United States Reported Less Data Breaches in 2020 but with much more Expensive Successful Hacker Attacks
According to the annual report of the Identity Theft Resource Center (ITRC), 1,108 cyber incidents were reported in 2020 and the number casualties from these incidents was close to 301 million people, a drop of 66% over the previous year.
The social engineering technique of impersonation also helped attackers reap massive profits:
The volume of business fraud and hacking by corporate e-mail systems (BECs) reported to the FBI in 2020 was US$ 1.8 Billion – a figure that reflects half of all cyber damage in monetary terms.
“The trend away from mass data breaches and toward more precise and sophisticated cyberattacks doesn’t mean businesses can relax. Just the opposite. They need to learn whole new ways of protecting their data.”
– James E. Lee, ITRC COO
Read more about Examples and Numbers of Social Engineering Hacker Attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
A Simple Guide to AI Security
An interactive walk-through of the OWASP GenAI Incident Response Guide, designed for everyone. What is an AI Incident? Think of AI as a brilliant...
The Payment Trap No One’s Watching – Supply Chain’s Hidden Cyber Exposure
🧾 Payment Systems Are Your Cyber Blind Spot
🚨 Your vendors may be your biggest threat – and you’d never know.
🔍 Cybercriminals are hijacking invoice emails and vendor accounts to reroute payments without triggering a single alarm.
🧠 They don’t need malware – they need your trust.
📦 Most supply chain payment processes are built for speed, not scrutiny. That’s the exact vulnerability attackers exploit.
📤 A supplier “updates” their bank details.
📩 A finance contact “confirms” the update.
💸 The money? Gone.
⚠️ These attacks look like normal business interactions – not breaches.
And that’s why they work.
💬 If you’re not simulating these threats, you’re silently exposed.
Finance teams, CISOs, Procurement Leaders – this is your wake-up call.
🔒 AUMINT helps you uncover hidden risks in your approval flows, supplier communication, and payment process before attackers do.
📅 Want to test your system with zero risk? Book your free simulation review.
#CyberSecurity #FinanceLeaders #CISOs #VendorRisk #SocialEngineering #FraudPrevention #SupplyChainSecurity #AUMINT
🚨 Top Ransomware Leak Sites Every Security Leader Must Watch 🚨
Ransomware gangs are not just encrypting data – they’re publishing stolen info to pressure victims.
🔍 Knowing their leak sites gives you a critical early warning system.
Here are the most active ransomware leak blogs on the darknet:
🛑 AvosLocker – http://avosqxh72b5ia23dl5fgwcpndkctuzqvh2iefk5imp3pi5gfhel5klad.onion/
🛑 Babuk – http://nq4zyac4ukl4tykmidbzgdlvaboqeqsemkp4t35bzvjeve6zm2lqcjid.onion/
🛑 Bl@ckT0r – http://bl4cktorpms2gybrcyt52aakcxt6yn37byb65uama5cimhifcscnqkid.onion/
🛑 CL0P^_- LEAKS – http://santat7kpllt6iyvqbr7q4amdv6dzrh6paatvyrzl7ry3zm72zigf4ad.onion/
🛑 CONTI.News – http://continewsnv5otx5kaoje7krkto2qbu3gtqef22mnr7eaxw3y6ncz3ad.onion/
🛑 Cuba – http://cuba4ikm4jakjgmkezytyawtdgr2xymvy6nvzgw5cglswg3si76icnqd.onion/
🛑 Grief – http://griefcameifmv4hfr3auozmovz5yi6m3h3dwbuqw7baomfxoxz4qteid.onion/
🛑 LockBit BLOG – http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion/
🛑 Lorenz – http://lorenzmlwpzgxq736jzseuterytjueszsvznuibanxomlpkyxk6ksoyd.onion/
🛑 LV Blog – http://rbvuetuneohce3ouxjlbxtimyyxokb4btncxjbo44fbgxqy7tskinwad.onion/
🛑 Quantum Blog – http://quantum445bh3gzuyilxdzs5xdepf3b7lkcupswvkryf3n7hgzpxebid.onion/
🛑 Ragnar_Locker Leaks – http://rgleaktxuey67yrgspmhvtnrqtgogur35lwdrup4d3igtbm3pupc4lyd.onion/index.php
🛑 RANSOMEXX – http://rnsm777cdsjrsdlbs4v5qoeppu3px6sb2igmh53jzrx7ipcrbjz5b2ad.onion/
🛑 Suncrypt – http://x2miyuiwpib2imjr5ykyjngdu7v6vprkkhjltrk4qafymtawey4qzwid.onion/press
⏰ Monitoring these leak sites gives your security team a chance to react before data hits public forums.
🔐 At AUMINT.io, we integrate threat intel from these sources into attack simulations that build resilience and sharpen detection skills.
📞 Want to protect your org from ransomware extortion waves? Connect with us today.
#Ransomware #ThreatIntel #CyberSecurity #Darknet #SocialEngineering #FraudPrevention #AUMINTio #CISO #SecurityOps