217;s an increased chance of errors&#8212;such as incorrect numbers, misidentified devices, or infrastructure that unintentionally exposes unintended users. This doesn&#8217;t suddenly make everyone a target, but it does add more unpredictability to where these capabilities might be exploited.</p><p><strong>So where does that leave the everyday iPhone user?</strong></p><p><em>The iPhone is not under constant threat from elite hackers. It is not being silently compromised at random. But it is also no longer accurate to assume that these capabilities exist only in distant, highly controlled environments.</em></p><p>Understand that advanced attacks exist. Recognize that they are becoming more accessible to a wider range of actors. But also keep in perspective that attackers are still making decisions based on cost, value, and likelihood of success. Most people simply do not present a target that justifies the use of such a tool. </p><p>And importantly, many of the protections against these advanced threats are straightforward.</p><p><strong>Keeping your iPhone updated is one of the most effective things you can do.</strong> These exploit chains rely on vulnerabilities, and once those vulnerabilities are patched, the window of opportunity closes. Delaying updates means leaving the door open longer than necessary.</p><p>Apple has also introduced built-in protections designed specifically for high-risk scenarios, such as <strong>Lockdown Mode</strong>. While not necessary for most users, it&#8217;s a powerful option for those who may be more likely to be targeted.</p><p>Yes, an iPhone can be hacked.</p><p>But what matters far more is whether it&#8217;s likely - and for most people, it still isn&#8217;t.</p><p>So in your investigations, it&#8217;s something you need to account for&#8230; but probably not.  </p><div><hr></div><h4>Speaking of Lockdown Mode</h4><p>Nearly four years after its 2022 debut, Apple&#8217;s Lockdown Mode remains undefeated by mercenary spyware, with both Apple and independent investigators such as Amnesty International confirming that no devices with the feature activated have been successfully attacked. Citizen Lab researchers have documented instances where Lockdown Mode effectively prevented Pegasus and Predator spyware attacks. <a href="https://techcrunch.com/2026/03/27/apple-says-no-one-using-lockdown-mode-has-been-hacked-with-spyware/">https://techcrunch.com/2026/03/27/apple-says-no-one-using-lockdown-mode-has-been-hacked-with-spyware/</a></p><h4>Skimming Report</h4><p>I&#8217;ll write more about this report, but I just don&#8217;t have the space today.  FICO released the report &#8220;The State of Card Skimming in the US: 2025 Year In Review&#8221;.  <a href="https://www.fico.com/blogs/state-card-skimming-us-2025-year-review">https://www.fico.com/blogs/state-card-skimming-us-2025-year-review</a></p><div><hr></div><h4>Cool Job</h4><p>Data Scientist, Predictive Fraud Intelligence - VISA.  <a href="https://jobs.smartrecruiters.com/Visa/744000117342711-data-scientist-predictive-fraud-intelligence">https://jobs.smartrecruiters.com/Visa/744000117342711-data-scientist-predictive-fraud-intelligence</a></p><p>Fraud Risk Governance Lead - Customers Bank.  <a href="https://customersbank.wd1.myworkdayjobs.com/customersbankcareers/job/Malvern-PA/Fraud-Risk-Governance-Lead_REQ-2026-851">https://customersbank.wd1.myworkdayjobs.com/customersbankcareers/job/Malvern-PA/Fraud-Risk-Governance-Lead_REQ-2026-851</a></p><h4>Cool Tool</h4><p>IRS charity search -  <a href="https://apps.irs.gov/app/eos/">https://apps.irs.gov/app/eos/</a></p><p>How charitable is a charity? Charity Navigator - <a href="https://www.charitynavigator.org/">https://www.charitynavigator.org/</a></p><p>International phone number look-up.  <a href="https://www.thisnumber.com/">https://www.thisnumber.com/</a></p><div><hr></div><h4>Irrelevant</h4><p>The U.S. Army increased its maximum enlistment age to 42. Meh, I&#8217;m still too old, but of course, I couldn't have done it at 42 either. Kudos to anyone over 40 who accepts this challenge!    <a href="https://abcnews.com/Politics/army-extends-maximum-recruitment-age-42-allowing-older/story?id=131411519">https://abcnews.com/Politics/army-extends-maximum-recruitment-age-42-allowing-older/story?id=131411519</a></p><div><hr></div><h4>Sign Off</h4><p>I had to cut the news section today due to space limitations.  It will be back next week. </p><p>Do you know what a DTMF attack is?  Or how they use it to steal the balance from gift cards?  Come back next week to learn more.</p><p>Matt</p><p>&#8220;IF YOU WAIT FOR EVERYTHING TO FALL INTO PLACE BEFORE YOU ACT, YOU WILL NEVER MOVE.&#8221;</p><div><hr></div><p>Published every Tuesday, Threats Without Borders offers original commentary and educational pieces related to cybercrime investigations and information security topics. We also summarize and comment on news articles concerning active threat intelligence for the financial industry. The newsletter interests everyone tasked with cybersecurity or involved in preventing or investigating technology-enabled fraud, theft, or money laundering.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.threatswithoutborders.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Threats Without Borders! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Legal: I am not compensated by any entity for writing this newsletter. Obviously, anything written in this space is my own nonsensical opinions and doesn&#8217;t represent the official viewpoint of my employer or any associated organization. Blame me, not them.</p>]]></content:encoded></item><item><title><![CDATA[Threats Without Borders - Issue 279]]></title><description><![CDATA[Cybercrime Investigation Newsletter, Week ending March 22, 2026]]></description><link>https://www.threatswithoutborders.com/p/threats-without-borders-issue-279</link><guid isPermaLink="false">https://www.threatswithoutborders.com/p/threats-without-borders-issue-279</guid><dc:creator><![CDATA[Matt Dotts]]></dc:creator><pubDate>Tue, 24 Mar 2026 11:20:09 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!gnGB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec11d95e-ced3-4599-874c-6076838cd6ca_800x600.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>So many times when we think of &#8220;cybercrime&#8221; or crime facilitated through the use of technology and the Internet, we think of the usual suspects - network intrusions with data theft, ransomware, DDOS attacks, investment and romance scams, email phishing&#8230; or any of the other crimes detailed in the Internet Crime Complaint Center&#8217;s yearly report.  </p><p>Rarely do we ever think of music fraud.  And certainly not music fraud involving AI-created music and a massive botnet that generates millions of &#8220;listens&#8221; across a dozen streaming services.</p><p>A North Carolina man has admitted guilt in a widespread music streaming fraud that occurred from 2017 to 2024. He used AI-generated songs and up to 10,000 bot accounts simultaneously to artificially inflate streaming counts on platforms such as Spotify, Apple Music, Amazon Music, and YouTube Music, resulting in billions of fake streams. To evade detection, he used VPNs and distributed activity across hundreds of thousands of tracks. Through this operation, he generated over $8 million in royalties. </p><p>Posting AI-generated music on streaming services isn&#8217;t illegal. The crime lies in using countless zombie machines to &#8220;listen&#8221; to the music. </p><p>He exploited technology and the Internet to set up a situation where victim businesses paid him money that he didn't legitimately earn.  And 8 million dollars isn&#8217;t chump change.  </p><p>Fraud is as old as time, and most schemes are not new, but the convergence of financial crime and the Internet continually takes us into new territory and pushes the boundaries of &#8220;cybercrime&#8221;.  </p><p><a href="https://www.justice.gov/usao-sdny/pr/north-carolina-man-pleads-guilty-music-streaming-fraud-aided-artificial-intelligence-0">https://www.justice.gov/usao-sdny/pr/north-carolina-man-pleads-guilty-music-streaming-fraud-aided-artificial-intelligence-0</a></p><div><hr></div><h4>Audit PTO </h4><p>When providing fraud-prevention training to business owners and executives, I emphasize the importance of job rotation and mandated paid time off (PTO). </p><p>I often cite an investigation I was involved in where the suspect employee hadn&#8217;t taken any vacation for seven years. Although she took occasional days off around holidays, she never scheduled a full week off during that period. </p><p>She operated a sophisticated refund scheme, funneling refunds into her own accounts, and she knew that anyone who stepped into her role could uncover her fraud. Her eventual exposure came when a new accounting software flagged irregularities during a routine audit. </p><p>Over those seven years, she embezzled more than $200,000 from her employer. </p><p>This case from a Pennsylvania casino is the latest example of an insider executing a scam that could have been quickly uncovered if someone else had briefly stepped into the role. In fact, that&#8217;s precisely how she was caught: </p><blockquote><p><em>When Petrillo was on medical leave, an employee at the casino&#8217;s horse racing office assisted with the office paperwork. Police said that&#8217;s when the employee discovered the discrepancies.</em></p></blockquote><p>At least once a year, every financial role in the organization should be temporarily filled by another person for a few days. This practice not only helps prevent fraud but also enhances redundancy and recovery options. If someone refuses to take a week off, it should be forced. </p><p>An employee who refuses to use their Paid Time Off is a huge red flag&#8230; in more ways than one.</p><p>This employee stole over $700,000.  And it&#8217;s so preventable.</p><p><a href="https://www.pennlive.com/crime/2026/03/hollywood-casino-employee-accused-of-stealing-over-700k-in-fraud-scheme.html">https://www.pennlive.com/crime/2026/03/hollywood-casino-employee-accused-of-stealing-over-700k-in-fraud-scheme.html</a></p><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.threatswithoutborders.com/?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share Threats Without Borders&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.threatswithoutborders.com/?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share Threats Without Borders</span></a></p><div><hr></div><h4>The News&#8230;</h4><p>Holy... we&#8217;re smoked. Although hype for their own product, this article by Sublime Security describes a new attack that masquerades as a Zoom meeting invite but results in the recipient installing malware on their Windows PC. The extent to which the attackers go to pull this off is impressive. They even run a JavaScript-enabled Zoom meeting simulation in the browser session - complete with technical difficulties. Anyone who has ever worked at a Help Desk or in a role involving regular interaction with non-technical users knows this issue will have a significant impact on unsecured organizations that use Zoom.   <a href="https://sublime.security/blog/advanced-fake-zoom-installer-used-for-delivering-malware/">https://sublime.security/blog/advanced-fake-zoom-installer-used-for-delivering-malware/</a></p><p>Keep your iPhone updated, and these exploits will not be so bothersome. In fact, not at all.  The Google Threat Intelligence Group reports the &#8220;DarkSword&#8221; exploit for Apple iPhone devices has been adopted by multiple threat actors since November 2025. The exploit chain uses six zero-day vulnerabilities to fully compromise iOS devices running versions 18.4-18.7.  For the record, you should be on some version of iOS 26, preferably 26.3.1 (at the time of this writing).  <a href="https://cloud.google.com/blog/topics/threat-intelligence/darksword-ios-exploit-chain">https://cloud.google.com/blog/topics/threat-intelligence/darksword-ios-exploit-chain</a></p><p>SEC will vote on reducing the quarterly reporting requirement to twice a year.  <a href="https://www.reuters.com/business/finance/us-sec-preparing-eliminate-quarterly-reporting-requirement-wsj-says-2026-03-16/">https://www.reuters.com/business/finance/us-sec-preparing-eliminate-quarterly-reporting-requirement-wsj-says-2026-03-16/</a></p><p>Ok, this scam needed to be shut down, but are there actual victims here? Law enforcement authorities from 23 countries carried out *Operation Alice*, a major crackdown on a dark web network run by a 35-year-old in China. Over five years, he operated more than 373,000 fraudulent Tor domains, promoting child sexual abuse material (CSAM) and cybercrime-as-a-service (CaaS). He defrauded around 10,000 customers of over $345,000 in Bitcoin, without ever delivering the promised content. While the sites claimed to offer CSAM &#8220;packages&#8221; ranging from gigabytes to terabytes, they were entirely fake and victims were never supplied with the material.  Europol coordinated international intelligence efforts, tracked cryptocurrency transactions, and helped identify the operator, who used up to 287 servers worldwide. <a href="https://www.europol.europa.eu/media-press/newsroom/news/global-cybercrime-crackdown-over-373-000-dark-web-sites-shut-down">https://www.europol.europa.eu/media-press/newsroom/news/global-cybercrime-crackdown-over-373-000-dark-web-sites-shut-down</a></p><p>Pennsylvania Attorney General Dave Sunday announced that the leader of a criminal organization that defrauded central Pennsylvania banks and their customers of more than $3 million has been sentenced to prison and ordered to pay more than half-a-million dollars in restitution. <a href="https://www.attorneygeneral.gov/taking-action/ringleader-in-multi-million-dollar-central-pa-bank-fraud-scheme-sentenced-to-prison/">https://www.attorneygeneral.gov/taking-action/ringleader-in-multi-million-dollar-central-pa-bank-fraud-scheme-sentenced-to-prison/</a></p><p>Bank and credit union compliance software provider Marquis confirmed that a data breach discovered in August 2025 affected approximately 672,000 individuals, which is much less than the previously estimated 1.6 million. Of course, that doesn&#8217;t make it any better, just less impactful. The attackers stole sensitive personal and financial information, including names, addresses, Social Security numbers, dates of birth, and payment card numbers from dozens of the financial institutions Marquis serves. <a href="https://www.securityweek.com/marquis-data-breach-affects-672000-individuals/">https://www.securityweek.com/marquis-data-breach-affects-672000-individuals/</a></p><div><hr></div><h4>DFIR</h4><p>Andrea Fortuna introduces the DFIR Toolkit.  <a href="https://andreafortuna.org/2026/03/17/dfir-toolkit">https://andreafortuna.org/2026/03/17/dfir-toolkit</a></p><div><hr></div><h4>Cool Job</h4><p>Criminal Intelligence Analyst, Group 9.  <a href="https://groupnine.us/careers/">https://groupnine.us/careers/</a></p><h4>Cool Tool</h4><p>I was a longtime user of Evernote, but left when it was bought by Bending Spoons, and they priced it out of reality. I&#8217;ve since switched to the fantastic notes app Bear, but it's only available on Apple devices. So, for you Windows users still feeling the loss of Evernote - try Cimanote.  &#8220;<em>Cimanote is the fast, clean note-taking app for people tired of Evernote's bloat and price hikes. Sign up today &#8212; your first year is completely on us.&#8221;   </em><a href="https://cimanote.com/">https://cimanote.com/</a></p><div><hr></div><h4>Irrelevant</h4><p>More evidence that not all addictions are bad. This long-term study discovered that moderate intake of caffeinated coffee or tea was associated with an 18% lower risk of dementia and improved cognitive performance over time.  <a href="https://www.sciencedaily.com/releases/2026/03/260318033138.htm">https://www.sciencedaily.com/releases/2026/03/260318033138.htm</a></p><div><hr></div><h4>Get Learned</h4><p>SLEUTHCON is a forum for identifying and exploring cybercrime and financially-motivated threats.  Friday, June 5, 2026.  Arlington, VA and Virtual.  <a href="https://www.sleuthcon.com/">https://www.sleuthcon.com/</a></p><p>Delaware Fraud Working Group, Full-Day Fraud Prevention Summit.  Thursday, April 2, 2026.  Wilmington, DE.  <a href="https://www.eventbrite.com/e/delaware-fraud-working-group-full-day-fraud-prevention-summit-tickets-1982375409213">https://www.eventbrite.com/e/delaware-fraud-working-group-full-day-fraud-prevention-summit-tickets-1982375409213</a></p><div><hr></div><h4>Late Breaking</h4><p>If you think you need a new router, buy one now. The FCC plans to ban all foreign-made routers. While this isn&#8217;t necessarily a bad thing and will certainly benefit the American tech industry, the issue is that nearly every router is made entirely, or at least with parts from, outside the U.S. Once this rule is enforced, American manufacturers won't be able to meet the demand for a long time.  When I searched for American-made routers, the only one I found that is made entirely in the U.S. is Starlink.  Hmm.  Is that a coincidence?    <a href="https://docs.fcc.gov/public/attachments/DOC-420034A1.pdf">https://docs.fcc.gov/public/attachments/DOC-420034A1.pdf</a></p><div><hr></div><h4>Sign Off</h4><p>The best news of the week is that by Friday, the RSAC Conference will be over, and our inboxes will be free from the daily influx of emails from salespeople asking to &#8220;connect&#8221; during the event.  </p><p>Thanks again for opening another issue of the newsletter.  Cheers to sunshine and warmer weather!</p><p>Matt</p><p>&#8220;YOU WILL NEVER START ANYTHING IF YOU ALWAYS WAIT UNTIL YOU ARE FULLY READY.&#8221;</p><div><hr></div><p>Published every Tuesday, Threats Without Borders offers original commentary and educational pieces related to cybercrime investigations and information security topics. We also summarize and comment on news articles concerning active threat intelligence for the financial industry. The newsletter interests everyone tasked with cybersecurity or involved in preventing or investigating technology-enabled fraud, theft, or money laundering.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.threatswithoutborders.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Threats Without Borders! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Legal: I am not compensated by any entity for writing this newsletter. Obviously, anything written in this space is my own nonsensical opinions and doesn&#8217;t represent the official viewpoint of my employer or any associated organization. Blame me, not them.</p>]]></content:encoded></item><item><title><![CDATA[Threats Without Borders - Issue 278]]></title><description><![CDATA[Cybercrime Investigation Newsletter, week ending March 15, 2026]]></description><link>https://www.threatswithoutborders.com/p/threats-without-borders-issue-278</link><guid isPermaLink="false">https://www.threatswithoutborders.com/p/threats-without-borders-issue-278</guid><dc:creator><![CDATA[Matt Dotts]]></dc:creator><pubDate>Tue, 17 Mar 2026 11:20:24 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!AwOR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7b17363-731f-4ef4-9d3a-1794924e0af3_1268x1424.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><p>I&#8217;m old enough to remember when ATM&#8217;s arrived on the scene.  Of course, we called them &#8220;MAC Machines&#8221;.  I recall a local bank holding a contest to see who could withdraw the most money in a set amount of time to highlight the ease of use.  </p><p>I also remember the concern that such technology raised about the future of banking.  Well, the ATM didn&#8217;t replace the teller.  But as this excellent article highlights, the smartphone is.</p><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:190553382,&quot;url&quot;:&quot;https://davidoks.blog/p/why-the-atm-didnt-kill-bank-teller&quot;,&quot;publication_id&quot;:4554783,&quot;publication_name&quot;:&quot;David Oks&quot;,&quot;publication_logo_url&quot;:null,&quot;title&quot;:&quot;Why ATMs didn&#8217;t kill bank teller jobs, but the iPhone did&quot;,&quot;truncated_body_text&quot;:&quot;A few months ago, J. D. Vance, sitting vice president of the United States, gave an interview to Ross Douthat of the New York Times. During that interview, Vance and Douthat had an interesting exchange:&quot;,&quot;date&quot;:&quot;2026-03-10T22:29:42.275Z&quot;,&quot;like_count&quot;:1116,&quot;comment_count&quot;:86,&quot;bylines&quot;:[{&quot;id&quot;:2088240,&quot;name&quot;:&quot;David Oks&quot;,&quot;handle&quot;:&quot;doks&quot;,&quot;previous_name&quot;:&quot;Stylite&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/553a38f8-f363-424f-8648-742af2eacc8d_1024x1024.png&quot;,&quot;bio&quot;:&quot;Essays on economics, technology, history&quot;,&quot;profile_set_up_at&quot;:&quot;2021-04-25T15:01:09.752Z&quot;,&quot;reader_installed_at&quot;:&quot;2023-06-18T14:21:19.283Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:4646174,&quot;user_id&quot;:2088240,&quot;publication_id&quot;:4554783,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:true,&quot;publication&quot;:{&quot;id&quot;:4554783,&quot;name&quot;:&quot;David Oks&quot;,&quot;subdomain&quot;:&quot;davidoks&quot;,&quot;custom_domain&quot;:&quot;davidoks.blog&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;The world is what it is.&quot;,&quot;logo_url&quot;:null,&quot;author_id&quot;:2088240,&quot;primary_user_id&quot;:2088240,&quot;theme_var_background_pop&quot;:&quot;#FF6719&quot;,&quot;created_at&quot;:&quot;2025-03-30T23:49:08.700Z&quot;,&quot;email_from_name&quot;:&quot;David Oks&quot;,&quot;copyright&quot;:&quot;doks&quot;,&quot;founding_plan_name&quot;:&quot;Founding Member&quot;,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;enabled&quot;,&quot;language&quot;:null,&quot;explicit&quot;:false,&quot;homepage_type&quot;:&quot;newspaper&quot;,&quot;is_personal_mode&quot;:false,&quot;logo_url_wide&quot;:null}}],&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null,&quot;status&quot;:{&quot;bestsellerTier&quot;:null,&quot;subscriberTier&quot;:1,&quot;leaderboard&quot;:null,&quot;vip&quot;:false,&quot;badge&quot;:{&quot;type&quot;:&quot;subscriber&quot;,&quot;tier&quot;:1,&quot;accent_colors&quot;:null},&quot;paidPublicationIds&quot;:[1071360,159185,1063960,1198116],&quot;subscriber&quot;:null}}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:false,&quot;type&quot;:&quot;newsletter&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://davidoks.blog/p/why-the-atm-didnt-kill-bank-teller?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><span></span><span class="embedded-post-publication-name">David Oks</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Why ATMs didn&#8217;t kill bank teller jobs, but the iPhone did</div></div><div class="embedded-post-body">A few months ago, J. D. Vance, sitting vice president of the United States, gave an interview to Ross Douthat of the New York Times. During that interview, Vance and Douthat had an interesting exchange&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">2 months ago &#183; 1116 likes &#183; 86 comments &#183; David Oks</div></a></div><p>And when you combine the smartphone with an ebanking platform and the ATM, you get the perfect fraud workflow.</p><div><hr></div><h4>Proxy takedown</h4><p>Law enforcement from eight countries seized 23 servers and 34 domains, froze $3.5M in crypto, and identified more than 124,000 users. Known as &#8220;SocksEscort&#8221;, the network, powered by the AVRecon botnet, has co-opted more than 369,000 IPs since 2020.  </p><p>This service essentially took control of unsecured residential and business routers and sold access to them. This enabled an attacker to route their malicious Internet traffic through the router in a residential home or (small) business.  </p><p>Untrained investigators often assume that tracing an IP address back to an ISP subscriber indicates that a user physically on the property who connected to the Internet through the router was responsible for the activity. Poor assumption. You must consider the possibility of an infected router being used as a proxy.  </p><p><a href="https://www.justice.gov/usao-edca/pr/authorities-dismantle-global-malicious-proxy-service-deployed-malware-and-defrauded">https://www.justice.gov/usao-edca/pr/authorities-dismantle-global-malicious-proxy-service-deployed-malware-and-defrauded</a></p><p>And not by coincidence, I&#8217;m sure, the Internet Crime Complaint Center (IC3) published a document titled &#8220;Evading Residential Proxy Networks: Protecting Your Devices From Becoming a Tool for Criminals&#8221;.  <a href="https://www.ic3.gov/PSA/2026/PSA260312">https://www.ic3.gov/PSA/2026/PSA260312</a></p><div><hr></div><h4>More News&#8230;</h4><p>This executive order, signed by President Trump, outlines a U.S. government strategy to combat cybercrime, fraud, and predatory schemes targeting American citizens, particularly those orchestrated by transnational criminal organizations (TCOs), sometimes with foreign state support. It directs multiple federal agencies to review and strengthen defenses, establish a coordinated operational cell within the National Coordination Center, enhance victim support through a proposed Victims Restoration Program, and engage internationally to pressure nations that harbor these criminal groups. The order emphasizes law enforcement, diplomacy, and potential offensive actions to disrupt and dismantle these threats.  <a href="https://www.whitehouse.gov/presidential-actions/2026/03/combating-cybercrime-fraud-and-predatory-schemes-against-american-citizens/">https://www.whitehouse.gov/presidential-actions/2026/03/combating-cybercrime-fraud-and-predatory-schemes-against-american-citizens/</a></p><p>C&#8217;mon, where are the controls?  A Catholic bishop in the San Diego area resigned after being arrested and charged with embezzling $270,000 from St. Peter Chaldean Catholic Cathedral in El Cajon, California. He faces 16 felony charges, including money laundering, with prosecutors alleging he misappropriated monthly rental payments exceeding $30,000 from a church tenant. <a href="https://www.ncronline.org/news/pope-announces-resignation-us-bishop-accused-embezzling-270k-california-parish">https://www.ncronline.org/news/pope-announces-resignation-us-bishop-accused-embezzling-270k-california-parish</a></p><p>Not a good week for men of the cloth.  The head priest of Trinity Episcopal Cathedral in Pittsburgh was arrested on February 27 after being accused of stealing over $1,000 in baseball cards from a Walmart in Economy Borough. Police say he was caught leaving the store with 27 packs of baseball cards concealed on his person, and security footage allegedly showed him stealing from the same store on five separate occasions. The very reverend faces charges of receiving stolen property and retail theft.  <a href="https://abcnews.com/US/wireStory/head-priest-episcopal-church-pittsburgh-accused-stealing-baseball-130976273">https://abcnews.com/US/wireStory/head-priest-episcopal-church-pittsburgh-accused-stealing-baseball-130976273</a></p><p>Crypto traders - &#8220;Slippage&#8221; will kill you.  Or cost you 50 million dollars.  &#8220;<em>Slippage is the difference between the price a trader would expect to get in a trade and the price they receive once the transaction executes. This can happen in large orders or when liquidity is weak.&#8221;  </em><a href="https://www.theblock.co/post/393466/crypto-whale-loses-nearly-50-million-swapping-usdt-for-aave">https://www.theblock.co/post/393466/crypto-whale-loses-nearly-50-million-swapping-usdt-for-aave</a></p><p>  A ransomware negotiator working for an incident response firm has been accused by the Department of Justice of secretly collaborating with the ALPHV/BlackCat cybercrime group while helping victims negotiate ransoms. The man and two colleagues allegedly carried out at least 10 ransomware attacks and shared confidential negotiation details with criminals to increase ransom payments in exchange for a share of the proceeds, with ransoms reaching up to $26 million. <a href="https://therecord.media/ransomware-blackcat-doj-incident-responder">https://therecord.media/ransomware-blackcat-doj-incident-responder</a></p><div><hr></div><h4>Bonus</h4><p>Anthropic is doubling the usage limits for Claude during off-hours.  So do your heavy work at 2 am.  <a href="https://support.claude.com/en/articles/14063676-claude-march-2026-usage-promotion">https://support.claude.com/en/articles/14063676-claude-march-2026-usage-promotion</a></p><div><hr></div><h4>Cool Job</h4><p>Head of Digital Financial Crimes Compliance,  State Street.  <a href="https://statestreet.wd1.myworkdayjobs.com/Global/job/Boston-Massachusetts/Head-of-Digital-Financial-Crimes-Compliance--Managing-Director_R-781812">https://statestreet.wd1.myworkdayjobs.com/Global/job/Boston-Massachusetts/Head-of-Digital-Financial-Crimes-Compliance--Managing-Director_R-781812</a></p><p>Financial Crimes Investigations Specialist, DraftKings.  <a href="https://draftkings.wd1.myworkdayjobs.com/draftkings/job/Remote---US/Financial-Crimes-Investigations-Specialist_JR13845-3">https://draftkings.wd1.myworkdayjobs.com/draftkings/job/Remote---US/Financial-Crimes-Investigations-Specialist_JR13845-3</a></p><h4>Cool Tool</h4><p>Notes as easy as texting. <a href="https://prism.you/"> https://prism.you/</a></p><p>ABA Routing Number Look-up/Search.  <a href="https://routingnumber.aba.com/Search1.aspx">https://routingnumber.aba.com/Search1.aspx</a></p><div><hr></div><h4>DFIR</h4><p>The forensic value of Apple Spotlight artifacts.  <a href="https://forensafe.com/blogs/apple-spotlight.html">https://forensafe.com/blogs/apple-spotlight.html</a></p><div><hr></div><h4>Young people&#8230;</h4><p>Claude assessed itself and identified the jobs it will replace. Pivot and adapt as needed. Don&#8217;t be like the wagon wheel maker who kept making wagon wheels after seeing the automobile pass through town. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!AwOR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7b17363-731f-4ef4-9d3a-1794924e0af3_1268x1424.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!AwOR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7b17363-731f-4ef4-9d3a-1794924e0af3_1268x1424.jpeg 424w, https://substackcdn.com/image/fetch/$s_!AwOR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7b17363-731f-4ef4-9d3a-1794924e0af3_1268x1424.jpeg 848w, https://substackcdn.com/image/fetch/$s_!AwOR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7b17363-731f-4ef4-9d3a-1794924e0af3_1268x1424.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!AwOR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7b17363-731f-4ef4-9d3a-1794924e0af3_1268x1424.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!AwOR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7b17363-731f-4ef4-9d3a-1794924e0af3_1268x1424.jpeg" width="1268" height="1424" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d7b17363-731f-4ef4-9d3a-1794924e0af3_1268x1424.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1424,&quot;width&quot;:1268,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:216396,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.threatswithoutborders.com/i/191067327?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7b17363-731f-4ef4-9d3a-1794924e0af3_1268x1424.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!AwOR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7b17363-731f-4ef4-9d3a-1794924e0af3_1268x1424.jpeg 424w, https://substackcdn.com/image/fetch/$s_!AwOR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7b17363-731f-4ef4-9d3a-1794924e0af3_1268x1424.jpeg 848w, https://substackcdn.com/image/fetch/$s_!AwOR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7b17363-731f-4ef4-9d3a-1794924e0af3_1268x1424.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!AwOR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7b17363-731f-4ef4-9d3a-1794924e0af3_1268x1424.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><a href="https://www.anthropic.com/research/labor-market-impacts"> https://www.anthropic.com/research/labor-market-impacts</a></p><div><hr></div><h4>Irrelevant</h4><p>Sending employees back into the office isn&#8217;t going well.  <a href="https://thehill.com/opinion/technology/5775420-remote-first-productivity-growth/">https://thehill.com/opinion/technology/5775420-remote-first-productivity-growth/</a></p><div><hr></div><h4>Sign Off</h4><p>My good will, positive vibes, and prayers will be offered to anyone traveling this week. What a mess. Get to the airport early and bring an extra dose of patience. I try to keep politics out of the newsletter, but damn, what do we even have these people for? If our elected officials can&#8217;t agree to ensure our essential security personnel, like TSA, get paychecks, then the system is graveyard dead. They all need to go, regardless of whether they have a D or R behind their name. </p><p>Thanks, </p><p>Matt</p><p>&#8220;TRY BEING INFORMED INSTEAD OF JUST OPINIONATED.&#8221;</p><p>Published every Tuesday, Threats Without Borders offers original commentary and educational pieces related to cybercrime investigations and information security topics. We also summarize and comment on news articles concerning active threat intelligence for the financial industry. The newsletter interests everyone tasked with cybersecurity or involved in preventing or investigating technology-enabled fraud, theft, or money laundering.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.threatswithoutborders.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Threats Without Borders! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Legal: I am not compensated by any entity for writing this newsletter. Obviously, anything written in this space is my own nonsensical opinions and doesn&#8217;t represent the official viewpoint of my employer or any associated organization. Blame me, not them.</p>]]></content:encoded></item><item><title><![CDATA[Threats Without Borders - Issue 277]]></title><description><![CDATA[Cybercrime Investigation Newsletter, week ending March 8, 2028]]></description><link>https://www.threatswithoutborders.com/p/threats-without-borders-issue-277</link><guid isPermaLink="false">https://www.threatswithoutborders.com/p/threats-without-borders-issue-277</guid><dc:creator><![CDATA[Matt Dotts]]></dc:creator><pubDate>Tue, 10 Mar 2026 10:53:47 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!gnGB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec11d95e-ced3-4599-874c-6076838cd6ca_800x600.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>How to find a company&#8217;s email provider based on the domain.  </p><p>It&#8217;s a 50/50 task. If you solve it correctly on the first try, it&#8217;s straightforward. Otherwise, it can become endlessly complex, and you might never find the answer. As I began preparing this piece and designing a workflow to help with your investigations, I realized this isn&#8217;t just a simple few-paragraph reply suitable for a newsletter.</p><p>So, I&#8217;ll give you the easy option first.</p><p>The first step in identifying an organization&#8217;s email provider is to check the MX record for the domain, which stands for Mail Exchanger. This record is publicly published in the Internet&#8217;s Domain Name System for every organization that receives email, indicating the mail server responsible for accepting their incoming messages. Since it&#8217;s publicly accessible, you can look it up without contacting the organization or leaving traces of your search.</p><p>To examine it, visit MXToolbox at mxtoolbox.com, enter the organization&#8217;s domain name and perform an MX Lookup. The large majority of all business organizations use either Microsoft or Google for email. If the record includes mail.protection.outlook.com, the organization uses Microsoft 365. If it points to google.com or contains aspmx.l.google.com, they use Google Workspace. That&#8217;s your answer, and you&#8217;re done.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!RO_T!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef58e44f-88d2-4f97-9bc1-713c91690636_2140x660.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!RO_T!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef58e44f-88d2-4f97-9bc1-713c91690636_2140x660.jpeg 424w, https://substackcdn.com/image/fetch/$s_!RO_T!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef58e44f-88d2-4f97-9bc1-713c91690636_2140x660.jpeg 848w, https://substackcdn.com/image/fetch/$s_!RO_T!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef58e44f-88d2-4f97-9bc1-713c91690636_2140x660.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!RO_T!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef58e44f-88d2-4f97-9bc1-713c91690636_2140x660.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!RO_T!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef58e44f-88d2-4f97-9bc1-713c91690636_2140x660.jpeg" width="1456" height="449" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ef58e44f-88d2-4f97-9bc1-713c91690636_2140x660.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:449,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:333813,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.threatswithoutborders.com/i/190318852?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef58e44f-88d2-4f97-9bc1-713c91690636_2140x660.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!RO_T!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef58e44f-88d2-4f97-9bc1-713c91690636_2140x660.jpeg 424w, https://substackcdn.com/image/fetch/$s_!RO_T!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef58e44f-88d2-4f97-9bc1-713c91690636_2140x660.jpeg 848w, https://substackcdn.com/image/fetch/$s_!RO_T!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef58e44f-88d2-4f97-9bc1-713c91690636_2140x660.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!RO_T!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef58e44f-88d2-4f97-9bc1-713c91690636_2140x660.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Problems arise if the MX record points to a third-party security gateway instead of Microsoft or Google. Services like Mimecast, Proofpoint, and Barracuda act as intermediaries, filtering spam and malware before forwarding messages. In those cases, the MX record only reveals the gateway used, not the actual mail hosting provider. If your lookup shows hostnames like mimecast.com, pphosted.com, or barracudanetworks.com, you&#8217;ll need to investigate further.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_nIs!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9b4ebcc-3131-4af2-a85d-dce34211d42f_2138x686.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_nIs!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9b4ebcc-3131-4af2-a85d-dce34211d42f_2138x686.jpeg 424w, https://substackcdn.com/image/fetch/$s_!_nIs!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9b4ebcc-3131-4af2-a85d-dce34211d42f_2138x686.jpeg 848w, https://substackcdn.com/image/fetch/$s_!_nIs!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9b4ebcc-3131-4af2-a85d-dce34211d42f_2138x686.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!_nIs!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9b4ebcc-3131-4af2-a85d-dce34211d42f_2138x686.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_nIs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9b4ebcc-3131-4af2-a85d-dce34211d42f_2138x686.jpeg" width="1456" height="467" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e9b4ebcc-3131-4af2-a85d-dce34211d42f_2138x686.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:467,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:451650,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.threatswithoutborders.com/i/190318852?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9b4ebcc-3131-4af2-a85d-dce34211d42f_2138x686.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!_nIs!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9b4ebcc-3131-4af2-a85d-dce34211d42f_2138x686.jpeg 424w, https://substackcdn.com/image/fetch/$s_!_nIs!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9b4ebcc-3131-4af2-a85d-dce34211d42f_2138x686.jpeg 848w, https://substackcdn.com/image/fetch/$s_!_nIs!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9b4ebcc-3131-4af2-a85d-dce34211d42f_2138x686.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!_nIs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9b4ebcc-3131-4af2-a85d-dce34211d42f_2138x686.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>When a security gateway obscures the MX record, we often turn to the SPF record. SPF, or Sender Policy Framework, lists all authorized email sending services for a domain. It aims to prevent email fraud by confirming which servers are legitimate senders, helping mail systems verify message authenticity. Importantly, the list must include the actual mailbox provider; otherwise, legitimate emails could be marked as spam or blocked. This makes the SPF record especially useful during investigations.</p><p>To check it, go back to MXToolbox, click the dropdown next to the search button, and select SPF Record Lookup. Enter the same domain and run the search. Although the results may look like a string of technical text, focus on entries starting with &#8220;include:&#8221;. These indicate external services trusted to send mail for the domain. For example, include:spf.protection.outlook.com suggests Microsoft 365, while include:_spf.google.com indicates Google Workspace &#8212; regardless of the MX record.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-t5n!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ecfba5a-c697-4eef-aea5-1b1aba826f03_2128x1020.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-t5n!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ecfba5a-c697-4eef-aea5-1b1aba826f03_2128x1020.jpeg 424w, https://substackcdn.com/image/fetch/$s_!-t5n!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ecfba5a-c697-4eef-aea5-1b1aba826f03_2128x1020.jpeg 848w, https://substackcdn.com/image/fetch/$s_!-t5n!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ecfba5a-c697-4eef-aea5-1b1aba826f03_2128x1020.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!-t5n!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ecfba5a-c697-4eef-aea5-1b1aba826f03_2128x1020.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-t5n!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ecfba5a-c697-4eef-aea5-1b1aba826f03_2128x1020.jpeg" width="1456" height="698" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1ecfba5a-c697-4eef-aea5-1b1aba826f03_2128x1020.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:698,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:684631,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.threatswithoutborders.com/i/190318852?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ecfba5a-c697-4eef-aea5-1b1aba826f03_2128x1020.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!-t5n!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ecfba5a-c697-4eef-aea5-1b1aba826f03_2128x1020.jpeg 424w, https://substackcdn.com/image/fetch/$s_!-t5n!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ecfba5a-c697-4eef-aea5-1b1aba826f03_2128x1020.jpeg 848w, https://substackcdn.com/image/fetch/$s_!-t5n!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ecfba5a-c697-4eef-aea5-1b1aba826f03_2128x1020.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!-t5n!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ecfba5a-c697-4eef-aea5-1b1aba826f03_2128x1020.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>A security gateway can block incoming mail and hide its destination, but it cannot hide the outbound authorization record. The SPF record must list the real provider, and since it&#8217;s public, we can access and read it. Usually, if Phase 1 yields no results, Phase 2 might provide the answer.</p><p>The problem is when organizations obscure third-party hosting services or run their own email server.  We&#8217;ll look at some of those next week.  </p><div><hr></div><h4>The News&#8230;</h4><p>The FBI warns of a phishing scam in which criminals impersonate city and county officials to solicit fraudulent permit payments. Victims receive emails containing accurate permit information that request payment via wire transfer, peer-to-peer payment, or cryptocurrency.  <a href="https://www.ic3.gov/PSA/2026/PSA260309">https://www.ic3.gov/PSA/2026/PSA260309</a></p><p>The White House released its cybersecurity policy in the new document &#8220;President Trump&#8217;s Cyber Strategy for America." Normally, I&#8217;d respond with "Meh," since government policies, papers, and promises are pretty worthless. However, President Trump has established a pretty good track record of following through on his commitments, for better or worse. We should digest this document and prepare to work within its guidelines because it&#8217;s likely to be carried out.  <a href="https://www.whitehouse.gov/wp-content/uploads/2026/03/President-Trumps-Cyber-Strategy-for-America.pdf">https://www.whitehouse.gov/wp-content/uploads/2026/03/President-Trumps-Cyber-Strategy-for-America.pdf</a></p><p>Tycoon 2FA was a major &#8220;Phishing-as-a-Service (PhaaS)&#8221; platform that appeared in 2023 and was developed in 2024 to evade multi-factor authentication using adversary-in-the-middle attacks, capturing live session cookies to access accounts illegally. It was associated with more than 64,000 phishing incidents, affecting nearly 100,000 organizations worldwide. At its height, it accounted for approximately 62% of all phishing attempts blocked by Microsoft. In early 2026, a coordinated operation led by Europol, involving Microsoft, Intel 471, Cloudflare, Coinbase, and others, dismantled the platform&#8217;s infrastructure, seizing 330 domains and arresting the alleged ringleader.   <a href="https://www.intel471.com/blog/born-to-bypass-mfa-taking-down-tycoon-2fa">https://www.intel471.com/blog/born-to-bypass-mfa-taking-down-tycoon-2fa</a></p><p>BLUF: Keep your device updated to the most recent version of iOS.  Security researchers at Google discovered an iPhone hacking toolkit called Coruna, originally used by a government customer, that has since leaked and spread to cybercriminals. The kit can compromise iPhones running iOS 13 through 17.2.1 by chaining together 23 vulnerabilities, requiring only that a target visit a malicious website. After its initial discovery in February 2025, the same toolkit was found being used by a Russian espionage group targeting Ukrainians and later by a financially motivated hacker in China. Mobile security firm iVerify linked the tools to the U.S. government, drawing parallels to previously attributed American hacking frameworks. <a href="https://cloud.google.com/blog/topics/threat-intelligence/coruna-powerful-ios-exploit-kit">https://cloud.google.com/blog/topics/threat-intelligence/coruna-powerful-ios-exploit-kit</a></p><p>The FBI has extradited a 28-year-old Bangladeshi from Malaysia to Alaska to face charges related to an international child sexual exploitation ring. Indicted in 2022 by an Alaska federal grand jury, the man is accused of using Instagram and Snapchat to coercively obtain sexually explicit material from hundreds of minors across the U.S. and internationally. He faces multiple charges, including conspiracy to produce child pornography, child exploitation enterprise, cyberstalking, and wire fraud. If convicted, he could face 20 years to life imprisonment. Kudos to the BU, Alaska State Police, and Anchorage PD for wrapping this guy up.  <a href="https://www.justice.gov/usao-ak/pr/bangladeshi-national-make-initial-appearance-following-arrest-fbi-international">https://www.justice.gov/usao-ak/pr/bangladeshi-national-make-initial-appearance-following-arrest-fbi-international</a></p><p>Who says crime doesn&#8217;t pay?  Retail crime certainly seems to pay.  This Ohio woman defrauded Home Depot of $266,699 through 1700 fraudulent returns. She was sentenced to 180 days in jail and five years of community supervision.  Oh, and restitution, but we all know that will likely never happen.  So, a quarter of a million dollars to sit in jail for 180 days?  Some might say that&#8217;s a steal.  <a href="https://www.cleveland19.com/2026/03/05/ohio-womans-multi-state-retail-fraud-scheme-created-266699-fake-store-credit-police/">https://www.cleveland19.com/2026/03/05/ohio-womans-multi-state-retail-fraud-scheme-created-266699-fake-store-credit-police/</a></p><div><hr></div><h4>DFIR</h4><p>I once testified as an expert witness in a trial concerning the recovery of dashcam video evidence.  I removed the microSD card from the device, cloned it, and then played the mp4 file to isolate the time period of the vehicle crash.  It takes an expert to explain that process, I guess.  In this post, SalvationData goes a little deeper into the process.  <a href="https://www.salvationdata.com/product-tips/dashcam-video-recovery/">https://www.salvationdata.com/product-tips/dashcam-video-recovery/</a></p><div><hr></div><h4>Mail Call</h4><p><em>&#8220;Matt, don&#8217;t hate the player, hate the game.  Personal branding is now a professional requirement, and LinkedIn is the most efficient place to do it.&#8221;</em> - TF</p><div><hr></div><h4>Speaking of LinkedIn</h4><p>I&#8217;ve been notably resistant to freaking out about AI being used to facilitate cybercrime, noting that the old methods still work just fine. But every day I become more bullish.  </p><p>TrendAI researchers demonstrate how publicly available LinkedIn data can be rapidly weaponized into highly targeted phishing attacks using AI tools. The researchers built a proof-of-concept system that automates the collection of public LinkedIn posts and images, analyzes them for contextual insights, and generates detailed employee profiles. Using AI, the tool identifies key professional interests, creates personalized marketing emails, discovers likely email addresses, and even generates realistic phishing websites tailored to the target&#8217;s expertise&#8212;all within 30 minutes. </p><p><a href="https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/from-linkedin-to-tailored-attack-in-30-minutes-how-ai-accelerates-target-profiling-for-cybercrime">https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/from-linkedin-to-tailored-attack-in-30-minutes-how-ai-accelerates-target-profiling-for-cybercrime</a></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!3-9a!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d20f5ae-2ed7-4165-91dd-e4ecab8e2fd8_1212x430.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3-9a!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d20f5ae-2ed7-4165-91dd-e4ecab8e2fd8_1212x430.jpeg 424w, https://substackcdn.com/image/fetch/$s_!3-9a!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d20f5ae-2ed7-4165-91dd-e4ecab8e2fd8_1212x430.jpeg 848w, https://substackcdn.com/image/fetch/$s_!3-9a!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d20f5ae-2ed7-4165-91dd-e4ecab8e2fd8_1212x430.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!3-9a!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d20f5ae-2ed7-4165-91dd-e4ecab8e2fd8_1212x430.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3-9a!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d20f5ae-2ed7-4165-91dd-e4ecab8e2fd8_1212x430.jpeg" width="1212" height="430" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2d20f5ae-2ed7-4165-91dd-e4ecab8e2fd8_1212x430.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:430,&quot;width&quot;:1212,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:109097,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.threatswithoutborders.com/i/190318852?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d20f5ae-2ed7-4165-91dd-e4ecab8e2fd8_1212x430.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!3-9a!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d20f5ae-2ed7-4165-91dd-e4ecab8e2fd8_1212x430.jpeg 424w, https://substackcdn.com/image/fetch/$s_!3-9a!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d20f5ae-2ed7-4165-91dd-e4ecab8e2fd8_1212x430.jpeg 848w, https://substackcdn.com/image/fetch/$s_!3-9a!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d20f5ae-2ed7-4165-91dd-e4ecab8e2fd8_1212x430.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!3-9a!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d20f5ae-2ed7-4165-91dd-e4ecab8e2fd8_1212x430.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h4>Cool Job</h4><p>Fraud Investigator, PSECU.  <a href="https://psecu.wd12.myworkdayjobs.com/PSECU/job/Harrisburg-PA/Fraud-Investigator_JR100773">https://psecu.wd12.myworkdayjobs.com/PSECU/job/Harrisburg-PA/Fraud-Investigator_JR100773</a> </p><p>Security Investigations Manager, Anduril.  <a href="https://job-boards.greenhouse.io/andurilindustries/jobs/5051653007">https://job-boards.greenhouse.io/andurilindustries/jobs/5051653007</a></p><h4>Cool Tool</h4><p>Find Flock cameras.  <a href="https://deflock.org/">https://deflock.org/</a></p><div><hr></div><h4>Irrelevant</h4><p>System76 makes computers that run the Linux operating system and they are the publisher and maintainer of the pop_os! operating system.  I&#8217;ve used both, hardware and software.  </p><p>Colorado&#8217;s Senate Bill 26-051 and California&#8217;s Assembly Bill No. 1043 mandate that operating systems must report age brackets to app stores and websites. When someone creates an account on a computer, they are expected to be 18 or older and confirm their age, whether for themselves or their child. In reality, this regulation implies that individuals under 18 are generally not supposed to set up their own computer accounts.</p><p>The law requires technology providers to verify that all users are of legal age. While the Internet has harmful content and children need protection, it is ultimately the parents&#8217; responsibility to provide guardrails. Stop expecting technology and Internet Service Providers to act as parents.</p><p>The CEO of Colorado-based System76 offers a clearer, better-argued case for why we should probably oppose these age-verification laws.</p><p><a href="https://blog.system76.com/post/system76-on-age-verification">https://blog.system76.com/post/system76-on-age-verification</a></p><div><hr></div><h4>Sign Off</h4><p>I felt something I haven&#8217;t in a long time this week.  The warmth of the sun.  Yeah, that big yellow orange thing in the sky.  It&#8217;s still there and doing well.  And the microdose of vitamin D has given me some hope we&#8217;ll pull out of the long cold winter season.</p><p>Thanks for staying with me each week, even when the newsletter is trash.</p><p>See you all next week.</p><p>Matt</p><p>&#8220;EVERY DAY YOU WAIT IS ANOTHER DAY YOU WON&#8217;T GET BACK.&#8221;</p><div><hr></div><p>Published every Tuesday, Threats Without Borders offers original commentary and educational pieces related to cybercrime investigations and information security topics. We also summarize and comment on news articles concerning active threat intelligence for the financial industry. The newsletter interests everyone tasked with cybersecurity or involved in preventing or investigating technology-enabled fraud, theft, or money laundering.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.threatswithoutborders.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Threats Without Borders! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Legal: I am not compensated by any entity for writing this newsletter. Obviously, anything written in this space is my own nonsensical opinions and doesn&#8217;t represent the official viewpoint of my employer or any associated organization. Blame me, not them.</p>]]></content:encoded></item><item><title><![CDATA[Threats Without Borders - Issue 276]]></title><description><![CDATA[Cybersecurity Investigation Newsletter, Week ending March 1, 2026]]></description><link>https://www.threatswithoutborders.com/p/threats-without-borders-issue-276</link><guid isPermaLink="false">https://www.threatswithoutborders.com/p/threats-without-borders-issue-276</guid><dc:creator><![CDATA[Matt Dotts]]></dc:creator><pubDate>Tue, 03 Mar 2026 12:44:46 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!gnGB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec11d95e-ced3-4599-874c-6076838cd6ca_800x600.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Sometimes, I manage to get it right&#8212;recognizing trends, catching the right wave. I've been emphasizing TOAD attacks (Telephone Oriented Attack Delivery), also known as Call Back Fraud, for over two years. I've written about this attack multiple times in the newsletter and included it professionally in my security awareness trainings.  </p><p>This new report from StrongestLayer confirms that my prediction about the attack's prevalence was accurate. </p><p>TOAD is no longer an emerging tactic; it&#8217;s become one of the dominant ways attackers bypass enterprise email security.</p><p>StrongestLayer shows that more than one in four successful phishing emails now use a phone number as the payload. That means no malicious link. No malware attachment. No exploit kit. Just a callback number.</p><p>And that&#8217;s precisely why it works.</p><p>Traditional Secure Email Gateways (SEGs) are designed to scan URLs, detonate attachments, and score message content for known malicious indicators. TOAD attacks contain none of those. The &#8220;weapon&#8221; is a string of digits, indistinguishable from a legitimate business contact number. Blocking financial language plus a phone number would cripple normal accounts payable traffic. From an architectural standpoint, these attacks operate in a structural blind spot.</p><p>Understanding TOAD requires understanding its layered evasion model.</p><p>Layer One: Trusted Delivery. Messages are often sent through legitimate infrastructure such as SendGrid or other reputable platforms. Reputation filtering sees clean domains and allows delivery.</p><p>Layer Two: Anti-Scanner. Some campaigns add QR codes inside PDFs or use CAPTCHA gates. Automated sandboxes follow the link, hit a challenge page, and mark the message safe because they never reach the malicious content.</p><p>Layer Three: Channel Shift. This is the core of TOAD. The victim calls the number. The social engineering happens over the voice. Credential harvesting, remote access installation, or gift card fraud can unfold during a 20&#8211;30-minute conversation. By design, this occurs outside the email system and outside our endpoint detection tools.  </p><p>For investigators, this means the crime scene is not the inbox. It is the phone call and the subsequent cloud authentication logs. As attackers deliberately move away from malware and toward human exploitation, investigators must adapt accordingly.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!96XP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34304538-9727-4c37-a000-2ec23a4faad4_1594x1976.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!96XP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34304538-9727-4c37-a000-2ec23a4faad4_1594x1976.jpeg 424w, https://substackcdn.com/image/fetch/$s_!96XP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34304538-9727-4c37-a000-2ec23a4faad4_1594x1976.jpeg 848w, https://substackcdn.com/image/fetch/$s_!96XP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34304538-9727-4c37-a000-2ec23a4faad4_1594x1976.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!96XP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34304538-9727-4c37-a000-2ec23a4faad4_1594x1976.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!96XP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34304538-9727-4c37-a000-2ec23a4faad4_1594x1976.jpeg" width="1456" height="1805" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/34304538-9727-4c37-a000-2ec23a4faad4_1594x1976.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1805,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:700474,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.threatswithoutborders.com/i/189522013?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34304538-9727-4c37-a000-2ec23a4faad4_1594x1976.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!96XP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34304538-9727-4c37-a000-2ec23a4faad4_1594x1976.jpeg 424w, https://substackcdn.com/image/fetch/$s_!96XP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34304538-9727-4c37-a000-2ec23a4faad4_1594x1976.jpeg 848w, https://substackcdn.com/image/fetch/$s_!96XP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34304538-9727-4c37-a000-2ec23a4faad4_1594x1976.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!96XP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34304538-9727-4c37-a000-2ec23a4faad4_1594x1976.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This TOAD attack is designed to make me believe I was wrongly charged for a Geek Squad Protection plan for someone else. But if I act quickly enough, I can cancel the transaction. No links, no email addresses, just a phone number. I just need to call them!</p><p>Read the StrongestLayer report: <a href="https://cdn.prod.website-files.com/692908f21a0929f1fb06bc04/699df5313a4d214a1d53bd72_2026_Evasion_Technique_Combinations_Research_final.pdf">https://cdn.prod.website-files.com/692908f21a0929f1fb06bc04/699df5313a4d214a1d53bd72_2026_Evasion_Technique_Combinations_Research_final.pdf</a></p><div><hr></div><h4>Unlinking from LinkedIn</h4><p>I received several comments concerning my take on LinkedIn, included in last week&#8217;s issue (275).  </p><p>Sometimes I think LinkedIn has quietly evolved into professional performance art. It&#8217;s just a theater.</p><p>People spend enormous amounts of time crafting long-form posts explaining concepts to&#8230; other professionals in the exact same field. If most of your network consists of peers who do what you do, who exactly is the audience?</p><p>It can feel a bit like delivering a keynote at a firefighter convention about the dangers of smoke inhalation. Important? Absolutely. Groundbreaking? Not so much.</p><p>That doesn&#8217;t make the content wrong. But it does raise an interesting question: are we sharing insight, or signaling expertise? Are we advancing the conversation, or just making sure everyone sees us advancing it?</p><p>There&#8217;s nothing inherently wrong with visibility. Thought leadership has its place. But when all of the applause comes from people who already know the script, it&#8217;s worth asking whether we&#8217;re educating&#8230; or performing.</p><p>And there&#8217;s nothing wrong with performing&#8212;obviously, it's something I do every week, but only in the appropriate place.  </p><div><hr></div><h4>The News&#8230;</h4><p>Oklahoma man will serve 46 months in federal prison for bank fraud and money laundering. He exploited insider access at multiple financial services companies and a banking software company to steal over $588,000 from accounts at three of the financial institutions.  <a href="https://www.cutimes.com/2026/02/09/former-credit-union-employee-sentenced-in-588000-insider-fraud-case/">https://www.cutimes.com/2026/02/09/former-credit-union-employee-sentenced-in-588000-insider-fraud-case/</a></p><p>An unknown attacker exploited Anthropic&#8217;s Claude AI chatbot to breach multiple Mexican government agencies between December and January, stealing 150 gigabytes of sensitive data,  including 195 million taxpayer records, voter information, and government employee credentials. The attacker used Spanish-language prompts to instruct Claude to act as an elite hacker, finding vulnerabilities and automating data theft. Although Claude initially refused some requests, the hacker eventually &#8220;jailbroken&#8221; it by framing the attacks as legitimate penetration testing and providing a detailed playbook. <a href="https://www.siliconvalley.com/2026/02/25/hacker-used-anthropics-claude-to-steal-sensitive-mexican-data/">https://www.siliconvalley.com/2026/02/25/hacker-used-anthropics-claude-to-steal-sensitive-mexican-data/</a></p><p>The AirSnitch attack is a newly discovered Wi-Fi vulnerability that bypasses client isolation, a security feature meant to prevent direct communication between connected devices, by exploiting weaknesses at the lowest network layers. Rather than breaking encryption itself, the attack allows an attacker with access to the Wi-Fi network (or even connected infrastructure) to perform man-in-the-middle attacks, intercept unencrypted traffic, steal credentials, and manipulate data across home, office, and enterprise networks. While the vulnerability affects routers from major manufacturers like Netgear, Cisco, and D-Link, it requires more technical skill than some previous Wi-Fi attacks and can be partially mitigated through VPNs, zero-trust security models, or avoiding untrusted networks, though no complete immediate fix is currently available.  <a href="https://arstechnica.com/security/2026/02/new-airsnitch-attack-breaks-wi-fi-encryption-in-homes-offices-and-enterprises/">https://arstechnica.com/security/2026/02/new-airsnitch-attack-breaks-wi-fi-encryption-in-homes-offices-and-enterprises/</a></p><p>A new federal anti-money laundering rule, effective March 1, 2026, requires reporting of beneficial ownership details (names, addresses, SSNs) for all-cash or non-financed residential real estate purchases made by entities or trusts. The report must be filed with FinCEN within 30&#8211;60 days of closing, typically by the closing agent, and title companies may refuse to close without this info. While real estate agents aren&#8217;t directly responsible, they should inform clients. FinCEN estimates 800,000&#8211;850,000 annual transactions will be affected.  <a href="https://www.nar.realtor/magazine/real-estate-news/anti-money-laundering-rule-aimed-at-all-cash-buyers-goes-into-effect-march-1">https://www.nar.realtor/magazine/real-estate-news/anti-money-laundering-rule-aimed-at-all-cash-buyers-goes-into-effect-march-1</a></p><p>Not victim-blaming here, but how did this situation escalate to the point where you&#8217;re paying over 4 million dollars to help your daughter become a model? A photographer was charged with wire fraud and money laundering after allegedly swindling a family out of $4.6 million. Prosecutors say Coyne falsely claimed she was securing modeling gigs for the family&#8217;s daughter, but instead used the money for personal expenses such as gambling.  <a href="https://petapixel.com/2026/03/02/fbi-charge-photographer-with-4-6-million-child-modeling-fraud/">https://petapixel.com/2026/03/02/fbi-charge-photographer-with-4-6-million-child-modeling-fraud/</a></p><div><hr></div><h4>DFIR</h4><p>The forensic value of Apple Maps.  <a href="https://forensafe.com/blogs/apple-maps.html">https://forensafe.com/blogs/apple-maps.html</a></p><div><hr></div><h4>Cool Job</h4><p>Director of Security Services - Ford Motor Company.  <a href="https://efds.fa.em5.oraclecloud.com/hcmUI/CandidateExperience/en/sites/CX_1/job/59407">https://efds.fa.em5.oraclecloud.com/hcmUI/CandidateExperience/en/sites/CX_1/job/59407</a></p><h4>Cool Tool</h4><p>De-Google yourself - a complete Android-based mobile device operating system that removes all things Google.  <a href="https://e.foundation/e-os/">https://e.foundation/e-os/</a></p><div><hr></div><h4>Irrelevant</h4><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!3TqG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7d5760a-35f8-448c-b8a6-35398fb3bea1_1070x1086.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3TqG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7d5760a-35f8-448c-b8a6-35398fb3bea1_1070x1086.jpeg 424w, https://substackcdn.com/image/fetch/$s_!3TqG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7d5760a-35f8-448c-b8a6-35398fb3bea1_1070x1086.jpeg 848w, https://substackcdn.com/image/fetch/$s_!3TqG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7d5760a-35f8-448c-b8a6-35398fb3bea1_1070x1086.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!3TqG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7d5760a-35f8-448c-b8a6-35398fb3bea1_1070x1086.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3TqG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7d5760a-35f8-448c-b8a6-35398fb3bea1_1070x1086.jpeg" width="1070" height="1086" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d7d5760a-35f8-448c-b8a6-35398fb3bea1_1070x1086.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1086,&quot;width&quot;:1070,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:150610,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.threatswithoutborders.com/i/189522013?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7d5760a-35f8-448c-b8a6-35398fb3bea1_1070x1086.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!3TqG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7d5760a-35f8-448c-b8a6-35398fb3bea1_1070x1086.jpeg 424w, https://substackcdn.com/image/fetch/$s_!3TqG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7d5760a-35f8-448c-b8a6-35398fb3bea1_1070x1086.jpeg 848w, https://substackcdn.com/image/fetch/$s_!3TqG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7d5760a-35f8-448c-b8a6-35398fb3bea1_1070x1086.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!3TqG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7d5760a-35f8-448c-b8a6-35398fb3bea1_1070x1086.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h4>Sign Off</h4><p>Thanks for coming back after last week&#8217;s trash heap of a newsletter. So many typos, including the misspelling of my own domain. Well, I guess it shows that I&#8217;m actually writing the newsletter and not AI.  </p><p>So let&#8217;s try this again.  You can email me at [matt (at) threatswithoutborders.com]</p><p>Matt</p><div><hr></div><p>Published every Tuesday, Threats Without Borders offers original commentary and educational pieces related to cybercrime investigations and information security topics. We also summarize and comment on news articles concerning active threat intelligence for the financial industry. The newsletter interests everyone tasked with cybersecurity or involved in preventing or investigating technology-enabled fraud, theft, or money laundering.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.threatswithoutborders.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Threats Without Borders! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Legal: I am not compensated by any entity for writing this newsletter. Obviously, anything written in this space is my own nonsensical opinions and doesn&#8217;t represent the official viewpoint of my employer or any associated organization. Blame me, not them.</p>]]></content:encoded></item><item><title><![CDATA[Threats Without Borders - Issue 275]]></title><description><![CDATA[Cybercrime Investigation Newsletter, week ending February 22, 2026]]></description><link>https://www.threatswithoutborders.com/p/threats-without-borders-issue-275</link><guid isPermaLink="false">https://www.threatswithoutborders.com/p/threats-without-borders-issue-275</guid><dc:creator><![CDATA[Matt Dotts]]></dc:creator><pubDate>Tue, 24 Feb 2026 11:17:06 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!gnGB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec11d95e-ced3-4599-874c-6076838cd6ca_800x600.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>RSAC is coming up, and I don&#8217;t even need a calendar to realize it. The evidence is in the flood of salespeople spamming my inbox with invitations to &#8220;Meet-up at RSAC?" </p><p>It feels so pretentious&#8212;every email seems to assume, "Of course, you're attending RSAC." There's a hint of condescension, too, implying that if you're not there, you're either not among the cool kids or you're low budget.  </p><p>Well, I&#8217;m not in the cool-kids group, and I'm very low-budget.  So I&#8217;ll gladly meet you in exchange for airfare, hotel, and a conference pass.  </p><p>Otherwise, keep your spam to yourself.  </p><div><hr></div><h4>No more BSA? </h4><blockquote><p><em>At a minimum, all the thresholds for reports required under the Bank Secrecy Act should be adjusted for inflation. Congress could go further and eliminate the reporting requirements. Even better, Congress could also do away with the Bank Secrecy Act regime entirely.</em></p></blockquote><p>Interesting take from the Cato Institute.  </p><p>The authors of  &#8220;From Writs to Wires: The Surveillance State&#8217;s Long War on Privacy&#8221; explore how modern surveillance in the U.S. has evolved from colonial-era warrantless searches into an invisible digital system that &#8220;undermines constitutional privacy rights.&#8221; It alleges that government agencies exploit third-party data, weaken encryption, and use technologies such as facial recognition and financial tracking to monitor citizens.  </p><blockquote><p><em>All those records held by your bank, financial planner, and similar entities are fair game for prying eyes&#8212;as long as those eyes belong to the government.</em></p></blockquote><p>Although this article was originally aimed at privacy advocates and perhaps conspiracy theorists, those working in BSA/AML should also pay attention - but for an entirely different reason. </p><p><a href="https://www.cato.org/free-society/winter-2026/writs-wires-surveillance-states-long-war-privacy">https://www.cato.org/free-society/winter-2026/writs-wires-surveillance-states-long-war-privacy</a></p><div><hr></div><h4>Mail</h4><p><em>Thanks for linking to the study that tells my wife it&#8217;s ok for me to drink a lot of coffee.</em> -JS</p><p><em>Matt, I suspect you would be very successful if you started your own business, and you are correct, paid bank holidays are a very nice perk. </em> - K</p><p><em>This week, I attended two presentations, and both could have benefited from your advice on avoiding lengthy problem explanations. In one, a speaker spent 20 minutes describing the problem to the group, who then identified it and submitted a ticket requesting it be fixed.</em>  - JohnB (See Issue 272 for reference) </p><div><hr></div><h4>The News&#8230;</h4><p>Obviously, I support the Bureau and the Internet Crime Complaint Center (IC3), but sometimes I wonder what the point is. The information they release often feels outdated. Cybersecurity and fraud organizations share information in real time, but the analytical and content creation processes within any government agency, not just IC3, are so time-consuming that by the time the content is ready and approved, it's already old news.  Anyway, they released a &#8220;Flash&#8221; report about malware-enabled ATM jackpotting, which most of us knew about long before the flash.  <a href="https://www.ic3.gov/CSA/2026/260219.pdf">https://www.ic3.gov/CSA/2026/260219.pdf</a></p><p>A recent cyberattack campaign impersonates Google Meet invitations to spread malware. Victims receive a fake meeting invite from a newly registered domain, and clicking the &#8220;Join&#8221; button redirects them to a convincing fake Google Meet page hosted on an impersonated Microsoft Store site. They are then prompted to download a fake &#8220;update&#8221; installer (`.secretly installs the **Teramind remote monitoring tool**, allowing attackers full control over the victim&#8217;s system and transmitting device details (IP, location, OS, etc.) to the attacker via Telegram. Important warning signs include a lookalike domain with intentional typos, a sender domain less than a month old, failed DKIM authentication, and poor HTML branding&#8212;all tactics aimed at deceiving both humans and security scanners.  <a href="https://sublime.security/blog/fake-google-meet-invitation-fake-microsoft-store-real-malware-attack/">https://sublime.security/blog/fake-google-meet-invitation-fake-microsoft-store-real-malware-attack/</a></p><p>Signal launched Version 8 of its secure backups.  <a href="https://aboutsignal.com/news/signal-launches-version-8-0-with-signal-secure-backups/">https://aboutsignal.com/news/signal-launches-version-8-0-with-signal-secure-backups/</a></p><p>This guy laundered 2.3 million dollars through gift cards.  Seriously, most gift cards limit out at $500.  He purchased 460,000 gift cards?  <a href="https://cbs6albany.com/news/local/chinese-man-found-guilty-in-money-laundering-conspiracy-involving-229m-in-gift-cards-fraud-jun-wang">https://cbs6albany.com/news/local/chinese-man-found-guilty-in-money-laundering-conspiracy-involving-229m-in-gift-cards-fraud-jun-wang</a></p><p>LayerX, a cybersecurity company, identified 30 malicious Chrome extensions that mimic popular AI tools like Gemini and ChatGPT, with over 260,000 downloads. These extensions appear to provide legitimate AI chat interfaces but covertly send user data to attacker-controlled servers, capturing sensitive information such as emails, browser content, and pasted text. The threat is heightened by users' tendency to share sensitive info with AI tools and the extensions' use of hidden iframes, making detection difficult during reviews. Even after the discovery was made public, several of these malicious extensions remained available on the Chrome Web Store.  <a href="https://layerxsecurity.com/blog/aiframe-fake-ai-assistant-extensions-targeting-260000-chrome-users-via-injected-iframes/">https://layerxsecurity.com/blog/aiframe-fake-ai-assistant-extensions-targeting-260000-chrome-users-via-injected-iframes/</a></p><p>Starkiller is a sophisticated phishing-as-a-service (PhaaS) tool that bypasses traditional security measures, including MFA, by live-proxying legitimate login pages instead of mimicking them. This allows attackers to capture credentials and session tokens in real time, making detection extremely difficult since victims interact with actual websites. The tool&#8217;s user-friendly interface and automation lower the technical barrier for cybercriminals, forcing organizations to shift from static detection methods to behavioral and identity-aware monitoring.  <a href="https://www.darkreading.com/threat-intelligence/starkiller-phishing-kit-mfa">https://www.darkreading.com/threat-intelligence/starkiller-phishing-kit-mfa</a></p><div><hr></div><p>Message me:  matt (at) threatswithourborders.com</p><div><hr></div><h4>DFIR</h4><p>I haven&#8217;t used this, so please test it in a safe space first, but it is interesting, and I&#8217;ll be giving it some more attention shortly.  </p><blockquote><p><em>Fuji is a free, open-source program for performing forensic acquisition of Mac computers. It should work on any modern Intel or Apple Silicon device, as it leverages standard executables provided by macOS.  Fuji performs a so-called live acquisition (the computer must be turned on) of logical nature, i.e. it includes only existing files. The tool generates a DMG file that can be imported in several digital forensics programs.</em></p></blockquote><p><a href="https://github.com/Lazza/Fuji/releases/tag/1.2.0">https://github.com/Lazza/Fuji/releases/tag/1.2.0</a></p><div><hr></div><h4><code>Cool</code> Job</h4><p>Director of Safety and Security, Vanderbilt University.  <a href="https://ecsr.fa.us2.oraclecloud.com/hcmUI/CandidateExperience/en/sites/CX_1/job/10007897">https://ecsr.fa.us2.oraclecloud.com/hcmUI/CandidateExperience/en/sites/CX_1/job/10007897</a></p><p>Security Intelligence Operations Specialist, Tesla.  <a href="https://www.tesla.com/careers/search/job/256471">https://www.tesla.com/careers/search/job/256471</a></p><h4>Cool Tool</h4><p>Hate Apple?  Hate Google?  Graphene OS might be your huckleberry.  Tomasz Dunia created a list of currently supported mobile devices and a full tutorial on getting up and running with Graphene as the OS.  <a href="https://blog.tomaszdunia.pl/grapheneos-eng/#list-of-supported-devices-february-2026">https://blog.tomaszdunia.pl/grapheneos-eng/#list-of-supported-devices-february-2026</a></p><p><em>&#8220;Spackle is a macOS menu bar app for inline AI rewrites. Select text in any app, press a keyboard shortcut, and Spackle replaces your selection with an AI-rewritten version &#8212; right in place. You never leave the app you&#8217;re working in.  It works anywhere macOS Accessibility can reach: Mail, Notes, Slack, browser text areas, and more.&#8221;  </em><a href="https://aisatsu.co/spackle/">https://aisatsu.co/spackle/</a></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!qeOX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7549fda2-e27a-49e1-a81d-9f42371311c9_1250x338.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qeOX!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7549fda2-e27a-49e1-a81d-9f42371311c9_1250x338.jpeg 424w, https://substackcdn.com/image/fetch/$s_!qeOX!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7549fda2-e27a-49e1-a81d-9f42371311c9_1250x338.jpeg 848w, https://substackcdn.com/image/fetch/$s_!qeOX!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7549fda2-e27a-49e1-a81d-9f42371311c9_1250x338.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!qeOX!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7549fda2-e27a-49e1-a81d-9f42371311c9_1250x338.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qeOX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7549fda2-e27a-49e1-a81d-9f42371311c9_1250x338.jpeg" width="1250" height="338" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7549fda2-e27a-49e1-a81d-9f42371311c9_1250x338.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:338,&quot;width&quot;:1250,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:122326,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.threatswithoutborders.com/i/188858964?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7549fda2-e27a-49e1-a81d-9f42371311c9_1250x338.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!qeOX!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7549fda2-e27a-49e1-a81d-9f42371311c9_1250x338.jpeg 424w, https://substackcdn.com/image/fetch/$s_!qeOX!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7549fda2-e27a-49e1-a81d-9f42371311c9_1250x338.jpeg 848w, https://substackcdn.com/image/fetch/$s_!qeOX!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7549fda2-e27a-49e1-a81d-9f42371311c9_1250x338.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!qeOX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7549fda2-e27a-49e1-a81d-9f42371311c9_1250x338.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h4>Irrelevant</h4><p>Something everyone in law enforcement and counseling has known for, well, ever.</p><blockquote><p><em>Researchers found that the teens who reported using cannabis in the past year were at a higher risk of being diagnosed with several mental health conditions a few years later, compared to teens who didn&#8217;t use cannabis.</em></p><p><em>Teens who reported using cannabis had twice the risk of developing two serious mental illnesses: bipolar, which manifests as alternating episodes of depression and mania, and psychotic disorders, such as schizophrenia which involve a break with reality.</em></p></blockquote><p><a href="https://text.npr.org/nx-s1-5719338">https://text.npr.org/nx-s1-5719338</a></p><div><hr></div><h4>Sign Off</h4><p>I spent some time in Buffalo, NY, last week. I&#8217;ve discussed the city in the newsletter before, and I believe I&#8217;ve finally figured out why people choose to live there. It&#8217;s self-hate. That&#8217;s the only explanation that fits. Yes, I&#8217;ve heard it&#8217;s beautiful in the summer.  </p><p>Shout at me M&amp;T friends.  </p><p>Thanks for reading another issue.  See you all next week.</p><p>Matt</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!uz-r!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42f3568f-457f-415c-bd40-eee122414c0c_996x1126.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!uz-r!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42f3568f-457f-415c-bd40-eee122414c0c_996x1126.jpeg 424w, https://substackcdn.com/image/fetch/$s_!uz-r!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42f3568f-457f-415c-bd40-eee122414c0c_996x1126.jpeg 848w, https://substackcdn.com/image/fetch/$s_!uz-r!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42f3568f-457f-415c-bd40-eee122414c0c_996x1126.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!uz-r!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42f3568f-457f-415c-bd40-eee122414c0c_996x1126.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!uz-r!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42f3568f-457f-415c-bd40-eee122414c0c_996x1126.jpeg" width="996" height="1126" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/42f3568f-457f-415c-bd40-eee122414c0c_996x1126.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1126,&quot;width&quot;:996,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:140965,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.threatswithoutborders.com/i/188858964?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42f3568f-457f-415c-bd40-eee122414c0c_996x1126.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!uz-r!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42f3568f-457f-415c-bd40-eee122414c0c_996x1126.jpeg 424w, https://substackcdn.com/image/fetch/$s_!uz-r!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42f3568f-457f-415c-bd40-eee122414c0c_996x1126.jpeg 848w, https://substackcdn.com/image/fetch/$s_!uz-r!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42f3568f-457f-415c-bd40-eee122414c0c_996x1126.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!uz-r!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42f3568f-457f-415c-bd40-eee122414c0c_996x1126.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Published every Tuesday, Threats Without Borders offers original commentary and educational pieces related to cybercrime investigations and information security topics. We also summarize and comment on news articles concerning active threat intelligence for the financial industry. The newsletter interests everyone tasked with cybersecurity or involved in preventing or investigating technology-enabled fraud, theft, or money laundering.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.threatswithoutborders.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Threats Without Borders! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Legal: I am not compensated by any entity for writing this newsletter. Obviously, anything written in this space is my own nonsensical opinions and doesn&#8217;t represent the official viewpoint of my employer or any associated organization. Blame me, not them.</p>]]></content:encoded></item><item><title><![CDATA[Threats Without Borders - Issue 274]]></title><description><![CDATA[Cybersecurity Investigations Newsletter, week ending February 15, 2026]]></description><link>https://www.threatswithoutborders.com/p/threats-without-borders-issue-274</link><guid isPermaLink="false">https://www.threatswithoutborders.com/p/threats-without-borders-issue-274</guid><dc:creator><![CDATA[Matt Dotts]]></dc:creator><pubDate>Tue, 17 Feb 2026 11:15:23 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!gnGB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec11d95e-ced3-4599-874c-6076838cd6ca_800x600.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I am often asked why, when looking at a Bitcoin transaction where one address sends funds to another, there are sometimes two addresses on the output side -  and sometimes it even looks like the sending address sent funds back to itself. It seems strange at first glance. Is something going wrong? Is it some kind of error?</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!TyzJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe5475a3-054c-4f12-99e2-5584786bdb74_2286x450.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!TyzJ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe5475a3-054c-4f12-99e2-5584786bdb74_2286x450.jpeg 424w, https://substackcdn.com/image/fetch/$s_!TyzJ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe5475a3-054c-4f12-99e2-5584786bdb74_2286x450.jpeg 848w, https://substackcdn.com/image/fetch/$s_!TyzJ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe5475a3-054c-4f12-99e2-5584786bdb74_2286x450.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!TyzJ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe5475a3-054c-4f12-99e2-5584786bdb74_2286x450.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!TyzJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe5475a3-054c-4f12-99e2-5584786bdb74_2286x450.jpeg" width="1456" height="287" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/be5475a3-054c-4f12-99e2-5584786bdb74_2286x450.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:287,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:337810,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.threatswithoutborders.com/i/188068614?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe5475a3-054c-4f12-99e2-5584786bdb74_2286x450.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!TyzJ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe5475a3-054c-4f12-99e2-5584786bdb74_2286x450.jpeg 424w, https://substackcdn.com/image/fetch/$s_!TyzJ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe5475a3-054c-4f12-99e2-5584786bdb74_2286x450.jpeg 848w, https://substackcdn.com/image/fetch/$s_!TyzJ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe5475a3-054c-4f12-99e2-5584786bdb74_2286x450.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!TyzJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe5475a3-054c-4f12-99e2-5584786bdb74_2286x450.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p>One of the best analogies I&#8217;ve heard for explaining cryptocurrency transactions is doing business with gold bars.</p><p>Imagine you own a single 10 oz gold bar.  You want to buy something from a merchant that costs 3 ounces of gold. Here is the problem: you physically cannot chip a 3-oz piece off a gold bar. You cannot hand over exactly 3 ounces from a 10-ounce bar. The whole bar has to go somewhere.</p><p>So what happens? The gold bar goes to the smelter. The smelter melts the gold bar down and pours the molten gold into new, smaller bars. Out come three new bars:</p><ul><li><p>A 3-ounce bar that goes to the merchant -- this is your payment.</p></li><li><p>A 6.9-ounce bar that comes back to you -- this is your change.</p></li><li><p>A 0.1 ounce nugget is the fee paid to the smelter for their work.</p></li></ul><p>The original 10-ounce bar no longer exists. It has been consumed, and three brand new bars have been created in its place.</p><p>In Bitcoin, your funds are not stored as a simple running balance like a bank account. Instead, they exist as individual chunks called UTXOs, which stand for Unspent Transaction Outputs. Think of each UTXO as one of those gold bars. You might have several of them of different sizes sitting in your digital wallet.</p><p>When you want to send Bitcoin to someone, your wallet picks one (or more) of those UTXOs to spend. Just like the gold bar, the entire UTXO must be consumed. You cannot spend just part of it. So the transaction does exactly what the smelter did:</p><ol><li><p>The UTXO is fully spent as an input to the transaction.</p></li><li><p>A new output is created, sending the correct amount to the recipient.</p></li><li><p>A second new output is created, sending the leftover amount back to you -- this is your change.</p></li><li><p>A small amount is claimed by the miners (the people who process Bitcoin transactions) as their fee.</p></li></ol><p>When you look at a Bitcoin transaction on a block explorer and see two output addresses, you are almost always looking at the recipient and the change going back to the sender.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1K-0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45732663-054a-4384-b481-0599be361ccf_2290x1078.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1K-0!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45732663-054a-4384-b481-0599be361ccf_2290x1078.jpeg 424w, https://substackcdn.com/image/fetch/$s_!1K-0!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45732663-054a-4384-b481-0599be361ccf_2290x1078.jpeg 848w, https://substackcdn.com/image/fetch/$s_!1K-0!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45732663-054a-4384-b481-0599be361ccf_2290x1078.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!1K-0!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45732663-054a-4384-b481-0599be361ccf_2290x1078.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1K-0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45732663-054a-4384-b481-0599be361ccf_2290x1078.jpeg" width="1456" height="685" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/45732663-054a-4384-b481-0599be361ccf_2290x1078.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:685,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:558838,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.threatswithoutborders.com/i/188068614?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45732663-054a-4384-b481-0599be361ccf_2290x1078.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!1K-0!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45732663-054a-4384-b481-0599be361ccf_2290x1078.jpeg 424w, https://substackcdn.com/image/fetch/$s_!1K-0!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45732663-054a-4384-b481-0599be361ccf_2290x1078.jpeg 848w, https://substackcdn.com/image/fetch/$s_!1K-0!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45732663-054a-4384-b481-0599be361ccf_2290x1078.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!1K-0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45732663-054a-4384-b481-0599be361ccf_2290x1078.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>So why does the change sometimes go back to the same address, but sometimes a new one?  The answer is simple: it depends entirely on which wallet software is being used.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!vI-L!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb57f0f86-e302-48ef-8728-380e43b58ef3_2338x466.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!vI-L!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb57f0f86-e302-48ef-8728-380e43b58ef3_2338x466.jpeg 424w, https://substackcdn.com/image/fetch/$s_!vI-L!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb57f0f86-e302-48ef-8728-380e43b58ef3_2338x466.jpeg 848w, https://substackcdn.com/image/fetch/$s_!vI-L!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb57f0f86-e302-48ef-8728-380e43b58ef3_2338x466.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!vI-L!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb57f0f86-e302-48ef-8728-380e43b58ef3_2338x466.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!vI-L!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb57f0f86-e302-48ef-8728-380e43b58ef3_2338x466.jpeg" width="1456" height="290" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b57f0f86-e302-48ef-8728-380e43b58ef3_2338x466.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:290,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:339829,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.threatswithoutborders.com/i/188068614?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb57f0f86-e302-48ef-8728-380e43b58ef3_2338x466.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!vI-L!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb57f0f86-e302-48ef-8728-380e43b58ef3_2338x466.jpeg 424w, https://substackcdn.com/image/fetch/$s_!vI-L!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb57f0f86-e302-48ef-8728-380e43b58ef3_2338x466.jpeg 848w, https://substackcdn.com/image/fetch/$s_!vI-L!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb57f0f86-e302-48ef-8728-380e43b58ef3_2338x466.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!vI-L!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb57f0f86-e302-48ef-8728-380e43b58ef3_2338x466.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>Older, less technical wallets, and some exchange platforms will send your change right back to the address you sent from. It is the equivalent of the smelter handing your change bar back to you in exactly the same labeled pouch you gave them. Easy to track, easy to understand.</p><p>You will also see this with some business accounts and exchange-managed wallets, where the platform keeps things neat by always cycling funds back to a known address.</p><p>More modern (secure) wallets automatically generate a brand new, never-before-used address to receive your change. This address still belongs entirely to you and is controlled by the same wallet and the same seed phrase. You do not need to do anything special to access those funds. Your wallet knows about it automatically.</p><div><hr></div><h4>Blow your whistle</h4><p>The U.S. Treasury has introduced a new website for whistleblowers to report fraud, money laundering, and sanctions violations. Rewards will range from 10% to 30% of collected fines from successful enforcement actions. FinCEN will oversee the program, which includes violations of the Bank Secrecy Act, U.S. sanctions, and other financial laws, while the IRS will create a dedicated task force to investigate misuse of funds by tax-exempt organizations.  <a href="https://www.fincen.gov/whistleblower/">https://www.fincen.gov/whistleblower/</a></p><div><hr></div><h4>Timely</h4><p>Back in <strong><a href="https://www.threatswithoutborders.com/p/threats-without-borders-issue-271">Issue 271</a></strong>, we looked at Pastebin sites and examined how criminals use them to facilitate cybercrime.  </p><p>A new crypto scam exploits Pastebin comments to spread a ClickFix-style attack targeting crypto users. Scammers post comments with links to fake guides promising a profitable arbitrage opportunity. They trick victims into manually running malicious JavaScript code in their browser&#8217;s address bar. Once executed, the code hijacks the legitimate swap interface by replacing Bitcoin deposit addresses with wallets controlled by attackers and adjusting exchange rates to make the fake exploit seem real, leading to theft of victims&#8217; cryptocurrencies. <a href="https://www.bleepingcomputer.com/news/security/pastebin-comments-push-clickfix-javascript-attack-to-hijack-crypto-swaps/">https://www.bleepingcomputer.com/news/security/pastebin-comments-push-clickfix-javascript-attack-to-hijack-crypto-swaps/</a></p><div><hr></div><h4>The News&#8230;</h4><p>Chainalysis reports that cryptocurrency flows to suspected human trafficking services surged 85% in 2025, reaching hundreds of millions of dollars, primarily through Southeast Asian operations linked to Chinese-language money laundering networks on Telegram. <a href="https://www.chainalysis.com/blog/crypto-human-trafficking-2026/">https://www.chainalysis.com/blog/crypto-human-trafficking-2026/</a></p><p>It seems like only yesterday we were discussing Lockbit 2.0 and now we&#8217;re faced with Lockbit 5.0.  What&#8217;s that saying, time flies when we&#8217;re&#8230; <a href="https://www.acronis.com/en/tru/posts/lockbit-strikes-with-new-50-version-targeting-windows-linux-and-esxi-systems/">https://www.acronis.com/en/tru/posts/lockbit-strikes-with-new-50-version-targeting-windows-linux-and-esxi-systems/</a></p><p>A warning for all Mac &#8220;fanboys&#8221; (myself included): A thriving macOS infostealer economy is emerging, with attackers innovating specifically for Apple&#8217;s ecosystem.  Flare explains that the assumption that Macs are immune to viruses is outdated and dangerous. <a href="https://flare.io/learn/resources/blog/the-macos-stealer-gold-rush-how-cybercriminals-are-racing-to-exploit-apples-ecosystem"> https://flare.io/learn/resources/blog/the-macos-stealer-gold-rush-how-cybercriminals-are-racing-to-exploit-apples-ecosystem</a></p><p>To absolutely no one&#8217;s surprise, cybercriminals are using AI website builders to clone major brands, creating convincing fake sites to lure victims. These sites are used for credential harvesting, payment fraud, and malware delivery. The ease of use and lack of robust security measures in AI website builders enable attackers to create and deploy these scams rapidly.  <a href="https://www.malwarebytes.com/blog/news/2026/02/criminals-are-using-ai-website-builders-to-clone-major-brands">https://www.malwarebytes.com/blog/news/2026/02/criminals-are-using-ai-website-builders-to-clone-major-brands</a></p><p>Bitcoin exchange Paxful has been fined $4 million for transferring funds tied to money laundering, fraud, and sex trafficking.  <a href="https://www.justice.gov/opa/pr/virtual-asset-trading-platform-sentenced-violating-travel-act-and-other-federal-criminal">https://www.justice.gov/opa/pr/virtual-asset-trading-platform-sentenced-violating-travel-act-and-other-federal-criminal</a></p><p>There isn&#8217;t much left of CISA, but the remaining holdouts published the agency&#8217;s 2025 Year-In-Review report.  <a href="https://www.cisa.gov/about/2025YIR">https://www.cisa.gov/about/2025YIR</a></p><p>Posted without comment.  <a href="https://techcrunch.com/2026/02/13/sex-toys-maker-tenga-says-hacker-stole-customer-information/">https://techcrunch.com/2026/02/13/sex-toys-maker-tenga-says-hacker-stole-customer-information/</a></p><div><hr></div><h4>Cool Job</h4><p>For those that like snow&#8230; Fraud Coordinator - Erie Federal Credit Union.  <a href="https://eriefcu.acquiretm.com/job_details_clean.aspx?id=1676">https://eriefcu.acquiretm.com/job_details_clean.aspx?id=1676</a></p><h4>Cool Tool</h4><p>Reverse image search (you might get ads depending on your browser) <a href="https://picdetective.com/">https://picdetective.com/</a></p><div><hr></div><h4>DFIR</h4><p>Jordan Mussman provides &#8220;a practical field guide to macOS security architecture and forensic artifacts for incident responders investigating compromised MacBooks in 2026&#8221;.  <a href="https://jmussman.net/posts/mac_dfir/">https://jmussman.net/posts/mac_dfir/</a></p><div><hr></div><h4>Irrelevant</h4><p>The best science I&#8217;ve read in a long time.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!JI3a!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc91d3dec-1cc0-41e8-b67e-68b33a8535d1_1510x710.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!JI3a!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc91d3dec-1cc0-41e8-b67e-68b33a8535d1_1510x710.jpeg 424w, https://substackcdn.com/image/fetch/$s_!JI3a!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc91d3dec-1cc0-41e8-b67e-68b33a8535d1_1510x710.jpeg 848w, https://substackcdn.com/image/fetch/$s_!JI3a!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc91d3dec-1cc0-41e8-b67e-68b33a8535d1_1510x710.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!JI3a!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc91d3dec-1cc0-41e8-b67e-68b33a8535d1_1510x710.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!JI3a!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc91d3dec-1cc0-41e8-b67e-68b33a8535d1_1510x710.jpeg" width="1456" height="685" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c91d3dec-1cc0-41e8-b67e-68b33a8535d1_1510x710.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:685,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:400747,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.threatswithoutborders.com/i/188068614?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc91d3dec-1cc0-41e8-b67e-68b33a8535d1_1510x710.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!JI3a!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc91d3dec-1cc0-41e8-b67e-68b33a8535d1_1510x710.jpeg 424w, https://substackcdn.com/image/fetch/$s_!JI3a!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc91d3dec-1cc0-41e8-b67e-68b33a8535d1_1510x710.jpeg 848w, https://substackcdn.com/image/fetch/$s_!JI3a!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc91d3dec-1cc0-41e8-b67e-68b33a8535d1_1510x710.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!JI3a!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc91d3dec-1cc0-41e8-b67e-68b33a8535d1_1510x710.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><a href="https://jamanetwork.com/journals/jama/fullarticle/2844764">https://jamanetwork.com/journals/jama/fullarticle/2844764</a></p><div><hr></div><h4>Sign off</h4><p>I was told twice last week that I should consider teaching technology investigations full-time. Maybe. But I fear people wouldn&#8217;t pay to listen to me run my mouth for a day or three. I expect to issue refunds around 2:30PM on the first day.  </p><p>Besides, if I worked for myself, I wouldn&#8217;t get paid time off for bank holidays! </p><p>Have a great week. </p><p>Matt</p><p>matt @ threatswithoutborders.com</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!YnbZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff3a0b089-c1db-49f9-b286-4f4ce6e58832_1268x1252.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!YnbZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff3a0b089-c1db-49f9-b286-4f4ce6e58832_1268x1252.jpeg 424w, https://substackcdn.com/image/fetch/$s_!YnbZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff3a0b089-c1db-49f9-b286-4f4ce6e58832_1268x1252.jpeg 848w, https://substackcdn.com/image/fetch/$s_!YnbZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff3a0b089-c1db-49f9-b286-4f4ce6e58832_1268x1252.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!YnbZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff3a0b089-c1db-49f9-b286-4f4ce6e58832_1268x1252.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!YnbZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff3a0b089-c1db-49f9-b286-4f4ce6e58832_1268x1252.jpeg" width="1268" height="1252" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f3a0b089-c1db-49f9-b286-4f4ce6e58832_1268x1252.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1252,&quot;width&quot;:1268,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:291344,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.threatswithoutborders.com/i/188068614?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff3a0b089-c1db-49f9-b286-4f4ce6e58832_1268x1252.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!YnbZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff3a0b089-c1db-49f9-b286-4f4ce6e58832_1268x1252.jpeg 424w, https://substackcdn.com/image/fetch/$s_!YnbZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff3a0b089-c1db-49f9-b286-4f4ce6e58832_1268x1252.jpeg 848w, https://substackcdn.com/image/fetch/$s_!YnbZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff3a0b089-c1db-49f9-b286-4f4ce6e58832_1268x1252.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!YnbZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff3a0b089-c1db-49f9-b286-4f4ce6e58832_1268x1252.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p>Published every Tuesday, Threats Without Borders offers original commentary and educational pieces related to cybercrime investigations and information security topics. We also summarize and comment on news articles concerning active threat intelligence for the financial industry. The newsletter interests everyone tasked with cybersecurity or involved in preventing or investigating technology-enabled fraud, theft, or money laundering.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.threatswithoutborders.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Threats Without Borders! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Legal: I am not compensated by any entity for writing this newsletter. Obviously, anything written in this space is my own nonsensical opinions and doesn&#8217;t represent the official viewpoint of my employer or any associated organization. Blame me, not them.</p><p></p>]]></content:encoded></item><item><title><![CDATA[Threats Without Borders - Issue 273]]></title><description><![CDATA[Cybercrime Investigation Newsletter, week ending February 8, 2026]]></description><link>https://www.threatswithoutborders.com/p/threats-without-borders-issue-273</link><guid isPermaLink="false">https://www.threatswithoutborders.com/p/threats-without-borders-issue-273</guid><dc:creator><![CDATA[Matt Dotts]]></dc:creator><pubDate>Tue, 10 Feb 2026 10:47:42 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!lkkz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07f3f957-f680-4ee2-b274-e8ca2ac66a24_600x600.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Over the past week, two separate but critically connected events occurred. </p><p>First, the newsletter saw an unusually high number of unsubscribes. Perhaps I said something last week that offended some readers, or maybe it&#8217;s just the new year's resolution to declutter inboxes. I&#8217;m not sure. </p><p>But for the first time, I just said, Good.  F* you, anyway. I dedicate hours weekly to this newsletter, and if you choose not to read it for free, fine. I don&#8217;t want to share my knowledge and experience with you anyway</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!7DcG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb372d436-681e-4785-925f-3557274597d6_1184x318.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!7DcG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb372d436-681e-4785-925f-3557274597d6_1184x318.jpeg 424w, https://substackcdn.com/image/fetch/$s_!7DcG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb372d436-681e-4785-925f-3557274597d6_1184x318.jpeg 848w, https://substackcdn.com/image/fetch/$s_!7DcG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb372d436-681e-4785-925f-3557274597d6_1184x318.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!7DcG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb372d436-681e-4785-925f-3557274597d6_1184x318.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!7DcG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb372d436-681e-4785-925f-3557274597d6_1184x318.jpeg" width="1184" height="318" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b372d436-681e-4785-925f-3557274597d6_1184x318.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:318,&quot;width&quot;:1184,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:75460,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.threatswithoutborders.com/i/187329192?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb372d436-681e-4785-925f-3557274597d6_1184x318.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!7DcG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb372d436-681e-4785-925f-3557274597d6_1184x318.jpeg 424w, https://substackcdn.com/image/fetch/$s_!7DcG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb372d436-681e-4785-925f-3557274597d6_1184x318.jpeg 848w, https://substackcdn.com/image/fetch/$s_!7DcG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb372d436-681e-4785-925f-3557274597d6_1184x318.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!7DcG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb372d436-681e-4785-925f-3557274597d6_1184x318.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>And I&#8217;d rather have 50 truly invested readers who value my time and writing than 5000 people who sign up only to mark the newsletter as spam until they eventually figure out the unsubscribe process.</p><p>Terrible attitude, right?  Yeah, I know.</p><p><strong>Secondly, I read &#8220;How to Stop Being Boring&#8221; by JA Westenberg.  </strong></p><blockquote><p><em>I&#8217;ve come to believe that boring = personality edited down to nothing. Somewhere along the way, too many of us learned to sand off our weird edges, to preemptively remove anything that might make someone uncomfortable or make us seem difficult to be around.</em></p><p><em>And the result = boredom.</em></p></blockquote><p>It&#8217;s a powerful conviction about the dangers of self-editing to avoid being different,  offensive, or controversial, and just becoming performative.</p><blockquote><p><em>Erving Goffman wrote in 1959 about how we all perform versions of ourselves depending on context. What's less normal is when the performance becomes the only thing left. When you've been editing yourself for so long that you've forgotten what the original draft looked like.</em></p></blockquote><p>Maybe that&#8217;s it!  What if it&#8217;s not what I&#8217;m saying, but the things that I&#8217;m not saying?  </p><p>Maybe I&#8217;ve just become&#8230; boring.</p><p>Please take two minutes to read this blog post.  </p><p><a href="https://www.joanwestenberg.com/how-to-stop-being-boring/">https://www.joanwestenberg.com/how-to-stop-being-boring/</a></p><p>And let&#8217;s agree to stop being boring!</p><div><hr></div><h4>Wasn&#8217;t me, my iPhone was hacked&#8230;</h4><p>The first question should be, &#8220;Are you a target of a nation-state? North Korea, Iran, or maybe Russia (or maybe the U.S.).&#8221; If the answer is probably not, then the iPhone was probably not hacked. No, the device most definitely wasn&#8217;t hacked.</p><p>Apple released its 2026 <strong>Apple Platform Security</strong> update, so let&#8217;s see if remote access software can be covertly installed on an iPhone. (I do this every year).</p><p>I&#8217;m not referring to a corporate device with Mobile Device Management (MDM) installed, which allows employers to control various functions but remains heavily restricted by Apple.  Even then, the MDM software manager doesn&#8217;t have carte blanche over the device.  And these devices aren&#8217;t getting &#8220;hacked&#8221; either.</p><p>We&#8217;ve all heard the claim: &#8220;Someone must have secretly installed a remote monitoring or remote desktop app on my phone.&#8221; But given Apple&#8217;s security architecture, this isn&#8217;t usually realistic for a personal, unmanaged iPhone.</p><p>Two main points:</p><ol><li><p>Apps can&#8217;t silently install themselves; all code must be signed and installed through Apple-controlled methods.</p></li><li><p>No supported way exists for hidden background installs, drive-by downloads, or invisible services.</p></li></ol><p>If such software exists on the device, it was installed intentionally - usually by the device owner.</p><p>Apple explicitly prevents apps from recording screens without the user's permission. Screen recording needs a user consent prompt before starting. Therefore:</p><ul><li><p>no silent recording</p></li><li><p>no invisible broadcasting</p></li><li><p>no hidden monitoring</p></li></ul><p>The user must approve any such activity.</p><p>And don&#8217;t come at me with &#8220;colluding apps.&#8221; They stopped doing that a long time ago. Apps are sandboxed, so one can&#8217;t directly access another&#8217;s activity unless permissions are strictly approved.</p><p>So when someone says &#8220;It wasn&#8217;t me&#8221; because their device is infected, what really happened is usually:</p><ul><li><p>a password was phished</p></li><li><p>credentials were reused and leaked</p></li><li><p>a fake login page captured information</p></li><li><p>a malicious MFA prompt was approved</p></li><li><p>email or Apple ID was accessed</p></li><li><p>or they were socially engineered</p></li></ul><p>Of course, with Android devices, all bets are off. And if you happen to be in the crosshairs of an elite hacking unit of a government, Google search Pegasus.</p><p><a href="https://help.apple.com/pdf/security/en_US/apple-platform-security-guide.pdf">https://help.apple.com/pdf/security/en_US/apple-platform-security-guide.pdf</a></p><div><hr></div><h4>The News&#8230;</h4><p>Speaking of iPhone security, turns out Lockdown mode is legit.  The FBI could not bypass the security feature to access the internal data of a seized iPhone.  Lockdown Mode is a security feature introduced by Apple in 2022 to protect against sophisticated cyber attacks. While the FBI extracted limited data from the SIM card, the iPhone&#8217;s Lockdown Mode restricted access to most apps, websites, and features. <a href="https://arstechnica.com/tech-policy/2026/02/fbi-stymied-by-apples-lockdown-mode-after-seizing-journalists-iphone/">https://arstechnica.com/tech-policy/2026/02/fbi-stymied-by-apples-lockdown-mode-after-seizing-journalists-iphone/</a></p><p>A former Pennsylvania State Police corporal and compliance director for the skill games company Pace-O-Matic has pleaded guilty to money laundering and tax fraud after accepting hundreds of thousands of dollars in kickbacks from illegal gambling machine operators. The man used his position to suppress complaints about illegal gaming machines and falsely claimed the proceeds as business expenses to evade over $100,000 in taxaccepting hundreds of thousands of dollars in kickbacks from illegal gambling machine operators. He suppressed complaints about illegal gaming machines and falsely claimed the proceeds as business expenses to evade over $100,000 in taxes. <a href="https://www.attorneygeneral.gov/taking-action/former-executive-of-pace-o-matic-pleads-guilty-to-money-laundering-payments-from-gaming-machine-operators/">https://www.attorneygeneral.gov/taking-action/former-executive-of-pace-o-matic-pleads-guilty-to-money-laundering-payments-from-gaming-machine-operators/</a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!fLiO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec9002ca-1ab7-4c2a-9d08-2dc1ed23ae73_1096x471.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!fLiO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec9002ca-1ab7-4c2a-9d08-2dc1ed23ae73_1096x471.webp 424w, https://substackcdn.com/image/fetch/$s_!fLiO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec9002ca-1ab7-4c2a-9d08-2dc1ed23ae73_1096x471.webp 848w, https://substackcdn.com/image/fetch/$s_!fLiO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec9002ca-1ab7-4c2a-9d08-2dc1ed23ae73_1096x471.webp 1272w, https://substackcdn.com/image/fetch/$s_!fLiO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec9002ca-1ab7-4c2a-9d08-2dc1ed23ae73_1096x471.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!fLiO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec9002ca-1ab7-4c2a-9d08-2dc1ed23ae73_1096x471.webp" width="1096" height="471" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ec9002ca-1ab7-4c2a-9d08-2dc1ed23ae73_1096x471.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:471,&quot;width&quot;:1096,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!fLiO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec9002ca-1ab7-4c2a-9d08-2dc1ed23ae73_1096x471.webp 424w, https://substackcdn.com/image/fetch/$s_!fLiO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec9002ca-1ab7-4c2a-9d08-2dc1ed23ae73_1096x471.webp 848w, https://substackcdn.com/image/fetch/$s_!fLiO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec9002ca-1ab7-4c2a-9d08-2dc1ed23ae73_1096x471.webp 1272w, https://substackcdn.com/image/fetch/$s_!fLiO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec9002ca-1ab7-4c2a-9d08-2dc1ed23ae73_1096x471.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Sublime Security details a specific phishing scheme targeting real estate agents, where scammers impersonate prospective clients via contact forms or direct contact. They gradually earn the agents' trust through credible-sounding conversations, then deceive them into joining fake Zoom calls. These malicious &#8220;meeting links' often use lookalike domains such as webzoom[.]im instead of zoom[.]us, which download remote access tools like ScreenConnect, granting attackers control over the victim&#8217;s computer. This campaign is distinguished by its sophisticated social engineering tactics, including multi-message dialogues to build credibility before deploying malware. Additionally, the attackers prefer to host the meetings themselves rather than pass legitimate links to the agents.</p><p>I had always believed that cryptocurrency and gift cards were the preferred methods for criminals to move dirty money. However, according to this author, the latest trend seems to be watches and designer handbags. <a href="https://www.thetimes.com/culture/books/article/everybody-loves-our-dollars-how-money-laundering-won-oliver-bullough-review-z3p2wbf03">https://www.thetimes.com/culture/books/article/everybody-loves-our-dollars-how-money-laundering-won-oliver-bullough-review-z3p2wbf03</a></p><p>An Illinois man admitted guilt for hacking nearly 600 women&#8217;s Snapchat accounts from May 2020 to February 2021, stealing nude photos that he then kept, sold, or traded online. He employed social engineering tactics, impersonating Snapchat representatives to trick more than 4,500 victims into revealing their access codes. This strategy led to the compromise of about 570 victims&#8217; credentials and the illegal access to at least 59 accounts without authorization per<a href="https://storage.courtlistener.com/recap/gov.uscourts.mad.293918/gov.uscourts.mad.293918.1.0.pdf">https://storage.courtlistener.com/recap/gov.uscourts.mad.293918/gov.uscourts.mad.293918.1.0.pdf</a></p><p>Is this Irony?</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NLwr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0a2df17-6922-42bb-81b2-bf5e6ec480d6_984x436.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NLwr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0a2df17-6922-42bb-81b2-bf5e6ec480d6_984x436.jpeg 424w, https://substackcdn.com/image/fetch/$s_!NLwr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0a2df17-6922-42bb-81b2-bf5e6ec480d6_984x436.jpeg 848w, https://substackcdn.com/image/fetch/$s_!NLwr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0a2df17-6922-42bb-81b2-bf5e6ec480d6_984x436.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!NLwr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0a2df17-6922-42bb-81b2-bf5e6ec480d6_984x436.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NLwr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0a2df17-6922-42bb-81b2-bf5e6ec480d6_984x436.jpeg" width="984" height="436" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a0a2df17-6922-42bb-81b2-bf5e6ec480d6_984x436.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:436,&quot;width&quot;:984,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:86891,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.threatswithoutborders.com/i/187329192?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0a2df17-6922-42bb-81b2-bf5e6ec480d6_984x436.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!NLwr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0a2df17-6922-42bb-81b2-bf5e6ec480d6_984x436.jpeg 424w, https://substackcdn.com/image/fetch/$s_!NLwr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0a2df17-6922-42bb-81b2-bf5e6ec480d6_984x436.jpeg 848w, https://substackcdn.com/image/fetch/$s_!NLwr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0a2df17-6922-42bb-81b2-bf5e6ec480d6_984x436.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!NLwr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0a2df17-6922-42bb-81b2-bf5e6ec480d6_984x436.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I think this is irony.</p><p>Google search is offering up links to download malware for macOS.  <a href="https://eclecticlight.co/2026/01/30/more-malware-from-google-search/">https://eclecticlight.co/2026/01/30/more-malware-from-google-search/</a></p><div><hr></div><h4>Cool Job</h4><p>Director of Fraud Prevention - TopStep.  <a href="https://job-boards.greenhouse.io/topsteptrader/jobs/7615888003">https://job-boards.greenhouse.io/topsteptrader/jobs/7615888003</a></p><h4>Cool Tool</h4><p>Your target may not have an online presence but their relatives might.  <a href="https://www.familytreenow.com/">https://www.familytreenow.com/</a></p><p>theHarvester is a very simple, yet effective tool designed to be used in the early<br>stages of a penetration test. Use it for open source intelligence gathering and helping<br>to determine a company's external threat landscape on the internet. The tool gathers<br>emails, names, subdomains, IPs, and URLs.  <a href="https://pypi.org/project/theHarvester/">https://pypi.org/project/theHarvester/</a></p><div><hr></div><h4>Be Alert</h4><p>Yeah, so, Substack had a little oopsie and lost some user data. They claim to have notified affected users, but it seems the breach is much larger than initially acknowledged.</p><p>The good thing, if there is such a thing, when it comes to losing user information, is that it doesn&#8217;t appear that the scraped data would enable account takeovers.</p><p>As this HackRead <strong><a href="https://hackread.com/substack-breach-user-records-leak-cybercrime-forum/">article</a></strong> notes, the real danger is from a social engineering attack by someone pretending to be Substack and referencing your account. </p><div><hr></div><h4>Irrelevant</h4><p>Being successful isn&#8217;t random.  <a href="https://dariusforoux.com/the-big-5-predictors-of-success/">https://dariusforoux.com/the-big-5-predictors-of-success/</a></p><div><hr></div><h4>Learning</h4><p>The Delaware Fraud Working Group is sponsoring a full-day training event on April 2, 2026, in Wilmington, Delaware.  Best of all, it&#8217;s FREE.  </p><p>No, even better, I&#8217;m speaking.  </p><p><a href="https://www.eventbrite.com/e/delaware-fraud-working-group-full-day-fraud-prevention-summit-tickets-1982375409213">https://www.eventbrite.com/e/delaware-fraud-working-group-full-day-fraud-prevention-summit-tickets-1982375409213</a></p><div><hr></div><h4>Sign Off</h4><p>Someone suggested I do that viral thing where you ask ChatGPT to make a caricature of you and post it to LinkedIn. Ugh, I&#8217;d rather stick a fork in my face. </p><p>So I asked ChatGPT to create that image instead.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!BYFp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57a253f1-1c9a-4068-8fd6-248d35450e49_1604x570.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!BYFp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57a253f1-1c9a-4068-8fd6-248d35450e49_1604x570.jpeg 424w, https://substackcdn.com/image/fetch/$s_!BYFp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57a253f1-1c9a-4068-8fd6-248d35450e49_1604x570.jpeg 848w, https://substackcdn.com/image/fetch/$s_!BYFp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57a253f1-1c9a-4068-8fd6-248d35450e49_1604x570.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!BYFp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57a253f1-1c9a-4068-8fd6-248d35450e49_1604x570.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!BYFp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57a253f1-1c9a-4068-8fd6-248d35450e49_1604x570.jpeg" width="1456" height="517" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/57a253f1-1c9a-4068-8fd6-248d35450e49_1604x570.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:517,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:116646,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.threatswithoutborders.com/i/187329192?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57a253f1-1c9a-4068-8fd6-248d35450e49_1604x570.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!BYFp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57a253f1-1c9a-4068-8fd6-248d35450e49_1604x570.jpeg 424w, https://substackcdn.com/image/fetch/$s_!BYFp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57a253f1-1c9a-4068-8fd6-248d35450e49_1604x570.jpeg 848w, https://substackcdn.com/image/fetch/$s_!BYFp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57a253f1-1c9a-4068-8fd6-248d35450e49_1604x570.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!BYFp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57a253f1-1c9a-4068-8fd6-248d35450e49_1604x570.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Too bad, that wouldn&#8217;t be boring.</p><p>Thanks for reading another week.  Come back next week to see if I write something useful.</p><p>Matt</p><div><hr></div><p>Published every Tuesday, Threats Without Borders offers original commentary and educational pieces related to cybercrime investigations and information security topics. We also summarize and comment on news articles concerning active threat intelligence for the financial industry. The newsletter interests everyone tasked with cybersecurity or involved in preventing or investigating technology-enabled fraud, theft, or money laundering.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.threatswithoutborders.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Threats Without Borders! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Legal: I am not compensated by any entity for writing this newsletter. Obviously, anything written in this space is my own nonsensical opinions and doesn&#8217;t represent the official viewpoint of my employer or any associated organization. Blame me, not them.</p>]]></content:encoded></item><item><title><![CDATA[Threats Without Borders - Issue 272]]></title><description><![CDATA[Cybercrime Investigation Newsletter, week ending February 1, 2026]]></description><link>https://www.threatswithoutborders.com/p/threats-without-borders-issue-272</link><guid isPermaLink="false">https://www.threatswithoutborders.com/p/threats-without-borders-issue-272</guid><dc:creator><![CDATA[Matt Dotts]]></dc:creator><pubDate>Tue, 03 Feb 2026 09:58:59 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!gnGB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec11d95e-ced3-4599-874c-6076838cd6ca_800x600.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>When so many organizations hide their reports behind information-collection barriers that require you to give away your professional contact information and then endure relentless sales calls&#8230; TRM Labs continues to share its knowledge freely and openly. And they don&#8217;t publish a vanilla product that simply rehashes common industry knowledge.  </p><p>TRM Labs' 2026 Crypto Crime Report shows illicit crypto flows hit a record $158 billion in 2025, ending a multi-year decline. This rise was mainly due to three factors: new sanctions designations, better detection tools, and large hacks like the $1.46 billion Bybit breach. Despite the overall increase, illicit activity as a share of total crypto activity fell to 1.2%, suggesting that legitimate crypto use expanded faster than criminal activity. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Dlk1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c57e1e9-f23e-46e3-824b-97e3ef65a28e_1690x936.