<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.floodcomputingsolutions.com/blogs/tag/cybercrime/feed" rel="self" type="application/rss+xml"/><title>Flood Computing Solutions - Blog #cybercrime</title><description>Flood Computing Solutions - Blog #cybercrime</description><link>https://www.floodcomputingsolutions.com/blogs/tag/cybercrime</link><lastBuildDate>Tue, 07 Apr 2026 07:35:13 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Why All Your Data Is Gone ]]></title><link>https://www.floodcomputingsolutions.com/blogs/post/ransomware</link><description><![CDATA[<img align="left" hspace="5" src="https://www.floodcomputingsolutions.com/images/encryption-your-data-digital-lock-hacker-attack-and-data-breach-big-data-with-encrypted.jpg"/>As ransomware becomes more common, businesses must take steps to protect themselves. One of the most effective ways to do this is by maintaining regular backups of all data.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_8uluC0TcS7eACy4ioP0ygg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Uu6GDNEZSa6LiJdweccyBA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_MpNrl7_-TFKLpwECuEemeQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_idcOGnQ1QDOhYoB_2Se4ww" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_idcOGnQ1QDOhYoB_2Se4ww"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">Ransomware VS Backups&nbsp;</h2></div>
<div data-element-id="elm_nORlEs4OTECJr0LF7T6HvQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_nORlEs4OTECJr0LF7T6HvQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="color:inherit;"><span style="font-size:14px;">Ransomware is a growing concern not just for individuals, but businesses as well. This malicious software infects computers, servers, emails, and other places with the intent to extort money from the victim. It does this by encrypting all of the data, presenting the victim of the attack with a demand for payment in order to have their files returned. Unfortunately, the criminals behind ransomware attacks often have no intention of actually providing the decryption keys, even if the ransom is paid.</span></span></p><p><span style="color:inherit;"><span style="font-size:14px;"><br></span></span></p><p><span style="color:inherit;"><span style="font-size:14px;">&nbsp;The best way to protect against ransomware is to take preventive measures. This means regularly backing up data so that if the system fails, it can be recovered. Backups should include all of the important documents and files so that even if a major parts of your systems become compromised, you are still able to access the backed up files. Keeping up to date with system updates and antivirus software also is a good line of protection against this type of attack.</span></span></p><p><span style="color:inherit;"><span style="font-size:14px;"><br></span></span></p><p><span style="color:inherit;"><span style="font-size:14px;">&nbsp;Businesses should be especially attentive to ransomware attacks, as the threat is quite real for them. Not only does the loss of data have a direct financial cost, there are other complications that could arise from an attack. For instance, the cost of the resulting downtime could significantly impact a business’s bottom line, and it could also result in the loss of clients and customer loyalty if confidential information was among the stolen data.</span></span></p><p><span style="color:inherit;"><span style="font-size:14px;"><br></span></span></p><p><span style="color:inherit;"><span style="font-size:14px;">&nbsp;By acting quickly and taking the necessary steps to prevent ransomware attacks, businesses can greatly reduce the risk of being exposed to one of these damaging events. Taking proactive measures such as backing up data regularly and having an updated antivirus program can make a huge impact. It may seem like a bother, but the effort is worth it when it comes to preventing a data breach.</span></span><br></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 11 Apr 2023 15:53:04 -0700</pubDate></item><item><title><![CDATA[Cookie Monster Strikes Genesis]]></title><link>https://www.floodcomputingsolutions.com/blogs/post/Genesis-Market-Seized</link><description><![CDATA[<img align="left" hspace="5" src="https://www.floodcomputingsolutions.com/images/fbi-detective-using-laptop-in-his-office.jpg"/>The Genesis is a dark web marketplace that was created in 2018. In 2023, the FBI shut down the Genesis marketplace in an operation called ‘Cookie Monster’. The operation was a major success for the FBI, as it dealt a significant blow to the black market on the dark web.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_FgMq_ZCYTq-Vs2sRGkfLsQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_IT5gQnZcS6aNPgWV_ATJzg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_u8KxAkOqRq6hxB_32uWjwQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_NVbWIJQOTX6yoBEQos90BA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_NVbWIJQOTX6yoBEQos90BA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Genesis Market Seized</span></h2></div>
<div data-element-id="elm_GAHippj5RD-lMsrEExnmmQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_GAHippj5RD-lMsrEExnmmQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:left;">Genesis Market appears to have been taken down in connection with the FBI's Operation Cookie Monster. From what we have learned it appears that the FBI has orchestrated a sweeping act against various websites that are thought to be connected to dark web and cybercrime activity.</p><p style="text-align:left;"><br></p><p style="text-align:left;">Genesis Market homepage now lists the domain as being seized in connection with Operation Cookie Monster. This appears to be done as a result of&nbsp;a warrant issued by a Wisconsin court.</p><p style="text-align:left;"><br></p><p style="text-align:left;">Reports include dozens of arrests in the United States and other countries. We are interested to see how this story continues to develop. Including 120 arrests around the Genesis Market sites.&nbsp;</p><p style="text-align:left;"><br></p><p style="text-align:left;">The&nbsp;<a href="https://www.f5.com/labs/articles/threat-intelligence/genesis-marketplace--a-digital-fingerprint-darknet-store" target="_blank" rel="noreferrer noopener">Genesis</a>&nbsp;marketplace has been around since late 2018, offering cybercriminals access to hundreds of thousands of so-called ‘bots’ that could be used to carry out malicious activities and bypass anti-fraud systems.&nbsp;<br></p><p style="text-align:left;"><br></p><p style="text-align:left;">The bots were directly related to obtaining the browsers&nbsp;fingerprint, using malicious&nbsp;malware. This particular site was an invite only organization.&nbsp;</p><p style="text-align:left;"><br></p><p style="text-align:left;">It will be interesting to see how this Operation Cookie Monster continues to unfold.&nbsp;</p></div>
</div><div data-element-id="elm_K89khxwgv-WoWJN6Ugjklw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_K89khxwgv-WoWJN6Ugjklw"] .zpimage-container figure img { width: 1110px ; height: 623.86px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_K89khxwgv-WoWJN6Ugjklw"] .zpimage-container figure img { width:723px ; height:406.35px ; } } @media (max-width: 767px) { [data-element-id="elm_K89khxwgv-WoWJN6Ugjklw"] .zpimage-container figure img { width:415px ; height:233.24px ; } } [data-element-id="elm_K89khxwgv-WoWJN6Ugjklw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Cookie%20Monster.png" width="415" height="233.24" loading="lazy" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_e_u7d6kMT5GZmp_FNk1TyQ" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 05 Apr 2023 12:31:50 -0700</pubDate></item></channel></rss>