Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Researchers Uncover Link Between Belsen and ZeroSeven Cybercriminal Groups

Posted on September 19, 2025September 19, 2025 By CWS

Cybersecurity researchers have recognized a possible connection between two Yemen-based cybercriminal organizations, the Belsen Group and ZeroSevenGroup, following an intensive investigation into their operational patterns and assault methodologies.

The invention comes amid rising considerations about refined community intrusion campaigns concentrating on crucial infrastructure and enterprise techniques throughout a number of continents.

The Belsen Group first emerged in January 2025, making headlines with the leak of 1.6 GB of delicate information from over 15,000 susceptible Fortinet FortiGate gadgets.

The compromised info included IP addresses, system configurations, and VPN credentials, which the group initially shared freely on BreachForums and their devoted TOR-based weblog to ascertain credibility inside cybercriminal communities.

The group’s assault vector centered on exploiting CVE-2022-40684, a crucial authentication bypass vulnerability in FortiGate firewalls, suggesting they maintained entry to sufferer techniques for over two years earlier than the general public disclosure.

ZeroSevenGroup, the extra established of the 2 entities, has been lively since July 2024, initially working on platforms together with NulledTo earlier than increasing to BreachForums, CrackedTo, and Leakbase.

The group specialised in information monetization methods, concentrating on organizations throughout Poland, Israel, the USA, UAE, Russia, and Brazil.

Their most notable breach concerned Toyota’s US operations in August 2024, the place they claimed accountability for exfiltrating 240GB of delicate company information.

KELA Cyber Group analysts famous vital operational similarities between the teams via forensic evaluation of their posting patterns and communication types.

The investigation revealed that each organizations employed similar title formatting conventions, particularly utilizing “[ Access ]” with sq. brackets and areas of their discussion board posts and sufferer bulletins.

This distinctive formatting sample was distinctive to those two actors inside KELA’s complete risk intelligence database.

Tactical Convergence and Attribution Evaluation

The technical evaluation revealed deeper connections via OSINT investigation of the teams’ digital footprints. Researchers recognized matching stylistic patterns of their social media presence, significantly constant hashtag utilization together with #hack throughout their Twitter profiles.

Each teams demonstrated related operational safety practices, sustaining a number of communication channels together with Tox, XMPP, Telegram, and X for sufferer negotiations and information gross sales.

Belsen Group’s Onion Web site (Supply – Kela)

The Belsen Group’s operational infrastructure included a classy onion website for sufferer listings and get in touch with info, registered beneath the partially redacted electronic mail deal with [email protected].

Their Telegram administrator account (@BelsenAdmin, ID 6161097506) revealed extra intelligence via subscription patterns to cybersecurity certification teams, regional Arabic-speaking communities in Yemen, and technical coaching channels.

The account’s earlier usernames (@m_kyan0, @mmmkkk000000) offered extra attribution markers for ongoing investigations.

ZeroSevenGroup’s technical profile confirmed evolution from their earlier incarnation as “ZeroXGroup” on RaidForums beneath username zerox296.

The group’s password reuse patterns throughout leaked databases and infostealers offered essential attribution hyperlinks, connecting their operations to Yemen-based risk actors related to the Yemen Protect hacking group.

Their transition to unique operations on Exploit Discussion board since January 2025 demonstrated tactical adaptation following publicity of their scamming actions in opposition to the Medusa Ransomware group.

Whereas definitive attribution stays difficult, the convergence of operational patterns, geographic origins, and tactical preferences strongly suggests coordination or shared assets between these cybercriminal entities, representing an evolving risk panorama requiring enhanced defensive measures.

Discover this Story Attention-grabbing! Observe us on Google Information, LinkedIn, and X to Get Extra Immediate Updates.

Cyber Security News Tags:Belsen, Cybercriminal, Groups, Link, Researchers, Uncover, ZeroSeven

Post navigation

Previous Post: Turla and Gamaredon Working Together in Fresh Ukrainian Intrusions
Next Post: Beware of Weaponized ScreenConnect App That Delivers AsyncRAT and PowerShell RAT

Related Posts

BlackSuit Ransomware’s Data Leak and Negotiation Portal Seized Cyber Security News
New Echo Chamber Attack Jailbreaks Most AI Models by Weaponizing Indirect References Cyber Security News
PoisonSeed Phishing Kit Bypasses MFA to Acquire Credentials from Individuals and Organizations Cyber Security News
Critical Cisco ISE Vulnerability Allows Remote Attacker to Execute Commands as Root User Cyber Security News
Palo Alto Networks to Acquire CyberArk in $25 Billion Deal Cyber Security News
Threat Actors Attacking Gen Z Gamers With Weaponized Versions of Popular Games Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • LastPass Warns of Fake Repositories Infecting macOS with Atomic Infostealer
  • Researchers Uncover GPT-4-Powered MalTerminal Malware Creating Ransomware, Reverse Shell
  • ShadowLeak Zero-Click Flaw Leaks Gmail Data via OpenAI ChatGPT Deep Research Agent
  • Threat Actors Selling New Undetectable RAT As ’ScreenConnect FUD Alternative’
  • Breachlock Named Sample Vendor for PTaaS and AEV in Two 2025 Gartner Reports

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • LastPass Warns of Fake Repositories Infecting macOS with Atomic Infostealer
  • Researchers Uncover GPT-4-Powered MalTerminal Malware Creating Ransomware, Reverse Shell
  • ShadowLeak Zero-Click Flaw Leaks Gmail Data via OpenAI ChatGPT Deep Research Agent
  • Threat Actors Selling New Undetectable RAT As ’ScreenConnect FUD Alternative’
  • Breachlock Named Sample Vendor for PTaaS and AEV in Two 2025 Gartner Reports

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News