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Dlk1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c57e1e9-f23e-46e3-824b-97e3ef65a28e_1690x936.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Dlk1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c57e1e9-f23e-46e3-824b-97e3ef65a28e_1690x936.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Dlk1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c57e1e9-f23e-46e3-824b-97e3ef65a28e_1690x936.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Dlk1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c57e1e9-f23e-46e3-824b-97e3ef65a28e_1690x936.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Dlk1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c57e1e9-f23e-46e3-824b-97e3ef65a28e_1690x936.jpeg" width="1456" height="806" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9c57e1e9-f23e-46e3-824b-97e3ef65a28e_1690x936.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:806,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:118712,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.threatswithoutborders.com/i/186552679?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c57e1e9-f23e-46e3-824b-97e3ef65a28e_1690x936.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Dlk1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c57e1e9-f23e-46e3-824b-97e3ef65a28e_1690x936.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Dlk1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c57e1e9-f23e-46e3-824b-97e3ef65a28e_1690x936.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Dlk1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c57e1e9-f23e-46e3-824b-97e3ef65a28e_1690x936.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Dlk1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c57e1e9-f23e-46e3-824b-97e3ef65a28e_1690x936.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The report highlights how state-aligned actors are institutionalizing crypto infrastructure for sanctions evasion, how ransomware and scam operations have become more sophisticated and organized, and how Chinese money-laundering networks have evolved into massive settlement layers that process over $103 billion. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!3rKX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd4ae919b-ca07-4369-8157-e5e691c42ff5_1690x896.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3rKX!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd4ae919b-ca07-4369-8157-e5e691c42ff5_1690x896.jpeg 424w, https://substackcdn.com/image/fetch/$s_!3rKX!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd4ae919b-ca07-4369-8157-e5e691c42ff5_1690x896.jpeg 848w, https://substackcdn.com/image/fetch/$s_!3rKX!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd4ae919b-ca07-4369-8157-e5e691c42ff5_1690x896.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!3rKX!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd4ae919b-ca07-4369-8157-e5e691c42ff5_1690x896.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3rKX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd4ae919b-ca07-4369-8157-e5e691c42ff5_1690x896.jpeg" width="1456" height="772" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d4ae919b-ca07-4369-8157-e5e691c42ff5_1690x896.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:772,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:113246,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.threatswithoutborders.com/i/186552679?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd4ae919b-ca07-4369-8157-e5e691c42ff5_1690x896.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!3rKX!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd4ae919b-ca07-4369-8157-e5e691c42ff5_1690x896.jpeg 424w, https://substackcdn.com/image/fetch/$s_!3rKX!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd4ae919b-ca07-4369-8157-e5e691c42ff5_1690x896.jpeg 848w, https://substackcdn.com/image/fetch/$s_!3rKX!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd4ae919b-ca07-4369-8157-e5e691c42ff5_1690x896.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!3rKX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd4ae919b-ca07-4369-8157-e5e691c42ff5_1690x896.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The findings highlight that crypto crime has become a core part of both legitimate and illicit financial systems, emphasizing the need for improved enforcement coordination and specialized crypto-investigation tools.</p><p>This is a great report and well worth your time to read and digest.  </p><p><a href="https://www.trmlabs.com/reports-and-whitepapers/2026-crypto-crime-report">https://www.trmlabs.com/reports-and-whitepapers/2026-crypto-crime-report</a></p><div><hr></div><h4>Because like security, duh.</h4><p>I debated how to title this:  &#8220;<strong>Because we suck at security</strong>&#8221; or &#8220;<strong>This is why you respond to every alarm</strong>&#8221;.</p><p>A federal grand jury indicted 31 people for stealing millions from ATMs using Ploutus malware. The gang surveilled ATMs, opened them to test alarms, and replaced hard drives or connected thumb drives with malware to dispense cash.</p><p>Two key points: 1) The attackers forced open the ATMs and then retreated to safety. If police arrived, they fled the scene. They continued the attack if there was no police response. 2) Ploutus malware has been active since 2013. Yes, thirteen years ago. While it has evolved, technology and protections exist to prevent it.  </p><p>And it isn&#8217;t a stealthy attack.  It&#8217;s a physical intrusion into the machine.  It&#8217;s noisy and makes a mess.  Here is an <strong><a href="https://cloud.google.com/blog/topics/threat-intelligence/new-ploutus-variant">article </a></strong>the Google Threat Intelligence Team published in 2017 that explains the effort required to attack an ATM with Ploutus.</p><p>These types of attacks are preventable.  Of course, we suck at security.</p><p>Anyways, kudos to the law enforcement teams that coordinated to shut this group down.</p><p><a href="https://www.justice.gov/opa/pr/investigation-international-atm-jackpotting-scheme-and-tren-de-aragua-results-additional">https://www.justice.gov/opa/pr/investigation-international-atm-jackpotting-scheme-and-tren-de-aragua-results-additional</a></p><div><hr></div><h4>Presenter Pro-Tip</h4><p>When speaking to industry peers about a relevant topic, avoid wasting time explaining "how bad it is&#8221;. They already know. Being on the front lines, they recognize the problem; that's why they're listening to you.  </p><p>Unless you&#8217;re speaking to beginners, a non-peer group, or presenting entirely new material based on your own research, avoid starting with five slides filled with numbers and statistics about the problem&#8217;s prevalence. By the time you finish outlining the industry landscape, most of your audience&#8217;s attention will have drifted.   And honestly, it&#8217;s insulting.  </p><p>I sat through a presentation this week in which the speaker spent the first ten minutes highlighting well-known fraud statistics from regularly cited sources like the Internet Crime Complaint Center. You're speaking to an audience of financial crime investigators. It&#8217;s ugly out there&#8212;we get it. That&#8217;s why we&#8217;re willing to give you thirty minutes of our time. Tell us something we don&#8217;t know!</p><div><hr></div><h4>The News&#8230;</h4><p>$2.5 million has been secured for a new cybercrime training facility in Madisonville, Kentucky. The facility, the largest police training academy in the state, will focus on cybercrime investigations and expand training to include computers, drones, and vehicle data systems. The investment aims to address the growing threat of cybercrime and position Madisonville as a leader in prevention and response. Kudos to them.  Hopefully, someone there will invite me for a visit!  <a href="https://spectrumnews1.com/ky/louisville/news/2026/01/26/cyber-crime-training-center">https://spectrumnews1.com/ky/louisville/news/2026/01/26/cyber-crime-training-center</a></p><p>Scammers are using a legitimate Microsoft email address (no-reply-powerbi@microsoft.com) associated with Power BI. They send fraudulent emails claiming fake $399 charges and direct victims to call a phone number, where they are instructed to install remote access software. This scam exploits Power BI&#8217;s feature that allows external email addresses to subscribe to reports, making the emails appear trustworthy without suspicious links or attachments that could trigger spam filters. Microsoft has temporarily disabled the scorecard email subscription feature while working on a permanent fix. This incident underscores how scammers can misuse legitimate business platforms to enhance the credibility of their social engineering schemes.  <a href="https://arstechnica.com/information-technology/2026/01/theres-a-rash-of-scam-spam-coming-from-a-real-microsoft-address/">https://arstechnica.com/information-technology/2026/01/theres-a-rash-of-scam-spam-coming-from-a-real-microsoft-address/</a></p><p>Research by Chainalysis reveals Chinese-language money laundering groups laundered an estimated $16.1 billion in illicit cryptocurrency daily in 2025, totaling $82 billion annually. These groups utilize guarantee platforms, money mules, and Black U services to launder funds, including those stolen in <s>pig butchering</s> financial grooming scams.  <a href="https://www.chainalysis.com/blog/2026-crypto-money-laundering/">https://www.chainalysis.com/blog/2026-crypto-money-laundering/</a></p><p>The Google Threat Analysis Group (TAG) released its 4Q2025 Threat Report.  <a href="https://blog.google/threat-analysis-group/tag-bulletin-q4-2025/">https://blog.google/threat-analysis-group/tag-bulletin-q4-2025/</a></p><p>The FBI has seized the domains for the RAMP cybercrime forums.  <a href="https://www.bleepingcomputer.com/news/security/fbi-seizes-ramp-cybercrime-forum-used-by-ransomware-gangs/">https://www.bleepingcomputer.com/news/security/fbi-seizes-ramp-cybercrime-forum-used-by-ransomware-gangs/</a></p><p>Trend Micro examines the maturation of criminal AI in 2025, revealing a shift from experimentation to industrialization. The criminal AI ecosystem has consolidated around established services offering &#8220;jailbreak-as-a-service&#8221; that exploit commercial AI models rather than building independent systems.  While AI-generated malware remains limited by practical constraints, deepfake technology has become alarmingly accessible and weaponized across multiple fronts,from &#8220;nudifying&#8221; apps enabling image-based abuse to sophisticated corporate infiltration schemes where North Korean operatives use AI-enhanced identities to gain employment at tech companies, and banking fraud targeting KYC verification systems.  <a href="https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/the-state-of-criminal-ai">https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/the-state-of-criminal-ai</a></p><p>The government seized over $400 million in assets from Larry Dean Harmon, operator of the darknet mixing service Helix. Harmon, who processed over $300 million in cryptocurrency transactions for Helix, pleaded guilty to money laundering and was sentenced to 36 months in prison.  <a href="https://www.justice.gov/opa/pr/government-forfeits-over-400m-assets-tied-helix-darknet-cryptocurrency-mixer">https://www.justice.gov/opa/pr/government-forfeits-over-400m-assets-tied-helix-darknet-cryptocurrency-mixer</a></p><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.threatswithoutborders.com/?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share Threats Without Borders&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.threatswithoutborders.com/?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share Threats Without Borders</span></a></p><div><hr></div><h4>Reader Mail</h4><p><em>Matt, thanks for the piece on paste sites. It brought back memories of an insider threat (corporate espionage) case I had about ten years ago, in which the employee used a paste site to send information to his handler. Using a prepaid cell phone, he&#8217;d paste his info into the same note every Tuesday. The handler would then go to the same note to retrieve the information. This was way before encrypted chat apps. We could never build a link to those he was communicating with.  - </em>RussK</p><p>Send email:  matt (at) threatswithoutborders.com </p><div><hr></div><h4>Cool Job</h4><p>Fraud Program Manager - Vervent.  <a href="https://recruiting.paylocity.com/recruiting/jobs/Details/3821568/Vervent-Inc/Fraud-Program-Manager">https://recruiting.paylocity.com/recruiting/jobs/Details/3821568/Vervent-Inc/Fraud-Program-Manager</a></p><h4>Cool Tool</h4><p>Search for people, Fast. <a href="https://www.fastpeoplesearch.com/"> https://www.fastpeoplesearch.com/</a></p><p>If Wal-Mart is closed, you know the weather is bad.  Someone created a Wal-Mart store status dashboard.  <a href="https://www.arcgis.com/apps/dashboards/4e573c79e1224081805165d25b4f33c7">https://www.arcgis.com/apps/dashboards/4e573c79e1224081805165d25b4f33c7</a></p><div><hr></div><h4>Someone I like</h4><p>There are not many people writing or podcasting in the Cyber/Fraud/AML space who I like enough to recommend in the newsletter. Check that, there are very few people that I like.  </p><p>But I like Sarah Beth Felix!  She writes a great LinkedIn newsletter focused on BSA and AML, titled &#8220;Dirty Money&#8221;.  Give her a follow.</p><p><a href="https://www.linkedin.com/pulse/problem-streamline-act-sarah-beth-felix-uxt7e/">https://www.linkedin.com/pulse/problem-streamline-act-sarah-beth-felix-uxt7e/</a></p><div><hr></div><h4>Irrelevant </h4><p>Sunshine and Salmon.   This study reveals that positive levels of Vitamin D and Omega-3 have a greater effect on a person than antidepressants.  <a href="https://blog.ncase.me/on-depression/">https://blog.ncase.me/on-depression/</a></p><div><hr></div><h4>Closing</h4><p>I wake up every morning at 5am. The other day, at 5 am, I started a pot of coffee. It was 12 degrees outside, and I heard the fire siren go off. I thought, &#8216;I&#8217;m glad I don&#8217;t need to leave this warm house and hot coffee to handle that.&#8217; But, of course, someone did have to go out and handle it. And in my area, these selfless souls don&#8217;t get paid for it.</p><p>My deepest thanks to all the local emergency services volunteers who leave the comfort and safety of their homes, and a freshly poured cup of hot coffee, every day to help others. Thank you!</p><p>Matt</p><div><hr></div><p>Published every Tuesday, Threats Without Borders offers original commentary and educational pieces related to cybercrime investigations and information security topics. We also summarize and comment on news articles concerning active threat intelligence for the financial industry. The newsletter interests everyone tasked with cybersecurity or involved in preventing or investigating technology-enabled fraud, theft, or money laundering.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.threatswithoutborders.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Threats Without Borders! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Legal: I am not compensated by any entity for writing this newsletter. Obviously, anything written in this space is my own nonsensical opinions and doesn&#8217;t represent the official viewpoint of my employer or any associated organization. Blame me, not them.</p><p>aml cybercrime cybersecurity financial fraud investigation osint cyficrime </p>]]></content:encoded></item><item><title><![CDATA[Threats Without Borders - Issue 271]]></title><description><![CDATA[Cybersecurity Investigation Newsletter, week ending January 25, 2026]]></description><link>https://www.threatswithoutborders.com/p/threats-without-borders-issue-271</link><guid isPermaLink="false">https://www.threatswithoutborders.com/p/threats-without-borders-issue-271</guid><dc:creator><![CDATA[Matt Dotts]]></dc:creator><pubDate>Tue, 27 Jan 2026 10:56:06 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!gnGB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec11d95e-ced3-4599-874c-6076838cd6ca_800x600.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I found myself chasing some information on a Paste site this week.  </p><p>A pastebin is a web service that allows users to store and share plain text via unique URLs. Originally designed as collaboration tools for developers and IT professionals, these platforms let anyone post code snippets, log files, configuration data, or notes without creating an account. Popular examples include Pastebin.com, Ghostbin, and JustPaste.it. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!imfa!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F186b7b9a-8571-46b5-8c54-eac99b357e26_999x579.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!imfa!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F186b7b9a-8571-46b5-8c54-eac99b357e26_999x579.jpeg 424w, https://substackcdn.com/image/fetch/$s_!imfa!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F186b7b9a-8571-46b5-8c54-eac99b357e26_999x579.jpeg 848w, https://substackcdn.com/image/fetch/$s_!imfa!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F186b7b9a-8571-46b5-8c54-eac99b357e26_999x579.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!imfa!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F186b7b9a-8571-46b5-8c54-eac99b357e26_999x579.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!imfa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F186b7b9a-8571-46b5-8c54-eac99b357e26_999x579.jpeg" width="999" height="579" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/186b7b9a-8571-46b5-8c54-eac99b357e26_999x579.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:579,&quot;width&quot;:999,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:82259,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.threatswithoutborders.com/i/185837351?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F186b7b9a-8571-46b5-8c54-eac99b357e26_999x579.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!imfa!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F186b7b9a-8571-46b5-8c54-eac99b357e26_999x579.jpeg 424w, https://substackcdn.com/image/fetch/$s_!imfa!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F186b7b9a-8571-46b5-8c54-eac99b357e26_999x579.jpeg 848w, https://substackcdn.com/image/fetch/$s_!imfa!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F186b7b9a-8571-46b5-8c54-eac99b357e26_999x579.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!imfa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F186b7b9a-8571-46b5-8c54-eac99b357e26_999x579.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>There are dozens of legitimate use cases for these sites, from sharing error logs for troubleshooting, collaborating on code across teams, and distributing configuration files. However, paste bins have become valuable infrastructure for threat actors precisely because of their legitimate popularity. </p><p>Several factors make them attractive for criminal activity:</p><ul><li><p>Blending with legitimate traffic: Security tools and web filters rarely block paste sites since they&#8217;re widely used by legitimate users. Malicious communications to these platforms can hide in plain sight among normal developer traffic.</p></li><li><p>Low-friction anonymity: Most paste sites require no authentication or allow throwaway accounts. Content moderation is often minimal, allowing malicious pastes to remain accessible for extended periods.</p></li><li><p>Zero infrastructure costs: By leveraging existing platforms, attackers avoid maintaining their own servers or domains, reducing both operational costs and the risk of takedowns. The paste site handles hosting, uptime, and global accessibility.</p></li></ul><p>The bad guys regularly upload stolen credentials, database dumps, and personal data (doxing) as pastes. These serve various purposes: showing evidence of a breach, promoting data sales, or blackmailing. Ransomware groups have turned paste sites into public boards, posting ransom demands, doxing threats, and attack updates before sharing links on underground forums or directly with targets victims.</p><p>In more advanced scenarios, malware often uses a two-phase process where the initial infection involves only a small loader. This loader connects to a pastebin URL to access encoded content, which it then decodes and runs as the main payload. Similarly, malware configuration details like command-and-control links, encryption keys, and operational settings are stored as text and fetched at runtime. This approach gives attackers considerable flexibility, enabling them to update payloads or change configurations just by editing a paste. Such modifications are applied instantly across all infected systems without needing to redeploy the malware binaries.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rAxF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54207a88-b310-4fb0-bd41-346d230bd8f7_1046x612.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rAxF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54207a88-b310-4fb0-bd41-346d230bd8f7_1046x612.jpeg 424w, https://substackcdn.com/image/fetch/$s_!rAxF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54207a88-b310-4fb0-bd41-346d230bd8f7_1046x612.jpeg 848w, https://substackcdn.com/image/fetch/$s_!rAxF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54207a88-b310-4fb0-bd41-346d230bd8f7_1046x612.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!rAxF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54207a88-b310-4fb0-bd41-346d230bd8f7_1046x612.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rAxF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54207a88-b310-4fb0-bd41-346d230bd8f7_1046x612.jpeg" width="1046" height="612" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/54207a88-b310-4fb0-bd41-346d230bd8f7_1046x612.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:612,&quot;width&quot;:1046,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:235262,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.threatswithoutborders.com/i/185837351?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54207a88-b310-4fb0-bd41-346d230bd8f7_1046x612.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!rAxF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54207a88-b310-4fb0-bd41-346d230bd8f7_1046x612.jpeg 424w, https://substackcdn.com/image/fetch/$s_!rAxF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54207a88-b310-4fb0-bd41-346d230bd8f7_1046x612.jpeg 848w, https://substackcdn.com/image/fetch/$s_!rAxF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54207a88-b310-4fb0-bd41-346d230bd8f7_1046x612.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!rAxF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54207a88-b310-4fb0-bd41-346d230bd8f7_1046x612.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Beyond direct malware operations, paste sites facilitate information sharing among threat actors. Exploit code, attack tutorials, and operational guides are posted as pastes with links shared through encrypted messaging apps, forums, or social media. Buyers and sellers of stolen data exchange samples, or &#8220;teasers,&#8221; via disposable paste links, avoiding more traceable communication methods.</p><p>For cybercrime investigators, paste bins represent both a challenge and an intelligence goldmine. Here&#8217;s how investigators can leverage these platforms:</p><ul><li><p>Indicator of Compromise extraction: Parse pastes for IOC&#8217;s including IP addresses, domain names, file hashes, email addresses, and cryptocurrency wallets. These can feed into threat intelligence platforms or be cross-referenced with ongoing investigations.</p></li><li><p>Breach notification: When investigating a suspected data breach, search paste sites for your organization&#8217;s information. Stolen data often appears publicly before victims are aware of the compromise.</p></li><li><p>Timeline reconstruction: Paste timestamps can help establish attack timelines. When malware samples are discovered, investigators can check if associated paste bin URLs still contain payloads or configurations, potentially revealing the attack sequence.</p></li><li><p>Attribution clues: Pastes may contain unintentional artifacts--usernames, language preferences, coding styles, timezone indicators in timestamps--that help link activities to known threat actors or narrow suspect pools.</p></li></ul><p>Investigators should be aware that attackers can delete or alter content at any moment, and many pastes have automatic expiration features. Capture screenshots or archive suspicious pastes right away. Also, paste sites are operated worldwide, each with different policies on data retention, user privacy, and law enforcement cooperation. Since they are unlikely to respond to search warrants for data, seize what information you can whenever possible.  </p><p><a href="https://github.com/lorien/awesome-pastebins">https://github.com/lorien/awesome-pastebins</a></p><div><hr></div><h4>Call back</h4><p>In the last issue, we covered Synthetic Identity Fraud. Mr. Lenderman advises that the Federal Reserve has the most extensive documentation on this topic.  </p><p><a href="https://fedpaymentsimprovement.org/strategic-initiatives/payments-security/synthetic-identity-payments-fraud/">https://fedpaymentsimprovement.org/strategic-initiatives/payments-security/synthetic-identity-payments-fraud/</a></p><div><hr></div><h4>The News&#8230;</h4><p>A TD Bank employee has pled guilty to federal charges related to bribery and money laundering.  The bank insider facilitated a money laundering scheme, accepting bribes to open accounts for shell companies and issue debit cards. He then shipped the cards to Colombia, where they were used for over 120,000 ATM withdrawals.  <a href="https://www.justice.gov/usao-nj/pr/td-bank-insider-pleads-guilty-facilitating-colombian-atm-money-laundering-scheme">https://www.justice.gov/usao-nj/pr/td-bank-insider-pleads-guilty-facilitating-colombian-atm-money-laundering-scheme</a></p><p>The Tallahassee, Florida, government was targeted by a scam, resulting in a loss of one million dollars to the fraudsters. Ouch. The city police department states they are investigating the incident, but a watchdog group argues that the Chief of Police can not be impartial, as their superior is involved. Where is the FBI? They ask.  <a href="https://www.tallahassee.com/story/news/local/2026/01/20/watchdog-group-calls-for-fbi-fdle-to-investigate-city-cybercrime/88267720007/">https://www.tallahassee.com/story/news/local/2026/01/20/watchdog-group-calls-for-fbi-fdle-to-investigate-city-cybercrime/88267720007/</a></p><p>The Jamf Threat Labs has observed the North Korea-linked &#8220;Contagious Interview&#8221; campaign, where attackers use Microsoft Visual Studio Code to deliver malware. They lure victims by cloning fake Git repositories, often disguised as job tasks, from sites like GitHub or GitLab. When the repository is trusted in VS Code, a file automatically runs commands that download and execute a JavaScript backdoor, which communicates with control servers every five seconds. This allows hackers to take control, gather system details, and run commands on victims' computers. The campaign shows that DPRK-linked hackers continue to adapt to legitimate developer tools. Researchers advise developers to verify repositories before trusting them in VS Code and avoid running commands like &#8220;npm install&#8221; on untrusted projects.  <a href="https://www.jamf.com/blog/threat-actors-expand-abuse-of-visual-studio-code/">https://www.jamf.com/blog/threat-actors-expand-abuse-of-visual-studio-code/</a></p><p>Eight Amtrak employees have pleaded guilty to conspiracy to commit health care fraud. Between January 2019 and June 2022, they accepted kickbacks from healthcare providers in exchange for fraudulent billing of services, resulting in over $11 million in fraudulent claims. <a href="https://www.justice.gov/usao-nj/pr/amtrak-employees-admit-participating-11-million-health-care-fraud-scheme-0">https://www.justice.gov/usao-nj/pr/amtrak-employees-admit-participating-11-million-health-care-fraud-scheme-0</a></p><p>Okta Threat Intelligence discusses the evolution of sophisticated phishing kits specifically designed for voice-based social engineering (vishing) attacks. These kits, available as-a-service, allow attackers to control what victims see in their browsers in real-time during phone calls, creating synchronized experiences that make fraudulent requests appear legitimate. The attackers typically impersonate IT support, guide victims to phishing sites, capture credentials, and then manipulate the browser display to match their verbal instructions for bypassing MFA challenges like push notifications or one-time passcodes. <a href="https://www.okta.com/blog/threat-intelligence/phishing-kits-adapt-to-the-script-of-callers/">https://www.okta.com/blog/threat-intelligence/phishing-kits-adapt-to-the-script-of-callers/</a></p><div><hr></div><h4>Is this irony</h4><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!QeS5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33d357c8-16ff-45e3-9cec-e81ac0517d57_1098x811.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!QeS5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33d357c8-16ff-45e3-9cec-e81ac0517d57_1098x811.jpeg 424w, https://substackcdn.com/image/fetch/$s_!QeS5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33d357c8-16ff-45e3-9cec-e81ac0517d57_1098x811.jpeg 848w, https://substackcdn.com/image/fetch/$s_!QeS5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33d357c8-16ff-45e3-9cec-e81ac0517d57_1098x811.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!QeS5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33d357c8-16ff-45e3-9cec-e81ac0517d57_1098x811.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!QeS5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33d357c8-16ff-45e3-9cec-e81ac0517d57_1098x811.jpeg" width="1098" height="811" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/33d357c8-16ff-45e3-9cec-e81ac0517d57_1098x811.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:811,&quot;width&quot;:1098,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:360974,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.threatswithoutborders.com/i/185837351?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33d357c8-16ff-45e3-9cec-e81ac0517d57_1098x811.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!QeS5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33d357c8-16ff-45e3-9cec-e81ac0517d57_1098x811.jpeg 424w, https://substackcdn.com/image/fetch/$s_!QeS5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33d357c8-16ff-45e3-9cec-e81ac0517d57_1098x811.jpeg 848w, https://substackcdn.com/image/fetch/$s_!QeS5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33d357c8-16ff-45e3-9cec-e81ac0517d57_1098x811.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!QeS5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33d357c8-16ff-45e3-9cec-e81ac0517d57_1098x811.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Number one rule of OSINT - don&#8217;t end up on a database while doing OSINT</p><div><hr></div><h4>Cool Job</h4><p>Manager of Investigations - Mattel (Hot Wheels) <a href="https://jobs.mattel.com/en/job/el-segundo/manager-of-investigations/2015/90587703168">https://jobs.mattel.com/en/job/el-segundo/manager-of-investigations/2015/90587703168</a></p><h4>Cool Tools</h4><p>People finder.  <a href="https://ufind.name/">https://ufind.name/</a></p><p>Search for just about any artifact you have.  <a href="https://intelx.io/">https://intelx.io/</a></p><div><hr></div><h4>Conference Updates</h4><p>Layer 8 Conference (OSINT focused) - Boston, June 5-6, 2026.  <a href="https://layer8conference.com/">https://layer8conference.com/</a></p><p>Keystone <s>K</s>Connection (IAFCI Delaware Valley and Pittsburgh Metro Chapters) - State College, PA, May 18-20, 2026.  <a href="https://keystonekonnection.com/">https://keystonekonnection.com/</a></p><div><hr></div><h4>Irrelevant</h4><p>This guy is pretty smart for only being 34.  <a href="https://elliot.my/im-34-heres-34-things-i-wish-i-knew-at-21/">https://elliot.my/im-34-heres-34-things-i-wish-i-knew-at-21/</a></p><div><hr></div><h4>Sign Off</h4><p>I've gotten through the storm. It's all snow here, which makes it a pain to move, but it's not as damaging as ice. Sending my goodwill, hope, and prayers to those in the Southeast who were hit the hardest.  </p><p>Thank you for taking the time to read this issue, and I&#8217;ll see you next Tuesday.</p><p>Email: matt (at) threatswithoutborders.com</p><p>Matt</p><p>&#8220;LIFE IS EASIER WHEN YOU LEARN TO ACCEPT THE APOLOGY YOU NEVER GOT.&#8221;</p><div><hr></div><p>Published every Tuesday, Threats Without Borders offers original commentary and educational pieces related to cybercrime investigations and information security topics. We also summarize and comment on news articles concerning active threat intelligence for the financial industry. The newsletter interests everyone tasked with cybersecurity or involved in preventing or investigating technology-enabled fraud, theft, or money laundering.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.threatswithoutborders.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Threats Without Borders! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Legal: I am not compensated by any entity for writing this newsletter. Obviously, anything written in this space is my own nonsensical opinions and doesn&#8217;t represent the official viewpoint of my employer or any associated organization. Blame me, not them.</p><p>cybercrime cybersecurity financial crime fraud investigations aml cyficrime </p>]]></content:encoded></item><item><title><![CDATA[Threats Without Borders - Issue 270]]></title><description><![CDATA[Cybercrime Investigation Newsletter, week ending January 18, 2026]]></description><link>https://www.threatswithoutborders.com/p/threats-without-borders-issue-270</link><guid isPermaLink="false">https://www.threatswithoutborders.com/p/threats-without-borders-issue-270</guid><dc:creator><![CDATA[Matt Dotts]]></dc:creator><pubDate>Tue, 20 Jan 2026 12:08:53 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!gnGB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec11d95e-ced3-4599-874c-6076838cd6ca_800x600.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I frequently see requests from investigators seeking OSINT (Open Source Intelligence) training and resources to track down scoflaw account holders. The common belief is, &#8220;If we have more tools and training, we can effectively find these individuals.&#8221; </p><p>This topic came up in a forum this week, reminding me of a recent LinkedIn post that truly resonated with me.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!kdBJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc088f532-48d6-49be-a0e2-f9add7205d48_502x228.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!kdBJ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc088f532-48d6-49be-a0e2-f9add7205d48_502x228.jpeg 424w, https://substackcdn.com/image/fetch/$s_!kdBJ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc088f532-48d6-49be-a0e2-f9add7205d48_502x228.jpeg 848w, https://substackcdn.com/image/fetch/$s_!kdBJ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc088f532-48d6-49be-a0e2-f9add7205d48_502x228.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!kdBJ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc088f532-48d6-49be-a0e2-f9add7205d48_502x228.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!kdBJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc088f532-48d6-49be-a0e2-f9add7205d48_502x228.jpeg" width="502" height="228" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c088f532-48d6-49be-a0e2-f9add7205d48_502x228.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:228,&quot;width&quot;:502,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:52906,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.threatswithoutborders.com/i/185027416?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc088f532-48d6-49be-a0e2-f9add7205d48_502x228.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!kdBJ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc088f532-48d6-49be-a0e2-f9add7205d48_502x228.jpeg 424w, https://substackcdn.com/image/fetch/$s_!kdBJ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc088f532-48d6-49be-a0e2-f9add7205d48_502x228.jpeg 848w, https://substackcdn.com/image/fetch/$s_!kdBJ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc088f532-48d6-49be-a0e2-f9add7205d48_502x228.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!kdBJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc088f532-48d6-49be-a0e2-f9add7205d48_502x228.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p>For those not aware, a recent TransUnion <a href="https://www.transunion.com/blog/what-is-synthetic-identity-fraud">analysis</a> shows that synthetic identity fraud loss exposure rose to $3.3 billion for US lenders in 2024, involving open accounts for credit cards, retail cards, auto loans, and personal loans.</p><p>Investigators DO need more OSINT training and access to better tools, but first things first&#8230; tools and knowing how to use them are irrelevant if the person you're trying to find doesn&#8217;t exist!</p><p>A lot of time is spent tracking down puppets instead of uncovering the puppet masters. </p><p>The initial step should be learning how to identify synthetic identities. If an account is synthetic, focus on discovering who is behind it. If you verify that the account is linked to a real person, then proceed to find that individual. </p><p>At this stage, the initial question shouldn&#8217;t be &#8220;Where is this person?&#8221;, but rather &#8220;Is this actually a person?&#8221;.</p><p><a href="https://plaid.com/resources/fraud/synthetic-identity-fraud/">https://plaid.com/resources/fraud/synthetic-identity-fraud/</a></p><div><hr></div><h4>The News&#8230;</h4><p>Trellix observed a surge in Facebook phishing scams in the second half of 2025, notably using the &#8220;Browser in the Browser&#8221; technique to trick users into revealing credentials.  <a href="https://www.trellix.com/blogs/research/the-unfriending-truth-how-to-spot-a-facebook-phishing-scam/">https://www.trellix.com/blogs/research/the-unfriending-truth-how-to-spot-a-facebook-phishing-scam/</a></p><p>Unit 42 describes a payroll fraud attack where threat actors used social engineering to compromise employee accounts and redirect paychecks to attacker-controlled bank accounts. The attackers bypassed technical security controls by impersonating employees and manipulating help desk staff into performing password resets and MFA re-enrollment, using publicly available information from social platforms to answer verification questions. <a href="https://unit42.paloaltonetworks.com/social-engineering-payroll-pirates/">https://unit42.paloaltonetworks.com/social-engineering-payroll-pirates/</a></p><p>The Chainalysis 2026 Crypto Crime Report estimates that $17 billion was lost to crypto scams and fraud in 2025. This increase was driven by a 1400% year-over-year rise in impersonation scams and the growing use of AI tools, which make scams 4.5 times more profitable. Major trends include the industrialization of fraud through &#8220;crime-as-a-service&#8221; models like phishing kits and AI-powered deepfakes, often connected to criminal networks in East and Southeast Asia. The report also emphasizes the merging of different scam types, the involvement of human trafficking, and the urgent need for better international cooperation and real-time detection tools to address the escalating threat transnational threat.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1WfF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F825ee1ca-e630-4faa-93f0-b95d31c30926_1542x1262.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1WfF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F825ee1ca-e630-4faa-93f0-b95d31c30926_1542x1262.jpeg 424w, https://substackcdn.com/image/fetch/$s_!1WfF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F825ee1ca-e630-4faa-93f0-b95d31c30926_1542x1262.jpeg 848w, https://substackcdn.com/image/fetch/$s_!1WfF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F825ee1ca-e630-4faa-93f0-b95d31c30926_1542x1262.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!1WfF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F825ee1ca-e630-4faa-93f0-b95d31c30926_1542x1262.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1WfF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F825ee1ca-e630-4faa-93f0-b95d31c30926_1542x1262.jpeg" width="1456" height="1192" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/825ee1ca-e630-4faa-93f0-b95d31c30926_1542x1262.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1192,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:107029,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.threatswithoutborders.com/i/185027416?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F825ee1ca-e630-4faa-93f0-b95d31c30926_1542x1262.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!1WfF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F825ee1ca-e630-4faa-93f0-b95d31c30926_1542x1262.jpeg 424w, https://substackcdn.com/image/fetch/$s_!1WfF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F825ee1ca-e630-4faa-93f0-b95d31c30926_1542x1262.jpeg 848w, https://substackcdn.com/image/fetch/$s_!1WfF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F825ee1ca-e630-4faa-93f0-b95d31c30926_1542x1262.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!1WfF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F825ee1ca-e630-4faa-93f0-b95d31c30926_1542x1262.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><a href="https://www.chainalysis.com/blog/crypto-scams-2026/">https://www.chainalysis.com/blog/crypto-scams-2026/</a></p><p>Microsoft Threat Intelligence has identified RedVDS, a virtual desktop service exploited by cybercriminals for activities like business email compromise (BEC), phishing, account takeovers, and financial fraud. Operating since 2019, RedVDS offers inexpensive, unlicensed Windows RDP servers with complete administrative control, allowing threat actors to carry out extensive attacks with little oversight. The service is hosted by several third-party providers in countries including the U.S., Canada, UK, France, and the Netherlands, with payments made through cryptocurrency to preserve anonymity. <a href="https://www.microsoft.com/en-us/security/blog/2026/01/14/inside-redvds-how-a-single-virtual-desktop-provider-fueled-worldwide-cybercriminal-operations/">https://www.microsoft.com/en-us/security/blog/2026/01/14/inside-redvds-how-a-single-virtual-desktop-provider-fueled-worldwide-cybercriminal-operations/</a></p><p>A man from Venezuela has been charged in the Eastern District of Virginia with laundering one billion dollars. Yes, that's a billion.  <a href="https://www.justice.gov/usao-edva/pr/venezuelan-national-charged-laundering-approximately-billion-dollars-illicit-funds">https://www.justice.gov/usao-edva/pr/venezuelan-national-charged-laundering-approximately-billion-dollars-illicit-funds</a></p><p>Ever wonder how cocaine traffickers launder their money?  Well, here&#8217;s a pretty good explanation.  <a href="https://theconversation.com/how-cocaine-traffickers-launder-cartel-money-270500">https://theconversation.com/how-cocaine-traffickers-launder-cartel-money-270500</a></p><div><hr></div><h4>DFIR</h4><p>Steve Whalen is the the O.G. of Mac forensics so when he writes something, you need to read it.  He explains why physical imaging is effectively dead for modern macOS machines.  <a href="https://sumuri.com/the-death-of-physical-imaging-understanding-the-new-standard-in-mac-forensics/">https://sumuri.com/the-death-of-physical-imaging-understanding-the-new-standard-in-mac-forensics/</a></p><div><hr></div><h4>I know physics</h4><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!DDM1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac28ec1f-1fca-49e8-a852-78bb9ab1b27c_1216x616.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!DDM1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac28ec1f-1fca-49e8-a852-78bb9ab1b27c_1216x616.jpeg 424w, https://substackcdn.com/image/fetch/$s_!DDM1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac28ec1f-1fca-49e8-a852-78bb9ab1b27c_1216x616.jpeg 848w, https://substackcdn.com/image/fetch/$s_!DDM1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac28ec1f-1fca-49e8-a852-78bb9ab1b27c_1216x616.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!DDM1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac28ec1f-1fca-49e8-a852-78bb9ab1b27c_1216x616.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!DDM1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac28ec1f-1fca-49e8-a852-78bb9ab1b27c_1216x616.jpeg" width="1216" height="616" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ac28ec1f-1fca-49e8-a852-78bb9ab1b27c_1216x616.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:616,&quot;width&quot;:1216,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:168408,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.threatswithoutborders.com/i/185027416?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac28ec1f-1fca-49e8-a852-78bb9ab1b27c_1216x616.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!DDM1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac28ec1f-1fca-49e8-a852-78bb9ab1b27c_1216x616.jpeg 424w, https://substackcdn.com/image/fetch/$s_!DDM1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac28ec1f-1fca-49e8-a852-78bb9ab1b27c_1216x616.jpeg 848w, https://substackcdn.com/image/fetch/$s_!DDM1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac28ec1f-1fca-49e8-a852-78bb9ab1b27c_1216x616.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!DDM1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac28ec1f-1fca-49e8-a852-78bb9ab1b27c_1216x616.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h4>Cool Job</h4><p>Fraud and Corruption Investigator - NSA.  <a href="https://apply.intelligencecareers.gov/job-description/1248692">https://apply.intelligencecareers.gov/job-description/1248692</a></p><h4><a href="https://apply.intelligencecareers.gov/job-description/1248692">Cool Tool</a></h4><p>Quickly find those hidden account deletion pages. <a href="https://justdeleteme.xyz/"> https://justdeleteme.xyz/</a></p><p>To the glee of the enterprise's Marketing departments, this tool helps you create the most suspicious-looking link possible.  <a href="https://creepylink.com/">https://creepylink.com/</a></p><div><hr></div><h4>Irrelevant</h4><p>It&#8217;s annoying that Wal-Mart doesn&#8217;t accept Apple Pay. Here&#8217;s an explanation why.  <a href="https://9to5mac.com/2026/01/18/heres-why-walmart-still-doesnt-support-apple-pay/">https://9to5mac.com/2026/01/18/heres-why-walmart-still-doesnt-support-apple-pay/</a></p><div><hr></div><h4>Sign Off</h4><p>Thanks for checking in again this week. A major storm is forecasted to hit most of the eastern U.S. this weekend, so please stay safe if you need to travel.</p><p>See you all next Tuesday.</p><p>Matt</p><p>&#8220;IT ISN&#8217;T A PROBLEM UNLESS YOU WORRY ABOUT IT.&#8221;</p><div><hr></div><p>Published every Tuesday, Threats Without Borders offers original commentary and educational pieces related to cybercrime investigations and information security topics. We also summarize and comment on news articles concerning active threat intelligence for the financial industry. The newsletter interests everyone tasked with cybersecurity or involved in preventing or investigating technology-enabled fraud, theft, or money laundering.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.threatswithoutborders.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Threats Without Borders! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Legal: I am not compensated by any entity for writing this newsletter. Obviously, anything written in this space is my own nonsensical opinions and doesn&#8217;t represent the official viewpoint of my employer or any associated organization. Blame me, not them.</p>]]></content:encoded></item><item><title><![CDATA[Threats Without Borders - Issue 269]]></title><description><![CDATA[Cyber Financial Crime Investigation Newsletter, week ending January 11th, 2026]]></description><link>https://www.threatswithoutborders.com/p/threats-without-borders-issue-269</link><guid isPermaLink="false">https://www.threatswithoutborders.com/p/threats-without-borders-issue-269</guid><dc:creator><![CDATA[Matt Dotts]]></dc:creator><pubDate>Tue, 13 Jan 2026 13:07:23 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!gnGB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec11d95e-ced3-4599-874c-6076838cd6ca_800x600.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Last week, an investigator asked me a common question: &#8220;Does a copy of a check deposited via mobile banking app qualify as the actual check?&#8221;</p><p>I&#8217;m not a lawyer, so don&#8217;t listen to me.</p><p>In 2004, Congress enacted the Check Clearing for the 21st Century Act, known as Check 21. It aimed to speed up check processing by allowing banks to handle checks electronically instead of shipping paper. The law introduced the &#8220;substitute check&#8221;: a paper printout of a digital image that has the same legal status as the original check. Essentially, this means that a digital copy created during mobile deposit can legally stand in for the physical check. The substitute check isn&#8217;t just evidence of the original; it is considered the original in legal terms.</p><p>This marked a significant shift from traditional negotiable instruments law, which relied on physical possession of the original document. Congress deemed these efficiency improvements worth the tradeoff, which is now crucial to the financial system.</p><p>For investigators, this raises questions about the Best Evidence Rule, which requires producing the original document unless there&#8217;s a valid reason not to. When the original check is unavailable, such as when it&#8217;s destroyed after digital imaging or submitted via mobile deposit, courts have accepted that the substitute check under Check 21 is legally equivalent to the original.</p><p>Presenting the digital copy satisfies the Best Evidence Rule because the law equates the two.</p><p>Congress knew that this approach posed a tradeoff; it enhanced efficiency and reduced costs but diminished certain forensic and evidentiary capabilities. Protections for consumers, like indemnity for incorrect substitute checks, exist, but they do not resolve issues in criminal cases where key evidence might be missing. While the law requires substitute checks to display certain legends clarifying they are reproductions, this does not help detect digital fraud exploits.</p><p>So, to revisit the question: does a mobile deposit image count as the actual check? Legally, I believe it does. However, I only play attorney online, so consult your prosecutor for certainty. </p><div><hr></div><h4>Speaking of checks</h4><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!3qMN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14b2d28c-f21b-4a09-bf2e-719229156f11_1002x700.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3qMN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14b2d28c-f21b-4a09-bf2e-719229156f11_1002x700.jpeg 424w, https://substackcdn.com/image/fetch/$s_!3qMN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14b2d28c-f21b-4a09-bf2e-719229156f11_1002x700.jpeg 848w, https://substackcdn.com/image/fetch/$s_!3qMN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14b2d28c-f21b-4a09-bf2e-719229156f11_1002x700.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!3qMN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14b2d28c-f21b-4a09-bf2e-719229156f11_1002x700.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3qMN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14b2d28c-f21b-4a09-bf2e-719229156f11_1002x700.jpeg" width="1002" height="700" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/14b2d28c-f21b-4a09-bf2e-719229156f11_1002x700.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:700,&quot;width&quot;:1002,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:168307,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.threatswithoutborders.com/i/184250198?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14b2d28c-f21b-4a09-bf2e-719229156f11_1002x700.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!3qMN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14b2d28c-f21b-4a09-bf2e-719229156f11_1002x700.jpeg 424w, https://substackcdn.com/image/fetch/$s_!3qMN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14b2d28c-f21b-4a09-bf2e-719229156f11_1002x700.jpeg 848w, https://substackcdn.com/image/fetch/$s_!3qMN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14b2d28c-f21b-4a09-bf2e-719229156f11_1002x700.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!3qMN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14b2d28c-f21b-4a09-bf2e-719229156f11_1002x700.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h4>The News</h4><p>Between July and December 2025, Team Cymru investigated carding infrastructure through internet-wide scanning, passive DNS, and NetFlow data. Their goal was to identify and monitor illicit carding markets and forums. By searching for keywords like &#8220;CVV&#8221; and &#8220;Carding&#8221; in HTTP/HTTPS banners and examining X509 certificates, they identified 28 unique IP addresses hosting carding activities. Many of these were linked to domains with TLDs such as .su, .cc, and .ru, often hosted by offshore providers like Privex that offer privacy-intensive VPS services, allowing cybercriminals to operate with minimal oversight. The findings underscore the role of carding markets as transactional platforms and forums as social hubs for cybercriminals. <a href="https://www.team-cymru.com/post/analysing-carding-infrastructure">https://www.team-cymru.com/post/analysing-carding-infrastructure</a></p><p>Two Pittsburgh business owners face charges from the Pennsylvania Attorney General's Office for conspiracy and handling proceeds of illegal activities, accused of conducting a complex EBT card fraud scheme. The investigation found that they bought EBT cards at discounted prices from benefit recipients, then used those cards for over 800 transactions totaling $178,289 at Sam&#8217;s Club and other stores, purchasing food items such as beef, chicken, bread, and drinks. They allegedly sold these items at their restaurant and deli on East Ohio Street in Pittsburgh, misusing a public assistance program meant to aid underserved residents to boost their business profits. <a href="https://www.attorneygeneral.gov/taking-action/attorney-general-sundays-organized-retail-crime-unit-charges-2-pittsburgh-business-owners-in-178k-ebt-card-scheme/">https://www.attorneygeneral.gov/taking-action/attorney-general-sundays-organized-retail-crime-unit-charges-2-pittsburgh-business-owners-in-178k-ebt-card-scheme/</a></p><p>The World Economic Forum published its Global Security Outlook 2026 report.  <a href="https://reports.weforum.org/docs/WEF_Global_Cybersecurity_Outlook_2026.pdf">https://reports.weforum.org/docs/WEF_Global_Cybersecurity_Outlook_2026.pdf</a></p><p>What do you mean it&#8217;s a wiretap? A Michigan man pleaded guilty to federal charges for knowingly marketing pcTattletale, a monitoring software he developed in 2002. He promoted it as a tool to spy on romantic partners without their consent. Although initially advertised for legitimate purposes like parental monitoring and employee tracking, he shifted to marketing it as a &#8220;catch a cheater&#8221; app. He provided instructions for secretly installing it on partners&#8217; phones while they slept and hiding evidence of its use. Federal investigators found substantial evidence that he supported users who explicitly said they were spying on spouses without permission, actively promoting the software with affiliate marketing aimed at people suspicious of cheating partners.  <a href="https://arstechnica.com/security/2026/01/michigan-man-learns-the-hard-way-that-catch-a-cheater-spyware-apps-arent-legal/">https://arstechnica.com/security/2026/01/michigan-man-learns-the-hard-way-that-catch-a-cheater-spyware-apps-arent-legal/</a></p><p>Group-IB has identified a sophisticated phishing campaign since August 2025 that impersonates DocuSign emails and uses LogoKit, a framework that dynamically customizes credential-harvesting pages in real time to match victim organizations.  <a href="https://www.group-ib.com/blog/docusign-impersonation-logokit/">https://www.group-ib.com/blog/docusign-impersonation-logokit/</a></p><p>Infoblox research shows that parked domains are now far more dangerous than before, with over 90% of visits leading to malicious content&#8212;a sharp increase from less than 5% a decade ago. The main threat comes from &#8220;direct search&#8221; or &#8220;zero-click parking&#8221; features that route users through complex traffic distribution systems (TDS) and ad networks, complicating attribution. The study uncovers three new threat actors who employ advanced techniques like DNS manipulation, double fast flux, and typosquatting on major brands to direct unsuspecting users, especially those making simple typos, toward scams, malware, and data theft. These domain owners actively profile visitors, serving safe parking pages to security scanners while funneling actual users to malicious advertisers. This creates a weaponized ecosystem where legitimate business practices enable cybercrime with little oversight.  <a href="https://www.infoblox.com/blog/threat-intelligence/parked-domains-become-weapons-with-direct-search-advertising/">https://www.infoblox.com/blog/threat-intelligence/parked-domains-become-weapons-with-direct-search-advertising/</a></p><p>Nineteen countries collaborated to arrest 574 individuals, recover approximately USD 3 million, and dismantle criminal infrastructure. <a href="https://www.trmlabs.com/resources/blog/international-cybercrime-operation-leads-to-574-arrests-and-usd-3-million-in-recovered-funds-2">https://www.trmlabs.com/resources/blog/international-cybercrime-operation-leads-to-574-arrests-and-usd-3-million-in-recovered-funds-2</a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ZwpL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e6c58eb-13ca-4a36-b7ea-01cc662928cc_1504x782.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ZwpL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e6c58eb-13ca-4a36-b7ea-01cc662928cc_1504x782.jpeg 424w, https://substackcdn.com/image/fetch/$s_!ZwpL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e6c58eb-13ca-4a36-b7ea-01cc662928cc_1504x782.jpeg 848w, https://substackcdn.com/image/fetch/$s_!ZwpL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e6c58eb-13ca-4a36-b7ea-01cc662928cc_1504x782.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!ZwpL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e6c58eb-13ca-4a36-b7ea-01cc662928cc_1504x782.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ZwpL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e6c58eb-13ca-4a36-b7ea-01cc662928cc_1504x782.jpeg" width="1456" height="757" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2e6c58eb-13ca-4a36-b7ea-01cc662928cc_1504x782.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:757,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:129366,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.threatswithoutborders.com/i/184250198?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e6c58eb-13ca-4a36-b7ea-01cc662928cc_1504x782.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ZwpL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e6c58eb-13ca-4a36-b7ea-01cc662928cc_1504x782.jpeg 424w, https://substackcdn.com/image/fetch/$s_!ZwpL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e6c58eb-13ca-4a36-b7ea-01cc662928cc_1504x782.jpeg 848w, https://substackcdn.com/image/fetch/$s_!ZwpL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e6c58eb-13ca-4a36-b7ea-01cc662928cc_1504x782.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!ZwpL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e6c58eb-13ca-4a36-b7ea-01cc662928cc_1504x782.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><a href="https://blog.barracuda.com/2026/01/07/threat-spotlight-phishing-kits-evolved-2025">https://blog.barracuda.com/2026/01/07/threat-spotlight-phishing-kits-evolved-2025</a></p><div><hr></div><h4>Cool Tools</h4><p>What do the attackers know about your website?  Or any website.  <a href="https://web-check.xyz/">https://web-check.xyz/</a></p><p>Send a self-destructing note.  <a href="https://burnernote.com/">https://burnernote.com/</a></p><h4>Cool Job</h4><p>Senior AML Investigations Trainer, Coinbase.  <a href="https://www.coinbase.com/careers/positions/6852375">https://www.coinbase.com/careers/positions/6852375</a></p><div><hr></div><h4>Mail</h4><p><em>Matt, I think you're off-base about the impact of AI on the level of fraud.  It&#8217;s playing a major role and is only going to get worse as the AI models become more reasonable in price and accessible in countries with less access to the higher-capacity computing needed to run them.</em> - DT</p><p><em>I appreciate your level-headed take on fraud trends and your resistance to pushing  fraud Panic-Porn on us.  I saw one group providing their trends, and it was clear they didn&#8217;t even understand the technology they were warning the rest of us to watch out for.  Then someone posted a video on LinkedIn about the mentioned trends report, and they had even less understanding.</em> - KDel</p><p><em>Matt: Enjoyed your article&nbsp;on what is new, is old.&nbsp; Hit the nail on the head.&nbsp; &nbsp;Another area that should be a focus is the insider threat.&nbsp; &nbsp;It has been around for years and is old, but those doing it are new, and the tools that they can use are new.&nbsp; Below is an example</em>. - CG</p><div><hr></div><h4>DFIR</h4><p>Atola provided a fairly comprehensive list of DFIR conferences to attend in 2026.  <a href="https://blog.atola.com/top-digital-forensic-conferences/">https://blog.atola.com/top-digital-forensic-conferences/</a></p><div><hr></div><h4>Irrelevant </h4><p>Increase your productivity, or at least sanity, using the Napoleon Technique.  <a href="https://effectiviology.com/napoleon/">https://effectiviology.com/napoleon/</a></p><div><hr></div><h4>Sign off</h4><p>I was driving through a local city and as I pulled up to an intersection, there was a man on the corner holding a panel of cardboard folded in half. As he opened it, I expected to see &#8220;Homeless Vet, Please Help, God Bless&#8221; or something similar to the traditional panhandler sign. Instead, it said, &#8220;WEED&#8221;. It totally threw me off, to the point that I sat halfway through the green light cycle as I processed the proposition. Are you selling or buying? What is it you want me to do???? I was literally knocked sideways by the unexpected ambiguity.</p><p>Welcome new subscribers! A small group of people like it here, and I hope you do as well.  Thank you for giving it a chance.</p><p>Send me email:  matt (at) threatswithoutborders.com</p><p>&#8220;WORRY IS INTEREST PAID ON TROUBLE BEFORE IT COMES DUE.&#8221;</p><div><hr></div><p>Published every Tuesday, Threats Without Borders offers original commentary and educational pieces related to cybercrime investigations and information security topics. We also summarize and comment on news articles concerning active threat intelligence for the financial industry. The newsletter interests everyone tasked with cybersecurity or involved in preventing or investigating technology-enabled fraud, theft, or money laundering.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.threatswithoutborders.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Threats Without Borders! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Legal: I am not compensated by any entity for writing this newsletter. Obviously, anything written in this space is my own nonsensical opinions and doesn&#8217;t represent the official viewpoint of my employer or any associated organization. Blame me, not them.</p>]]></content:encoded></item><item><title><![CDATA[Threats Without Borders - Issue 268]]></title><description><![CDATA[Cyber Financial Crime Investigation Newsletter, week ending January 4, 2026]]></description><link>https://www.threatswithoutborders.com/p/threats-without-borders-issue-268</link><guid isPermaLink="false">https://www.threatswithoutborders.com/p/threats-without-borders-issue-268</guid><dc:creator><![CDATA[Matt Dotts]]></dc:creator><pubDate>Tue, 06 Jan 2026 12:01:39 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!gnGB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec11d95e-ced3-4599-874c-6076838cd6ca_800x600.