Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

English-Speaking Cybercriminal Ecosystem ‘The COM’ Drives a Wide Spectrum of Cyberattacks

Posted on November 13, 2025November 13, 2025 By CWS

The English-speaking cybercriminal ecosystem, generally referred to as “The COM,” has remodeled from a distinct segment neighborhood of social media account merchants into a complicated, organized operation fueling among the world’s most damaging cyberattacks.

What began as easy boards for buying and selling uncommon social media handles has advanced into knowledgeable, service-driven legal market focusing on multinational firms, authorities businesses, and demanding infrastructure throughout the globe.

The COM’s progress accelerated in the course of the cryptocurrency growth between 2020 and 2021, when cybercriminals shifted their focus from stealing social media accounts to draining digital wallets containing thousands and thousands of {dollars}.

This shift launched new assault strategies and monetization methods that basically modified the panorama of cybercrime.

The ecosystem now operates as a complete provide chain the place specialised roles work collectively seamlessly to execute coordinated assaults.

CloudSEK safety analysts recognized that The COM’s operational construction mirrors legit enterprise fashions.

Completely different menace actors specialise in particular roles—some deal with social engineering via vishing calls, others handle credential theft, and specialised groups deal with information exfiltration and cash laundering.

This specialization permits legal operations to scale quickly whereas distributing threat throughout a number of impartial actors.

The emergence of teams like Lapsus$ and ShinyHunters demonstrated The COM’s evolution into theatrical, publicity-driven operations.

Lapsus$ grew to become notorious for breaching main tech firms, together with NVIDIA, Samsung, and Microsoft, by manipulating buyer help employees via social engineering.

The group pioneered a “leak-and-brag” strategy, publicly taunting victims and legislation enforcement whereas threatening information releases to speed up ransom funds.

The Assault Mechanism: Concentrating on the Human Perimeter

CloudSEK safety researchers famous that The COM’s best weapon is social engineering moderately than technical exploits.

The first an infection vector entails human manipulation via vishing crews who impersonate IT help employees, telecom suppliers, or company assist desk personnel.

These operators deceive workers into revealing credentials, approving distant entry, or executing system instructions that grant attackers entry to company networks.

The approach operates via a easy precept: compromising an individual is less complicated than compromising a tool. Attackers use detailed sufferer profiling gathered via open-source intelligence and breached information, enabling extremely focused campaigns.

As soon as inside networks, attackers leverage legit instruments like Distant Desktop Protocol and cloud companies to maneuver laterally, avoiding detection by mixing with common administrative site visitors.

This strategy has confirmed devastatingly efficient in opposition to even organizations with superior safety infrastructure, making human-focused safety measures more and more essential for enterprise protection methods shifting ahead.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Cyberattacks, Cybercriminal, Drives, Ecosystem, EnglishSpeaking, Spectrum, Wide

Post navigation

Previous Post: Cisco 0-Days, AI Bug Bounties, Crypto Heists, State-Linked Leaks and 20 More Stories
Next Post: Synnovis Confirms Patient Information Stolen in Disruptive Ransomware Attack

Related Posts

Nanoprecise partners with AccuKnox to strengthen its Zero Trust Cloud Security and Compliance Posture Cyber Security News
How to Detect Hidden Redirects and Payloads Cyber Security News
Fired Intel Engineer Stolen 18,000 Files Many of which Were Classified as “Top Secret” Cyber Security News
Hackers Can Attack Active Directory Sites to Escalate Privileges and Compromise the Domain Cyber Security News
PolarEdge Botnet Infected 25,000+ Devices and 140 C2 Servers Exploiting IoT Vulnerabilities Cyber Security News
What is MCP Server – How it is Powering AI-Driven Cyber Defense Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Imunify360 Vulnerability Could Expose Millions of Sites to Hacking
  • Critical Imunify360 AV Vulnerability Exposes 56 Million Linux-hosted Websites to RCE Attacks
  • Now-Patched Fortinet FortiWeb Flaw Exploited in Attacks to Create Admin Accounts
  • Anthropic Says Claude AI Powered 90% of Chinese Espionage Campaign
  • Google Says Chinese ‘Lighthouse’ Phishing Kit Disrupted Following Lawsuit  

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Imunify360 Vulnerability Could Expose Millions of Sites to Hacking
  • Critical Imunify360 AV Vulnerability Exposes 56 Million Linux-hosted Websites to RCE Attacks
  • Now-Patched Fortinet FortiWeb Flaw Exploited in Attacks to Create Admin Accounts
  • Anthropic Says Claude AI Powered 90% of Chinese Espionage Campaign
  • Google Says Chinese ‘Lighthouse’ Phishing Kit Disrupted Following Lawsuit  

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News