Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Researchers Uncover Link Between Belsen and ZeroSeven Cybercriminal Groups

Posted on September 19, 2025September 19, 2025 By CWS

Cybersecurity researchers have recognized a possible connection between two Yemen-based cybercriminal organizations, the Belsen Group and ZeroSevenGroup, following an intensive investigation into their operational patterns and assault methodologies.

The invention comes amid rising considerations about refined community intrusion campaigns concentrating on crucial infrastructure and enterprise techniques throughout a number of continents.

The Belsen Group first emerged in January 2025, making headlines with the leak of 1.6 GB of delicate information from over 15,000 susceptible Fortinet FortiGate gadgets.

The compromised info included IP addresses, system configurations, and VPN credentials, which the group initially shared freely on BreachForums and their devoted TOR-based weblog to ascertain credibility inside cybercriminal communities.

The group’s assault vector centered on exploiting CVE-2022-40684, a crucial authentication bypass vulnerability in FortiGate firewalls, suggesting they maintained entry to sufferer techniques for over two years earlier than the general public disclosure.

ZeroSevenGroup, the extra established of the 2 entities, has been lively since July 2024, initially working on platforms together with NulledTo earlier than increasing to BreachForums, CrackedTo, and Leakbase.

The group specialised in information monetization methods, concentrating on organizations throughout Poland, Israel, the USA, UAE, Russia, and Brazil.

Their most notable breach concerned Toyota’s US operations in August 2024, the place they claimed accountability for exfiltrating 240GB of delicate company information.

KELA Cyber Group analysts famous vital operational similarities between the teams via forensic evaluation of their posting patterns and communication types.

The investigation revealed that each organizations employed similar title formatting conventions, particularly utilizing “[ Access ]” with sq. brackets and areas of their discussion board posts and sufferer bulletins.

This distinctive formatting sample was distinctive to those two actors inside KELA’s complete risk intelligence database.

Tactical Convergence and Attribution Evaluation

The technical evaluation revealed deeper connections via OSINT investigation of the teams’ digital footprints. Researchers recognized matching stylistic patterns of their social media presence, significantly constant hashtag utilization together with #hack throughout their Twitter profiles.

Each teams demonstrated related operational safety practices, sustaining a number of communication channels together with Tox, XMPP, Telegram, and X for sufferer negotiations and information gross sales.

Belsen Group’s Onion Web site (Supply – Kela)

The Belsen Group’s operational infrastructure included a classy onion website for sufferer listings and get in touch with info, registered beneath the partially redacted electronic mail deal with [email protected].

Their Telegram administrator account (@BelsenAdmin, ID 6161097506) revealed extra intelligence via subscription patterns to cybersecurity certification teams, regional Arabic-speaking communities in Yemen, and technical coaching channels.

The account’s earlier usernames (@m_kyan0, @mmmkkk000000) offered extra attribution markers for ongoing investigations.

ZeroSevenGroup’s technical profile confirmed evolution from their earlier incarnation as “ZeroXGroup” on RaidForums beneath username zerox296.

The group’s password reuse patterns throughout leaked databases and infostealers offered essential attribution hyperlinks, connecting their operations to Yemen-based risk actors related to the Yemen Protect hacking group.

Their transition to unique operations on Exploit Discussion board since January 2025 demonstrated tactical adaptation following publicity of their scamming actions in opposition to the Medusa Ransomware group.

Whereas definitive attribution stays difficult, the convergence of operational patterns, geographic origins, and tactical preferences strongly suggests coordination or shared assets between these cybercriminal entities, representing an evolving risk panorama requiring enhanced defensive measures.

Discover this Story Attention-grabbing! Observe us on Google Information, LinkedIn, and X to Get Extra Immediate Updates.

Cyber Security News Tags:Belsen, Cybercriminal, Groups, Link, Researchers, Uncover, ZeroSeven

Post navigation

Previous Post: Turla and Gamaredon Working Together in Fresh Ukrainian Intrusions
Next Post: Beware of Weaponized ScreenConnect App That Delivers AsyncRAT and PowerShell RAT

Related Posts

Google’s Salesforce Instances Hacked in Ongoing Attack Cyber Security News
Atomic macOS Info-Stealer Upgraded With New Backdoor to Maintain Persistence Cyber Security News
Meta’s Llama Firewall Bypassed Using Prompt Injection Vulnerability Cyber Security News
New PoC Exploit Released for Sudo Chroot Privilege Escalation Vulnerability Cyber Security News
Astaroth Banking Malware Leveraging GitHub to Host Malware Configurations Cyber Security News
Multiple Gitlab Security Vulnerabilities Let Attackers Trigger DoS Condition Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Apple Patches 19 WebKit Vulnerabilities 
  • Zscaler Acquires AI Security Company SPLX
  • Hackers Actively Scanning Internet to Exploit XWiki Remote Code Execution Vulnerability
  • Android Update Patches Critical Remote Code Execution Flaw
  • Google’s AI ‘Big Sleep’ Finds 5 New Vulnerabilities in Apple’s Safari WebKit

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Apple Patches 19 WebKit Vulnerabilities 
  • Zscaler Acquires AI Security Company SPLX
  • Hackers Actively Scanning Internet to Exploit XWiki Remote Code Execution Vulnerability
  • Android Update Patches Critical Remote Code Execution Flaw
  • Google’s AI ‘Big Sleep’ Finds 5 New Vulnerabilities in Apple’s Safari WebKit

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News