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Happy New Year - It&#8217;s gonna be the same</p><p>It&#8217;s that time when every blogger, YouTuber, LinkedIn warrior, and yes, even an itinerant newsletter writer, feels the need to guess what&#8217;s coming in the new year.</p><p>I look to the past.  In fact, I could probably just recycle what I wrote last year, and the year before that, and the year before that.</p><p>Because when it comes to cyber and financial crime, the old is always news again.</p><p>This past year, my organization was targeted with intensive email bomb attacks.  Didn&#8217;t have that on my bingo card, I mean, when were those last popular? Mid 2000&#8217;s? </p><p>And you know what else was crushing?  Social engineering attacks by telephone.  Email phishing. Card cracking...oh, that&#8217;s so 2015.   </p><p>Facebook Marketplace scams?  Believe it or not, over 3 billion people still use Facebook every day.  </p><p>And as <a href="https://www.linkedin.com/in/david-maimon-29343632/">David Maimon</a> so directly highlights just about every week on LinkedIn, check fraud.  Yeah, paper check fraud.</p><p>Sure, technology has been used to enhance these old-school attacks to make them more effective, but for the most part, the bad guys don&#8217;t stray too far from the playbook.</p><p>But Matt, what about DDoS and ransomware?  Just extortion.  Same &#8216;ol crime, new technology.  There are practical solutions to prevent both. </p><p>And as far as AI, it&#8217;s a real danger for sure... but not because it&#8217;s going to be used to launch some complex and elaborate attack against our network infrastructure.  It&#8217;s because employees are loading corporate secrets into it while writing a product brief, or giving away their customer database while formatting a spreadsheet.  </p><p>Don&#8217;t hear what I&#8217;m not saying.  There are many advanced technological attacks, but for the most part, the real risk comes from the non-technical.  </p><p>As an investigator, dedicate yourself to learning about the newest threats, but don&#8217;t forget where we&#8217;ve been. </p><p>Welcome to 2026, or maybe 2016.  </p><div><hr></div><h4>The News&#8230;</h4><p>Baker University disclosed a data breach affecting more than 53,000 individuals, revealing that attackers accessed its network from December 2-19, 2024 and stole sensitive information. The Kansas school hasn&#8217;t released information about the cause of the breach.  <a href="https://www.bakeru.edu/wp-content/uploads/2025/12/Baker-Unviersity-Final-Website-Notice.pdf">https://www.bakeru.edu/wp-content/uploads/2025/12/Baker-Unviersity-Final-Website-Notice.pdf</a></p><p>The U.S. Attorney&#8217;s Office, working with international partners and the Michigan State Police, dismantled the online infrastructure of E-Note, a cryptocurrency exchange reportedly used for money laundering by transnational cybercriminal groups. Operating since 2010, the service provided money laundering services to cybercriminals, enabled international transfer of criminal funds, and converted cryptocurrency into cash. It&#8217;s good to see a cyber task force receive credit for its efforts.  <a href="https://www.justice.gov/usao-edmi/pr/fbi-disrupts-virtual-money-laundering-service-used-facilitate-criminal-activity">https://www.justice.gov/usao-edmi/pr/fbi-disrupts-virtual-money-laundering-service-used-facilitate-criminal-activity</a></p><p>Brad Duncan at the Sans Internet Storm Center examines some cryptocurrency scam emails.  <a href="https://isc.sans.edu/diary/rss/32594">https://isc.sans.edu/diary/rss/32594</a></p><p>I teach a class called &#8220;How the Internet Works,&#8221; which delves into the development of IPv6 and why it&#8217;s not being adopted.  IPv6, now 30 years old, was created in 1995 to address the looming IPv4 address shortage by expanding from 32-bit to 128-bit addresses, significantly increasing the available IP pool. Yet, less than half of internet users have adopted IPv6 due to its limited features beyond the larger address space, lack of backward compatibility with IPv4, and the widespread use of Network Address Translation (NAT), which allows multiple devices to share a single IPv4 address. <a href="https://www.theregister.com/2025/12/31/ipv6_at_30/">https://www.theregister.com/2025/12/31/ipv6_at_30/</a></p><p>More like an incident non-response.  Hernando County government website and services were offline for over a year and a half due to a Rhysida ransomware attack. The county recently confirmed data exfiltration, although the local newspaper has been actively reporting on the incident throughout.  Nice of the County to final confirm what the local reporter knew 18 months ago.  <a href="https://www.hernandosun.com/2026/01/02/hernando-county-notices-cybersecurity-breach-21-months-later/">https://www.hernandosun.com/2026/01/02/hernando-county-notices-cybersecurity-breach-21-months-later/</a></p><p>Though not a major vulnerability, I tested this issue and confirmed it. A quirk in the iPhone Camera app causes the camera to activate when the app icon is touched, even if the app isn't opened.  <a href="https://blog.jgc.org/2025/12/if-you-care-about-security-you-might.html">https://blog.jgc.org/2025/12/if-you-care-about-security-you-might.html</a></p><div><hr></div><h4>Reader Mail</h4><p><em>Matt, my victim purchased some &#8220;Bitcoin&#8221; from someone on Facebook Marketplace.  I&#8217;ve attached an image from the ad for your amusement. </em>- G</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!deuW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F740c9662-6e14-4abe-89b9-32a7d1cfeceb_1050x1018.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!deuW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F740c9662-6e14-4abe-89b9-32a7d1cfeceb_1050x1018.jpeg 424w, https://substackcdn.com/image/fetch/$s_!deuW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F740c9662-6e14-4abe-89b9-32a7d1cfeceb_1050x1018.jpeg 848w, https://substackcdn.com/image/fetch/$s_!deuW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F740c9662-6e14-4abe-89b9-32a7d1cfeceb_1050x1018.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!deuW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F740c9662-6e14-4abe-89b9-32a7d1cfeceb_1050x1018.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!deuW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F740c9662-6e14-4abe-89b9-32a7d1cfeceb_1050x1018.jpeg" width="1050" height="1018" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/740c9662-6e14-4abe-89b9-32a7d1cfeceb_1050x1018.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1018,&quot;width&quot;:1050,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:278460,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.threatswithoutborders.com/i/183499925?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F740c9662-6e14-4abe-89b9-32a7d1cfeceb_1050x1018.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!deuW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F740c9662-6e14-4abe-89b9-32a7d1cfeceb_1050x1018.jpeg 424w, https://substackcdn.com/image/fetch/$s_!deuW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F740c9662-6e14-4abe-89b9-32a7d1cfeceb_1050x1018.jpeg 848w, https://substackcdn.com/image/fetch/$s_!deuW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F740c9662-6e14-4abe-89b9-32a7d1cfeceb_1050x1018.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!deuW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F740c9662-6e14-4abe-89b9-32a7d1cfeceb_1050x1018.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This raises a genuine legal question: Is there a crime here? Clearly, the buyer failed to do basic research to understand what they intended to buy versus what they actually purchased. Where is the line between &#8220;theft by deception&#8221; and &#8220;buyer beware"? If I advertise an elephant for sale with a picture of a Husky and deliver a dog instead of an elephant, is that theft? Or is the buyer simply negligent or maybe plain stupid?</p><p>Send me mail: matt (at) threatswithoutborders.com</p><div><hr></div><h4>If the rent is too damn low</h4><p>(It&#8217;s probably a scam)</p><p>The FTC released a new Data Spotlight report highlighting nearly 65,000 rental scams since 2020, resulting in approximately $65 million in losses, with the actual harm likely much higher due to underreporting.</p><p>Some highlights of the report:</p><ul><li><p>Scammers create fake listings by copying legitimate ads, changing contact information, or fabricating properties with attractive photos and below-market rent</p></li><li><p>Facebook is the most reported platform (50% of scams), followed by Craigslist (16%)</p></li><li><p>Young adults ages 18-29 are three times more likely to lose money to rental scams than other age groups</p></li><li><p>The median reported loss is $1,000 per victim</p></li></ul><p><a href="https://www.ftc.gov/news-events/data-visualizations/data-spotlight/2025/12/rental-scams-hit-home-65-million-reported-losses">https://www.ftc.gov/news-events/data-visualizations/data-spotlight/2025/12/rental-scams-hit-home-65-million-reported-losses</a></p><div><hr></div><h4>Cool Job</h4><p>Director of Intelligence and Investigations - Major League Soccer.  <a href="https://careers-mlssoccer.icims.com/jobs/2207/job">https://careers-mlssoccer.icims.com/jobs/2207/job</a></p><p>Senior Manager, Payments and Fraud - Tapestry <a href="https://careers.tapestry.com/job/North-Bergen-Sr_-Manager%2C-Payments-&amp;-Fraud-NJ/1262914600/">https://careers.tapestry.com/job/North-Bergen-Sr_-Manager%2C-Payments-&amp;-Fraud-NJ/1262914600/</a></p><h4>Cool Tool</h4><p>Search public forums and message boards: <a href="https://boardreader.com/">https://boardreader.com/</a></p><p>IntelOwl is an open-source platform built for managing large-scale threat intelligence. It combines a variety of online analyzers and sophisticated malware analysis tools to offer comprehensive insights from a single interface. <a href="https://github.com/intelowlproject/IntelOwl">https://github.com/intelowlproject/IntelOwl</a></p><div><hr></div><h4>Irrelevant</h4><p>Last week, I provided an overview of the iOS apps that were moved to my phone's home screen due to heavy usage.  Here are my favorite macOS applications.</p><p><a href="https://brave.com/download/">Brave </a>is my web browser of choice.  It&#8217;s not as full-featured as Safari, but it is privacy-focused and secure, and it includes the best ad and pop-up blocker built in.  </p><p>My information documentation and retention system includes <a href="https://obsidian.md/">Obsidian</a> as my knowledge base, where I store long-term information&#8212;think of it as a personal Wiki. For routine notes, I use <a href="https://bear.app/">Bear</a>. Almost all begin as a note in Bear and are moved to other repositories as needed. Bear uses tags for organization rather than folders. It&#8217;s awkward at first, but once you get the hang of it, you don&#8217;t want to use anything else. Additionally, I use Apple Notes for documentation tasks such as saving receipts or property inventories. </p><p>As mentioned in the iOS post, <a href="https://culturedcode.com/things/">Things 3</a> is my task manager / To-Do application.  It&#8217;s simple and effective.</p><p>All my writing starts in <a href="https://getdrafts.com/">Drafts</a>. It&#8217;s hard to find another app that&#8217;s as effective and efficient as Drafts, regardless of the app&#8217;s purpose. It&#8217;s really good, and the development team keeps it on point. I&#8217;ll transfer writing out of Drafts to other resources as needed. And of course, everything gets run through <a href="https://www.grammarly.com/">Grammarly</a>. I pay for the Pro license, and it&#8217;s easily one of my best investments.  </p><p>I&#8217;ve tested nearly all commercially available AI and LLM models. My most used are <a href="https://www.perplexity.ai/">Perplexity,</a> for Internet searches and general knowledge, and <a href="https://www.claude.ai">Claude</a>, which I find excellent for ideation and exploring topics.  </p><p>I use so many different utility and single-function apps that I can&#8217;t list them all.  Some of the MVPs are: </p><p><a href="https://www.jibapps.com/apps/trashme3/">TrashMe</a> to remove apps and files from my Mac permanently.  Dragging and dropping an app into the trash can (the Apple-recommended method) leaves orphaned files and folders scattered across the entire file system.  TrashMe gets them all.</p><p><a href="https://cleanshot.com/">Cleanshot X</a> is the best app for screenshots and recordings. <a href="https://apps.apple.com/us/app/amphetamine/id937984704?mt=12">Amphetamine</a> is a small utility that keeps your machine from going to sleep. If you know, you know.</p><p>And I use many more, but you&#8217;re no longer reading at this point.</p><div><hr></div><h4>Sign Off</h4><p>Thanks for sticking around another year!  I can&#8217;t promise the newsletter will be great, but it probably can&#8217;t get worse.</p><p>See you next Tuesday.</p><p>Matt</p><p>&#8220;YOU WILL REGRET THINGS YOU DO NOT DO MORE THAN THE THINGS YOU DO.&#8221;</p><p>Published every Tuesday, Threats Without Borders offers original commentary and educational pieces related to cybercrime investigations and information security topics. We also summarize and comment on news articles concerning active threat intelligence for the financial industry. The newsletter interests everyone tasked with cybersecurity or involved in preventing or investigating technology-enabled fraud, theft, or money laundering.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.threatswithoutborders.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Threats Without Borders! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Legal: I am not compensated by any entity for writing this newsletter. Obviously, anything written in this space is my own nonsensical opinions and doesn&#8217;t represent the official viewpoint of my employer or any associated organization. Blame me, not them.</p><p></p>]]></content:encoded></item><item><title><![CDATA[Threats Without Borders - Issue 267]]></title><description><![CDATA[Cyber Financial Crime Investigation Newsletter, week ending December 28, 2025]]></description><link>https://www.threatswithoutborders.com/p/threats-without-borders-issue-267</link><guid isPermaLink="false">https://www.threatswithoutborders.com/p/threats-without-borders-issue-267</guid><dc:creator><![CDATA[Matt Dotts]]></dc:creator><pubDate>Tue, 30 Dec 2025 13:27:53 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!gnGB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec11d95e-ced3-4599-874c-6076838cd6ca_800x600.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I recently saw a social media post in which a young woman mentioned her earnings from Sugar Sites. How sweet!</p><p>Let&#8217;s start from the beginning: What is &#8220;Sugaring&#8221;?</p><p>Sugar dating is a relationship arrangement in which one person, often referred to as a &#8220;sugar daddy&#8221; or &#8220;sugar mommy,&#8221; provides financial support, gifts, or other benefits to another person, known as a &#8220;sugar baby,&#8221; in exchange for companionship, which can range from casual dating, to a single instance of sex, to regularly scheduled encounters. These arrangements are often facilitated through specialized websites and apps designed to connect potential sugar daddies/mommies with sugar babies.</p><p>Sounds like prostitution to me. Let&#8217;s check: Prostitution -- The act of exchanging sex or intimate companionship for financial compensation. </p><p>Yep. Checks out.</p><p>Unfortunately, we&#8217;ve reached a point in society where shame and stigma no longer exist. One of the most popular sugar sites, Sugarbook, uses the tagline &#8220;Where Romance Meets Finance.&#8221;</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!AgMx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68826df0-823a-46c2-9646-b9c6bfd586cd_1424x704.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!AgMx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68826df0-823a-46c2-9646-b9c6bfd586cd_1424x704.jpeg 424w, https://substackcdn.com/image/fetch/$s_!AgMx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68826df0-823a-46c2-9646-b9c6bfd586cd_1424x704.jpeg 848w, https://substackcdn.com/image/fetch/$s_!AgMx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68826df0-823a-46c2-9646-b9c6bfd586cd_1424x704.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!AgMx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68826df0-823a-46c2-9646-b9c6bfd586cd_1424x704.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!AgMx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68826df0-823a-46c2-9646-b9c6bfd586cd_1424x704.jpeg" width="1424" height="704" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/68826df0-823a-46c2-9646-b9c6bfd586cd_1424x704.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:704,&quot;width&quot;:1424,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:102790,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.threatswithoutborders.com/i/182858367?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68826df0-823a-46c2-9646-b9c6bfd586cd_1424x704.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!AgMx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68826df0-823a-46c2-9646-b9c6bfd586cd_1424x704.jpeg 424w, https://substackcdn.com/image/fetch/$s_!AgMx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68826df0-823a-46c2-9646-b9c6bfd586cd_1424x704.jpeg 848w, https://substackcdn.com/image/fetch/$s_!AgMx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68826df0-823a-46c2-9646-b9c6bfd586cd_1424x704.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!AgMx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68826df0-823a-46c2-9646-b9c6bfd586cd_1424x704.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>So yeah, there are many morally compromised people on these sites, which creates the perfect environment for fraud.</p><p>Scammers exploit the sugar dating model by targeting those looking for companionship or financial help. They begin with fake profiles, using attractive photos and persuasive bios to attract potential sugar babies or daddies. Often, they pretend to be wealthy and generous daddies offering significant financial support, or desirable sugar babies with the physical attractiveness seen only in the modeling industry.  </p><p>Here are some common tactics used by scammers in the sugar-dating world:</p><ul><li><p>Advance Fee Fraud: The scammer promises to send money or gifts but first asks the victim to pay a fee, such as a processing fee, customs fee, or a payment to verify their identity. Once the fee is paid, the scammer disappears. Yes, gift cards are the preferred currency.</p></li><li><p>Phishing for Personal Information: Scammers ask for personal information, including banking details, Social Security numbers, or other personal data under the guise of setting up direct deposits or verifying identity. This information is then used for identity theft or sold in criminal markets.</p></li><li><p>Money Laundering: Scammers ask sugar babies to receive funds and then transfer them to another account, making the sugar baby an unwitting participant in money laundering activities. AKA Money Mule!</p></li><li><p>Romance Scams: Scammers exploit the emotional aspect of sugar dating by faking a romantic interest to gain trust. Once trust is established, they concoct stories about financial emergencies, asking for money to cover medical bills, legal fees, or travel expenses.</p></li></ul><p>This goes both ways&#8230; scammers impersonate the daddies and mommies to scam the babies, and scammers impersonate the babies to scam the daddies.</p><p>And most of this crime never gets reported to law enforcement. How do you explain why you were meeting people through one of these websites?  </p><p>Oh, that&#8217;s right, they were seeking to hire a &#8220;personal assistant&#8221;.</p><div><hr></div><h4>The News&#8230;</h4><p>At any given point, 50% of mobile devices connected to the Internet are running outdated versions of their operating system - Zimperium Mobile Threat Report.  <a href="https://lp.zimperium.com/hubfs/Reports/2025%20Global%20Mobile%20Threat%20Report.pdf?hsLang=en">https://lp.zimperium.com/hubfs/Reports/2025%20Global%20Mobile%20Threat%20Report.pdf?hsLang=en</a></p><p>The SEC accused multiple crypto trading platforms and investment clubs of defrauding US retail investors of more than $14 million via a social media scam. These platforms falsely claimed to be government-licensed and promoted fake Security Token Offerings.  <a href="https://www.sec.gov/files/litigation/complaints/2025/comp-pr2025-144.pdf">https://www.sec.gov/files/litigation/complaints/2025/comp-pr2025-144.pdf</a></p><p>The U.S. government seized the &#8216;web3adspanels.org&#8217; domain used by cybercriminals to host stolen bank login credentials. The FBI identified at least 19 victims in the U.S., with attempted losses of $28 million and actual losses of $14.6 million.  <a href="https://www.justice.gov/usao-ndga/pr/justice-department-announces-seizure-stolen-password-database-used-bank-account">https://www.justice.gov/usao-ndga/pr/justice-department-announces-seizure-stolen-password-database-used-bank-account</a></p><p>Flare explores how cybercriminals exploit cryptocurrency for illegal activities and how investigators can track them. Of course, readers of Tw/oB already know all of this! <a href="https://flare.io/learn/resources/blog/investigating-cybercrime-crypto-underground/">https://flare.io/learn/resources/blog/investigating-cybercrime-crypto-underground/</a></p><p>Aflac disclosed a data breach affecting 22.65 million people, exposing personal information, including Social Security numbers and health data. The breach may be linked to a cybercriminal organization known as &#8220;Scattered Spider,&#8221; which targets the insurance industry.   <a href="https://techcrunch.com/2025/12/23/us-insurance-giant-aflac-says-hackers-stole-personal-and-health-data-of-22-6-million-people/">https://techcrunch.com/2025/12/23/us-insurance-giant-aflac-says-hackers-stole-personal-and-health-data-of-22-6-million-people/</a></p><div><hr></div><h4>DFIR</h4><p>Flashpoint  notes 800% increase in credential theft since early 2025 that has compromised over 1.8 billion accounts. The article details three key tactics threat actors use to bypass security defenses: manipulating Windows&#8217; Mark of the Web protection through drag-and-drop social engineering, exploiting vulnerabilities in trusted processes like Chrome, and targeting less-secure alternative software with weaker protections.  <a href="https://flashpoint.io/blog/the-infostealer-gateway-uncovering-latest-methods-defense-evasion/">https://flashpoint.io/blog/the-infostealer-gateway-uncovering-latest-methods-defense-evasion/</a></p><div><hr></div><h4>Cool Tool</h4><p>Elcomsoft makes several of its forensic tools free to download and use.  <a href="https://www.elcomsoft.com/news/873.html">https://www.elcomsoft.com/news/873.html</a></p><p>The official release of Parrot OS 7 is available for download.  <a href="https://parrot.sh/blog/2025-12-24-parrot-7.0-release-notes/">https://parrot.sh/blog/2025-12-24-parrot-7.0-release-notes/</a></p><h4>Cool Job</h4><p>Global Financial Crimes Training Officer, Morgan Stanley.  <a href="https://morganstanley.eightfold.ai/careers/job?domain=morganstanley.com&amp;pid=549785402892&amp;src=JB-10147">https://morganstanley.eightfold.ai/careers/job?domain=morganstanley.com&amp;pid=549785402892&amp;src=JB-10147</a></p><div><hr></div><p>Feedback: matt (at) threatswithoutborders.com </p><div><hr></div><h4>Irrelevant</h4><p>It&#8217;s been a while since I did this, and with the year ending, it&#8217;s the perfect time for an app review. Which applications have made it to my mobile device&#8217;s homescreen in 2025?</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!tAuk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d62450f-4d13-4be0-8e30-ea72ef8ab95e_1170x2532.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!tAuk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d62450f-4d13-4be0-8e30-ea72ef8ab95e_1170x2532.png 424w, https://substackcdn.com/image/fetch/$s_!tAuk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d62450f-4d13-4be0-8e30-ea72ef8ab95e_1170x2532.png 848w, https://substackcdn.com/image/fetch/$s_!tAuk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d62450f-4d13-4be0-8e30-ea72ef8ab95e_1170x2532.png 1272w, https://substackcdn.com/image/fetch/$s_!tAuk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d62450f-4d13-4be0-8e30-ea72ef8ab95e_1170x2532.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!tAuk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d62450f-4d13-4be0-8e30-ea72ef8ab95e_1170x2532.png" width="1170" height="2532" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8d62450f-4d13-4be0-8e30-ea72ef8ab95e_1170x2532.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2532,&quot;width&quot;:1170,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3408442,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.threatswithoutborders.com/i/182858367?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d62450f-4d13-4be0-8e30-ea72ef8ab95e_1170x2532.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!tAuk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d62450f-4d13-4be0-8e30-ea72ef8ab95e_1170x2532.png 424w, https://substackcdn.com/image/fetch/$s_!tAuk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d62450f-4d13-4be0-8e30-ea72ef8ab95e_1170x2532.png 848w, https://substackcdn.com/image/fetch/$s_!tAuk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d62450f-4d13-4be0-8e30-ea72ef8ab95e_1170x2532.png 1272w, https://substackcdn.com/image/fetch/$s_!tAuk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d62450f-4d13-4be0-8e30-ea72ef8ab95e_1170x2532.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>From the top - Left to Right</strong></p><p>Settings - Mandatory</p><p>Photos - Of course</p><p>Clock - I need to wake up in the morning</p><p>Bible App - I try to be a good person</p><p>Coinbase - Someday my Shib boat will come in!  I currently own 28 crypto assets, and I&#8217;ve found that Coinbase is the best brokerage for managing them.</p><p>SoFi - I needed a separate bank account to keep my crypto activity separate from my main financial accounts, so I opened one with SoFi.  It&#8217;s been a really good experience, and they're allegedly releasing a cryptocurrency exchange as part of their standard service.</p><p>Ring - Home surveillance. If you come to my home, you will be surveilled.</p><p>Substack - Obvious</p><p>LastPass - Yes, they had a little security issue, but it&#8217;s a great password manager, and I think probably one of the most secure at this point.  What&#8217;s the safest airline to fly on? The one that just had a failure.</p><p>Weather - I need to know how to dress for the day</p><p>Bear is my preferred note app. There really isn&#8217;t a better choice if you&#8217;re committed to the Apple ecosystem. It offers a beautiful and seamless experience. While Apple Notes is improving, it still lacks the polish and customization that Bear provides. Using Bear makes me happy.</p><p>Brave is the best web browser for security and privacy.  Not as integrated as Safari, but I&#8217;ll sacrifice some functionality for privacy.</p><p>Proton Mail - A great privacy-based and free, email service</p><p>Spotify - I never thought I&#8217;d pay for music, but my youngest son gave me a 3-month subscription as a gift, and I&#8217;ve never looked back.  It&#8217;s a really great experience, and the AI DJ is spot on (most of the time).</p><p>Things is a really well-done task management app made exclusively for Apple products.  It&#8217;s how I GSD.</p><p>Waze - I&#8217;d literally be lost without it.  It blows my mind that an app this good is still free. It makes all the other travel routing apps look childish. It&#8217;s earned my trust to the point that when it tells me to divert from my initial route, I do it. Even if I already know where I&#8217;m going.</p><p>Snapchat - My kids won&#8217;t answer my phone calls, but a Snap gets an immediate response.</p><p>DraftKings - I like to throw my money away. I am going to start extorting NFL players: pay me 100 per week, or I&#8217;ll include you in my parlay, which guarantees you will not score a TD.</p><p>Instagram - A good way to keep up with family and friends.  Reels can suck me in, though, and I have to watch not to get caught up in doom scrolling.  I&#8217;ve literally lost hours.</p><p>Signal - Please use this as your encrypted messaging application.  </p><p>Dunkin Donuts - Every day.  I currently have 2029 reward points.  I probably spend way too much money on coffee.</p><p>Calendar - My schedule can be hectic, so I need to know where I should be and at what time. I also use a Blue Sky paper calendar because I prefer to see my entire schedule laid out at once. I find that maintaining two calendars - one digital and one analog - keeps me more focused and responsible.</p><p>HearMax app - Pro Tip for young police officers: when they tell you to wear hearing protection at the range, wear it - and those little foam plugs don&#8217;t count.  Hearing loss sucks.  Wearing hearing aids sucks. Protect your hearing.</p><p>ReSound app - See above.  I have hearing loss-induced tinnitus, so I hear a high-frequency white noise in my left ear 24/7.  This app offers different sounds to provide some relief.  I listen to crickets.  Yep, crickets chirp at the same frequency as my tinnitus, so sometimes when you&#8217;re talking to me, I&#8217;m literally hearing crickets.</p><p>Next week, I&#8217;ll review my favorite Mac apps.</p><div><hr></div><h4>Sign Off</h4><p>Thank you for your loyalty to the newsletter in 2025. I understand there&#8217;s a lot of competition for your attention, and I don&#8217;t take it for granted that you&#8217;ll return here every Tuesday. </p><p>Wishing you all a happy New Year and even greater success than you can imagine. 2026.</p><p>Matt</p><p>&#8220;An optimist stays up until midnight to see the new year in. A pessimist stays up to make sure the old year leaves.&#8221; <em>&#8212;Bill Vaughan</em></p><div><hr></div><p>Published every Tuesday, Threats Without Borders offers original commentary and educational pieces related to cybercrime investigations and information security topics. We also summarize and comment on news articles concerning active threat intelligence for the financial industry. The newsletter interests everyone tasked with cybersecurity or involved in preventing or investigating technology-enabled fraud, theft, or money laundering.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.threatswithoutborders.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Threats Without Borders! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Legal: I am not compensated by any entity for writing this newsletter. Obviously, anything written in this space is my own nonsensical opinions and doesn&#8217;t represent the official viewpoint of my employer or any associated organization. Blame me, not them.</p>]]></content:encoded></item><item><title><![CDATA[Threats Without Borders - Issue 266]]></title><description><![CDATA[Cybercrime Investigation Newsletter, Week ending December 21, 2025]]></description><link>https://www.threatswithoutborders.com/p/threats-without-borders-issue-266</link><guid isPermaLink="false">https://www.threatswithoutborders.com/p/threats-without-borders-issue-266</guid><dc:creator><![CDATA[Matt Dotts]]></dc:creator><pubDate>Tue, 23 Dec 2025 10:42:20 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!gnGB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec11d95e-ced3-4599-874c-6076838cd6ca_800x600.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>While every day someone new appears online self-proclaiming themselves as a rockstar, warrior, or champion, in the fight against cyber fraud, Gary Warner continues to crush it, without flare, pomp, or circumstance, just as he has for years.  </p><p>This week, he absolutely slayed the Financial Times and their new documentary highlighting (allegedly) the extent of cybercrime victimization. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!oxjG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f3766b5-3c1b-46a5-839e-d3765f854e61_972x2058.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!oxjG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f3766b5-3c1b-46a5-839e-d3765f854e61_972x2058.jpeg 424w, https://substackcdn.com/image/fetch/$s_!oxjG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f3766b5-3c1b-46a5-839e-d3765f854e61_972x2058.jpeg 848w, https://substackcdn.com/image/fetch/$s_!oxjG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f3766b5-3c1b-46a5-839e-d3765f854e61_972x2058.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!oxjG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f3766b5-3c1b-46a5-839e-d3765f854e61_972x2058.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!oxjG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f3766b5-3c1b-46a5-839e-d3765f854e61_972x2058.jpeg" width="972" height="2058" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8f3766b5-3c1b-46a5-839e-d3765f854e61_972x2058.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2058,&quot;width&quot;:972,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1090174,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.threatswithoutborders.com/i/182260388?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f3766b5-3c1b-46a5-839e-d3765f854e61_972x2058.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!oxjG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f3766b5-3c1b-46a5-839e-d3765f854e61_972x2058.jpeg 424w, https://substackcdn.com/image/fetch/$s_!oxjG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f3766b5-3c1b-46a5-839e-d3765f854e61_972x2058.jpeg 848w, https://substackcdn.com/image/fetch/$s_!oxjG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f3766b5-3c1b-46a5-839e-d3765f854e61_972x2058.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!oxjG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f3766b5-3c1b-46a5-839e-d3765f854e61_972x2058.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Wouldn&#8217;t you love to have been in the room when the writers, producers, and executives of this documentary read Gary&#8217;s breakdown of the actual numbers?  Of course, they were probably too exhausted from the congratulatory backslapping to actually comprehend their own destruction.</p><p>Yes, I know, you shouldn&#8217;t throw out the baby with the bathwater.  Just because the math is fuzzy doesn&#8217;t mean the rest of the documentary is worthless.  </p><p>Maybe, but I think I&#8217;ll stick with Gary.  And you probably should too.</p><div><hr></div><h4>Internet searches are not private - at least not in Pennsylvania</h4><p>The Pennsylvania Supreme Court in Commonwealth v. Kurtz ruled that basic Google searches are not protected by Fourth Amendment or state privacy rights. The court upheld the use of a &#8220;reverse keyword warrant&#8221; that helped police identify and convict a suspect in a 2018 kidnapping and rape case. Applying the &#8220;third-party doctrine,&#8221; the court said users who search on Google without privacy tools share their queries with the company and accept the risk of law enforcement access. While this ruling only covers &#8220;general, unprotected internet use&#8221; and leaves room for stronger privacy claims through VPNs or private browsing. </p><p>Here is the actual decision: <a href="https://www.pacourts.us/assets/opinions/SUPREME/out/J-36A-2024oajc%20-%20106611829340009817.pdf">https://www.pacourts.us/assets/opinions/SUPREME/out/J-36A-2024oajc%20-%20106611829340009817.pdf</a></p><p>And the obligatory opinion by Prof. Kerr: <a href="https://reason.com/volokh/2025/12/16/are-there-fourth-amendment-rights-in-google-search-terms/">https://reason.com/volokh/2025/12/16/are-there-fourth-amendment-rights-in-google-search-terms/</a></p><div><hr></div><h4>Mail</h4><p><em>My wife and I thought there was a marching band competition our first time to Nashville.  Sadly, we found it was only the kids drumming on buckets.  Thanks for the laugh.</em>  - KP</p><p><em>Matt, congratulations on your first trip to Smashville.  It&#8217;s a great place.  You can go back in August to attend the IAFCI training conference.</em>  -AG</p><div><hr></div><h4>The News&#8230;</h4><p>Last week, I spoke to a local civic group and told about a time when I threatened a bank official with arrest because they let an eighty-nine-year-old leave with nine thousand dollars in cash, which she immediately sent via FedEx to another state. Now, as THE bank official, I see things differently. Here is a case where an elderly woman from New York lost her entire $700,000 life savings to a complex scam that started in August 2023, after false pop-up warnings claimed her accounts were hacked. Over nine months, scammers persuaded her to make unusual withdrawals and wire transfers, claiming it was to protect her funds by converting them to gold, including $275,000 from Merrill Lynch, $150,000 from TD Bank, and over $100,000 from UBS. Her family has filed a lawsuit against the banks for negligence, stating they failed to flag suspicious activity despite her never withdrawing more than $5,000 in over 30 years.  <a href="https://www.forbes.com/sites/steveweisman/2025/12/21/elderly-woman-loses-700000--to-scam-banks-accused-of-ignoring-red-flags/">https://www.forbes.com/sites/steveweisman/2025/12/21/elderly-woman-loses-700000--to-scam-banks-accused-of-ignoring-red-flags/</a></p><p>This Splunk blog examines over 213 million domain registrations from 2023-2025 to show how cybercriminals quickly set up fraudulent infrastructure in response to current events. The study highlights three main patterns: natural disasters like the 2025 LA Palisades Fire lead to immediate increases in fake donation and relief sites; cryptocurrency events, such as Bitcoin reaching all-time highs, result in significant fraud activity with lasting effects like financial grooming scams; and financial instability, especially due to insurance rate hikes in 2024, prompts waves of phishing domains. The research reveals that attackers frequently capitalize on public attention during crises, with malicious domains often appearing within hours of major events. This suggests that defenders can anticipate emerging threats by monitoring new domain registrations containing relevant keywords and suspicious features during ongoing events.  <a href="https://www.splunk.com/en_us/blog/security/insights-from-domain-registration-trends.html">https://www.splunk.com/en_us/blog/security/insights-from-domain-registration-trends.html</a></p><p>Attackers are using advanced phishing kits that directly target authentication flows, bypassing MFA and enabling real-time session theft. These kits are marketed based on capabilities rather than specific tools, reflecting a mature ecosystem. Phishing infrastructure is now cloud-native and Kubernetes-backed, allowing for rapid scaling and high availability. Flare shows us how these phish kits work.  <a href="https://flare.io/learn/resources/blog/phishing-kits-an-interactive-deepdive/">https://flare.io/learn/resources/blog/phishing-kits-an-interactive-deepdive/</a></p><p>Malwarebytes breaks down a phishing campaign that uses a purchase order as bait.  <a href="https://www.malwarebytes.com/blog/threat-intel/2025/12/inside-a-purchase-order-pdf-phishing-campaign">https://www.malwarebytes.com/blog/threat-intel/2025/12/inside-a-purchase-order-pdf-phishing-campaign</a></p><p>The social searcher blog offers strategies for turning real names into usernames.  <a href="https://www.social-searcher.com/2025/12/12/how-to-find-social-accounts-by-real-name-the-reverse-strategy/">https://www.social-searcher.com/2025/12/12/how-to-find-social-accounts-by-real-name-the-reverse-strategy/</a></p><p>Two Maryland men have pleaded guilty to conspiring in a money-laundering scheme involving more than $11 million. The conspiracy, which began in 2021, involved wire fraud proceeds laundered through shell companies and encrypted communications.  <a href="https://thebaynet.com/maryland-men-plead-guilty-in-multi-million-dollar-money-laundering-conspiracy/">https://thebaynet.com/maryland-men-plead-guilty-in-multi-million-dollar-money-laundering-conspiracy/</a></p><p>A coordinated cybercrime crackdown across 19 African countries, resulted in 574 arrests and the recovery of approximately USD 3 million in illicit funds. The operation targeted business email compromise (BEC), digital extortion, and ransomware, taking down over 6,000 malicious links and decrypting six ransomware variants. And they&#8217;ll all be back online within 48 hours.  <a href="https://www.interpol.int/fr/Actualites-et-evenements/Actualites/2025/574-arrests-and-USD-3-million-recovered-in-coordinated-cybercrime-operation-across-Africa">https://www.interpol.int/fr/Actualites-et-evenements/Actualites/2025/574-arrests-and-USD-3-million-recovered-in-coordinated-cybercrime-operation-across-Africa</a></p><div><hr></div><h4>DFIR</h4><p>Cofense highlights how threat actors leverage built-in Windows features, such as registry keys and scheduled tasks, to establish and maintain persistence of malware, ensuring continued access to compromised systems. Recognizing these persistence techniques is essential for detecting and preventing attackers from maintaining long-term access.  <a href="https://cofense.com/blog/windows-persistence-explained-techniques,-risks,-and-what-defenders-should-know">https://cofense.com/blog/windows-persistence-explained-techniques,-risks,-and-what-defenders-should-know</a></p><div><hr></div><h4>Cool Tool</h4><p>Insta OSINT - <a href="https://github.com/banaxou/hostagram">https://github.com/banaxou/hostagram</a></p><p>Keep track of all the gift cards you get this week.  <a href="https://www.cardlyai.app/">https://www.cardlyai.app/</a></p><p>See if a domain is on the dmarc blacklist.  <a href="https://dmarcly.com/tools/blacklist-checker">https://dmarcly.com/tools/blacklist-checker</a></p><h4>Cool Job</h4><p>Manager of Law Enforcement Response, xAI.  <a href="https://job-boards.greenhouse.io/xai/jobs/4959528007">https://job-boards.greenhouse.io/xai/jobs/4959528007</a></p><div><hr></div><h4>Irrelevant</h4><p>Breaking news: the U.S. Government has banned all foreign-made drone and UAV parts, including those from DJI.  Existing stock is exempt, so that drone gathering dust in your closet&#8212;perhaps unused for years&#8212;has suddenly skyrocketed in value.  </p><p><a href="https://edition.cnn.com/2025/12/23/business/us-ban-foreign-drones-dji-intl-hnk">https://edition.cnn.com/2025/12/23/business/us-ban-foreign-drones-dji-intl-hnk</a></p><div><hr></div><h4>Sign Off</h4><p>Welcome new subscribers.  Old subscribers, thank you for returning.</p><p>I wish you all a Merry Christmas and hope for nothing but the best for you and your families this holiday season!</p><p>Take it easy on the egg-nog and I&#8217;ll see you all next Tuesday.</p><p>Matt</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!awEP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9873fcdb-6bcd-41c7-8bed-1cd7ffc2f4ed_1374x1260.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!awEP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9873fcdb-6bcd-41c7-8bed-1cd7ffc2f4ed_1374x1260.jpeg 424w, https://substackcdn.com/image/fetch/$s_!awEP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9873fcdb-6bcd-41c7-8bed-1cd7ffc2f4ed_1374x1260.jpeg 848w, https://substackcdn.com/image/fetch/$s_!awEP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9873fcdb-6bcd-41c7-8bed-1cd7ffc2f4ed_1374x1260.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!awEP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9873fcdb-6bcd-41c7-8bed-1cd7ffc2f4ed_1374x1260.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!awEP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9873fcdb-6bcd-41c7-8bed-1cd7ffc2f4ed_1374x1260.jpeg" width="1374" height="1260" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9873fcdb-6bcd-41c7-8bed-1cd7ffc2f4ed_1374x1260.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1260,&quot;width&quot;:1374,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:330228,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.threatswithoutborders.com/i/182260388?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9873fcdb-6bcd-41c7-8bed-1cd7ffc2f4ed_1374x1260.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!awEP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9873fcdb-6bcd-41c7-8bed-1cd7ffc2f4ed_1374x1260.jpeg 424w, https://substackcdn.com/image/fetch/$s_!awEP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9873fcdb-6bcd-41c7-8bed-1cd7ffc2f4ed_1374x1260.jpeg 848w, https://substackcdn.com/image/fetch/$s_!awEP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9873fcdb-6bcd-41c7-8bed-1cd7ffc2f4ed_1374x1260.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!awEP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9873fcdb-6bcd-41c7-8bed-1cd7ffc2f4ed_1374x1260.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Published every Tuesday, Threats Without Borders offers original commentary and educational pieces related to cybercrime investigations and information security topics. We also summarize and comment on news articles concerning active threat intelligence for the financial industry. The newsletter interests everyone tasked with cybersecurity or involved in preventing or investigating technology-enabled fraud, theft, or money laundering.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.threatswithoutborders.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Threats Without Borders! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Legal: I am not compensated by any entity for writing this newsletter. Obviously, anything written in this space is my own nonsensical opinions and doesn&#8217;t represent the official viewpoint of my employer or any associated organization. Blame me, not them.</p>]]></content:encoded></item><item><title><![CDATA[Threats Without Borders - Issue 265]]></title><description><![CDATA[Cybercrime Investigation Newsletter, week ending December 14, 2025]]></description><link>https://www.threatswithoutborders.com/p/threats-without-borders-issue-265</link><guid isPermaLink="false">https://www.threatswithoutborders.com/p/threats-without-borders-issue-265</guid><dc:creator><![CDATA[Matt Dotts]]></dc:creator><pubDate>Tue, 16 Dec 2025 10:29:53 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!mgLA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F276fb87b-98c5-42c6-be9d-8b068eeaacc7_1768x948.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Last week, I began a series about the use of cryptocurrency in cybercrime and concluded with an introduction to tools that hinder blockchain investigators. As often occurs, another publication published a timely article that supports exactly what I was explaining and likely did so more effectively. But first, let&#8217;s examine two tools employed by those trying to obscure their cryptocurrency activities.  </p><p>A cryptocurrency mixer is typically a decentralized protocol, meaning no single company or operator controls it. Instead, multiple users participate in one large shared transaction. Each participant deposits cryptocurrency simultaneously, and the pool combines all the funds. The user then receives the same amount back from a different output, making it impossible to link the incoming wallet to the outgoing one.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mgLA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F276fb87b-98c5-42c6-be9d-8b068eeaacc7_1768x948.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mgLA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F276fb87b-98c5-42c6-be9d-8b068eeaacc7_1768x948.jpeg 424w, https://substackcdn.com/image/fetch/$s_!mgLA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F276fb87b-98c5-42c6-be9d-8b068eeaacc7_1768x948.jpeg 848w, https://substackcdn.com/image/fetch/$s_!mgLA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F276fb87b-98c5-42c6-be9d-8b068eeaacc7_1768x948.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!mgLA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F276fb87b-98c5-42c6-be9d-8b068eeaacc7_1768x948.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mgLA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F276fb87b-98c5-42c6-be9d-8b068eeaacc7_1768x948.jpeg" width="1456" height="781" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/276fb87b-98c5-42c6-be9d-8b068eeaacc7_1768x948.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:781,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:206583,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.threatswithoutborders.com/i/181698401?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F276fb87b-98c5-42c6-be9d-8b068eeaacc7_1768x948.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mgLA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F276fb87b-98c5-42c6-be9d-8b068eeaacc7_1768x948.jpeg 424w, https://substackcdn.com/image/fetch/$s_!mgLA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F276fb87b-98c5-42c6-be9d-8b068eeaacc7_1768x948.jpeg 848w, https://substackcdn.com/image/fetch/$s_!mgLA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F276fb87b-98c5-42c6-be9d-8b068eeaacc7_1768x948.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!mgLA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F276fb87b-98c5-42c6-be9d-8b068eeaacc7_1768x948.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Conversely, a tumbler is usually a centralized service operated by a single entity. Criminals send their funds to the tumbler&#8217;s wallet, which holds the funds, breaks them into smaller parts, delays them, and then gradually returns the funds using new addresses. Tumblers act as intermediaries, while mixers resemble a group activity that anonymizes all participants.</p><p>In both cases, their purpose is to erase the clear investigative trail showing the source and destination of illicit cryptocurrency. The aim isn&#8217;t to halt the money but to obscure the record.</p><p>Criminals send illegal funds into these systems to hide their original source. After mixing or tumbling, they receive &#8220;clean&#8221; funds that seem to come from a random place on the blockchain, rather than a criminal wallet.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!eL6P!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf66165f-cebb-43a8-b8ad-1e164e512504_1762x508.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!eL6P!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf66165f-cebb-43a8-b8ad-1e164e512504_1762x508.jpeg 424w, https://substackcdn.com/image/fetch/$s_!eL6P!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf66165f-cebb-43a8-b8ad-1e164e512504_1762x508.jpeg 848w, https://substackcdn.com/image/fetch/$s_!eL6P!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf66165f-cebb-43a8-b8ad-1e164e512504_1762x508.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!eL6P!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf66165f-cebb-43a8-b8ad-1e164e512504_1762x508.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!eL6P!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf66165f-cebb-43a8-b8ad-1e164e512504_1762x508.jpeg" width="1456" height="420" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bf66165f-cebb-43a8-b8ad-1e164e512504_1762x508.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:420,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:139397,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.threatswithoutborders.com/i/181698401?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf66165f-cebb-43a8-b8ad-1e164e512504_1762x508.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!eL6P!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf66165f-cebb-43a8-b8ad-1e164e512504_1762x508.jpeg 424w, https://substackcdn.com/image/fetch/$s_!eL6P!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf66165f-cebb-43a8-b8ad-1e164e512504_1762x508.jpeg 848w, https://substackcdn.com/image/fetch/$s_!eL6P!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf66165f-cebb-43a8-b8ad-1e164e512504_1762x508.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!eL6P!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf66165f-cebb-43a8-b8ad-1e164e512504_1762x508.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Fortunately for investigators, these services often leave prominent digital footprints. A typical wallet shows predictable activity&#8212;money occasionally goes in and out. But a mixer or tumbler wallet resembles chaos: it receives numerous deposits from unrelated users and makes many rapid payments in various amounts. It also charges a small fee, which provides another clue.</p><p>Using blockchain analytics tools, investigators can identify these patterns and connect wallets to mixing or tumbling services. These tools cluster addresses, spot unusual money flows, and flag transactions that seem artificially engineered.</p><p>Even when criminals use these services, they eventually want to convert their funds into real-world value. This is where investigations often succeed.</p><p>A key weak point is the off-ramp. Eventually, mixed funds land in a cryptocurrency exchange, where they&#8217;re converted into dollars, euros, or stablecoins. Regulated exchanges collect customer information through Know Your Customer rules. Tracking the funds from the mixer to an exchange allows investigators to subpoena the platform and reveal the true identity behind the wallet.</p><p>Statistical de-mixing also helps, where analysis of timing, transfer amounts, delays, and routing patterns can link outputs back to inputs. Although mixers try to break direct links, advanced analysis can often reconstruct likely connections with high confidence.</p><p>While mixers and tumblers make tracking individual transactions more difficult, they don&#8217;t make the money invisible. Instead, they create a chaotic pattern&#8212;one that investigators can recognize. By analyzing these patterns and focusing on how criminals eventually use their &#8220;cleaned&#8221; coins, investigators can trace the wallet back to a real person. Cryptocurrency isn&#8217;t an escape hatch for criminals; it&#8217;s a trail they inevitably leave behind.</p><p>Yohan Yun published an article in Cointelegraph just in time for this week&#8217;s issue, profiling cryptocurrency security experts who act as &#8220;onchain detectives&#8221;. These investigators trace stolen funds across blockchain networks, often working under pseudonyms like ZachXBT and 0xSaiyanGod. They utilize open-source tools and informal networks to track hackers and draining operations. Operating in &#8220;war rooms&#8221; formed immediately after breaches, they combine blockchain forensics with human intelligence to follow the money trail before it vanishes through mixers and bridges.</p><p>The article is titled &#8220;Meet the Onchain Crypto Detectives Fighting Crime Better than Cops.&#8221; </p><p>Yes, they do.</p><p><a href="https://cointelegraph.com/magazine/meet-crypto-sleuths-fighting-crime-better-than-the-cops/">https://cointelegraph.com/magazine/meet-crypto-sleuths-fighting-crime-better-than-the-cops/</a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.threatswithoutborders.com/?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share Threats Without Borders&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.threatswithoutborders.com/?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share Threats Without Borders</span></a></p><div><hr></div><h4>The News&#8230;</h4><p>FinCEN issued a report revealing that companies paid over $2.1 billion to ransomware groups across 4,194 incidents from January 2022 to December 2024, nearly matching the total for the previous nine years combined. Ransom payments peaked in 2023 at $1.1 billion&#8212;a 77% increase from 2022&#8212;with a median of $174,000, and then fell to $734 million in 2024 following law enforcement actions against major gangs such as ALPHV and LockBit. ALPHV/BlackCat was the most profitable, earning nearly $400 million, with LockBit at $252.4 million and Black Basta at $137.7 million. The top 10 ransomware variants accounted for $1.5 billion in payments. The 267 identified gangs mainly targeted financial, manufacturing, and healthcare sectors, with 97% of payments in Bitcoin, laundered through unregulated crypto exchanges. The report says the quiet part out loud, despite efforts like the Counter Ransomware Task Force, the threat remains high as most gangs operate from Russia and other countries that do not extradite their citizens, complicating enforcement.  <a href="https://www.fincen.gov/system/files/2025-12/FTA-Ransomware.pdf">https://www.fincen.gov/system/files/2025-12/FTA-Ransomware.pdf</a></p><p>Malwarebytes describes a sophisticated phishing operation that uses free Cloudflare Pages hosting to create fake banking and insurance login portals, which steal not just passwords but also security question answers to bypass multi-factor authentication. The attackers combine these free hosting services with compromised legitimate websites as redirectors (making phishing links appear more trustworthy) and send all stolen credentials directly to Telegram bots for immediate use, avoiding traditional command-and-control servers. <a href="https://www.malwarebytes.com/blog/news/2025/12/how-phishers-hide-banking-scams-behind-free-cloudflare-pages">https://www.malwarebytes.com/blog/news/2025/12/how-phishers-hide-banking-scams-behind-free-cloudflare-pages</a></p><p>Are you prepared for the RAMpocalypse? <a href="https://taoofmac.com/space/links/2025/12/05/1330">https://taoofmac.com/space/links/2025/12/05/1330</a></p><p>The Financial Action Task Force released new guidance and best practices to enhance efforts in recovering criminal assets. The guidance, covering topics from financial investigations to victim compensation, aims to disrupt criminal organizations by removing their financial motivation. <a href="https://www.fatf-gafi.org/en/publications/Methodsandtrends/asset-recovery-guidance-best-practices-2025.html">https://www.fatf-gafi.org/en/publications/Methodsandtrends/asset-recovery-guidance-best-practices-2025.html</a></p><p>A data breach at 700Credit is expected to affect 5.6 million people, exposing names, addresses, dates of birth, and Social Security numbers. The breach, yet to be attributed, involved data collected from dealers between May and October 2025. <a href="https://techcrunch.com/2025/12/12/data-breach-at-credit-check-giant-700credit-affects-at-least-5-6-million/">https://techcrunch.com/2025/12/12/data-breach-at-credit-check-giant-700credit-affects-at-least-5-6-million/</a></p><p>FalconFeeds is quickly becoming one of my favorite threat intelligence blogs. In this article, they describe how cybercrime localization has developed into a sophisticated, high-precision strategy where threat actors craft phishing and social engineering campaigns tailored to regional cultures, languages, and time zones, greatly increasing their chances of success. By utilizing AI and large language models, cybercriminals can achieve linguistic accuracy and cultural relevance, helping them bypass conventional security measures and build human trust. This trend is fueled by clear ROI, with financially driven groups and state-sponsored entities deploying localized tactics to target key sectors, manipulate regional financial systems, and exploit holidays and political events. <a href="https://falconfeeds.io/blogs/cybercrime-localization-regional-targeting-evolution">https://falconfeeds.io/blogs/cybercrime-localization-regional-targeting-evolution</a></p><p>Be cautious when purchasing a subscription to an AI service. Cybercriminals are increasingly exploiting AI platforms such as ChatGPT, Perplexity, and Gemini by offering premium account access at heavily discounted prices on the Dark Web. These prices range from $6.99 to $59.99 for shared or upgraded accounts. They often use stolen credit cards or credentials from infostealer logs, frequently sold on Underground markets, to acquire and resell these accounts for profit, with some offering a one-year Perplexity AI Pro subscription for as little as $9.99. The danger is not limited to financial loss; compromised AI accounts can also be exploited for phishing, malware creation, and data theft, particularly when linked with corporate systems. <a href="https://www.esentire.com/blog/hackers-are-celebrating-holidays-big-this-year">https://www.esentire.com/blog/hackers-are-celebrating-holidays-big-this-year</a></p><p>Google is shutting down its &#8220;Dark Web Report&#8221; service.  <a href="https://support.google.com/websearch/answer/16767242">https://support.google.com/websearch/answer/16767242</a></p><div><hr></div><h4>Send mail</h4><p>matt[@]threatswithoutborders[.]com</p><div><hr></div><h4>What could go wrong</h4><p>A privacy advocate, after 11 years fighting the FBI over National Security Letters demanding customer data from internet service providers, has introduced Phreeli. This new mobile carrier aims to provide anonymous cellular service accessible to all. Operating as an MVNO on T-Mobile&#8217;s infrastructure, Phreeli only requires a ZIP code for sign-up&#8212;the minimum personal info needed legally for taxes&#8212;while employing an advanced encryption called &#8220;Double-Blind Armadillo&#8221;&#8220; based on zero-knowledge proofs to verify payments without linking credit cards or identities to phone numbers. Users can pay via cryptocurrency or credit cards and select their privacy level, with options like eSIMs or Tor-hosted sites for maximum anonymity. </p><p>This is fine.  Everything is fine.  </p><p><a href="https://www.wired.com/story/new-anonymous-phone-carrier-sign-up-with-nothing-but-a-zip-code/">https://www.wired.com/story/new-anonymous-phone-carrier-sign-up-with-nothing-but-a-zip-code/</a></p><div><hr></div><h4>Cool Tools</h4><p>Ethereum storage analyzer <a href="https://slotscan.info/">https://slotscan.info/</a></p><p>The Beta version of ParrotSec 7 has been released.  <a href="https://www.parrotsec.org/blog/2025-12-09-parrot-7.0-beta-release-notes/">https://www.parrotsec.org/blog/2025-12-09-parrot-7.0-beta-release-notes/</a></p><h4>Cool Job</h4><p>Director of Fraud Escalations - Q2.  <a href="https://q2ebanking.wd5.myworkdayjobs.com/en-US/Q2/job/Austin-TX/Director--Product-Security_REQ-11071">https://q2ebanking.wd5.myworkdayjobs.com/en-US/Q2/job/Austin-TX/Director--Product-Security_REQ-11071</a></p><p>Intelligence Analysts - MLB.  <a href="https://www.mlb.com/careers/opportunities?gh_jid=7362278">https://www.mlb.com/careers/opportunities?gh_jid=7362278</a></p><div><hr></div><h4>Irrelevant</h4><p>Cloudflare released its &#8220;2025 Year in Review&#8221; report. It&#8217;s always one of the best of the yearly reports, and this one is no exception. No, it&#8217;s exceptionally well done.  <a href="https://radar.cloudflare.com/year-in-review/2025">https://radar.cloudflare.com/year-in-review/2025</a></p><div><hr></div><h4>Sign Off</h4><p>I spent time in Nashville last week.  First time. I saw a show at the Grand Ole Opry, visited the Country Music Hall of Fame, saw the Predators beat up the St. Louis Blues, ate some BBQ, and had authentic Nashville hot chicken.  But what&#8217;s up with all the homeless people? Or &#8220;unsheltered&#8221;, as I was told they should be called.  And the kids on every street corner banging on buckets?  At first, it was impressive, but after a while, like 15 minutes, it just became noise pollution.  Otherwise, it was a fantastic trip, and I plan to return sooner rather than later.</p><p>Thanks for reading another issue.  See you all next Tuesday!</p><p>Matt</p><p>&#8220;START EVEN IF YOU DON&#8217;T KNOW HOW.&#8221;</p><div><hr></div><p>Published every Tuesday for over five years, Threats Without Borders offers original commentary and educational pieces related to cybercrime investigations and information security topics. We also summarize and comment on news articles concerning active threat intelligence for the financial industry. The newsletter interests everyone tasked with cybersecurity or involved in preventing or investigating technology-enabled fraud, theft, or money laundering.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.threatswithoutborders.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Threats Without Borders! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Legal: I am not compensated by any entity for writing this newsletter. Obviously, anything written in this space is my own nonsensical opinions and doesn&#8217;t represent the official viewpoint of my employer or any associated organization. Blame me, not them.</p><p>cybersecurity cyficrime AML osint financial crime fraud investigations</p>]]></content:encoded></item></channel></rss>