The Federal Bureau of Investigation has issued a stark warning about “Hacker Com,” a sophisticated subset of an international cybercriminal ecosystem known as “The Com” that poses escalating threats to both digital infrastructure and physical safety.
This primarily English-speaking network comprises multiple interconnected groups whose members, many of whom are minors, engage in complex criminal operations ranging from cryptocurrency theft to real-world violence.
Hacker Com operates as a broad community of technically sophisticated cybercriminals with documented links to ransomware-as-a-service (RaaS) groups.
The organization’s criminal portfolio spans distributed denial-of-service (DDoS) attacks, compromise of personally identifiable information, government email account sales, ransomware deployment, phishing campaigns, malware development, cryptocurrency theft, computer intrusions, and subscriber identity module (SIM) swapping.
The group employs an advanced technical toolkit including remote access trojans, phishing kits, voice over internet protocol (VoIP) providers, voice modulators, virtual private networks (VPNs), spoofing technology, cryptocurrency cash-out services, live streaming platforms, and encrypted email domains to facilitate criminal activity while concealing member identities.
These tools enable high-profile attacks and intrusions that have garnered significant attention from law enforcement agencies.
Cryptocurrency theft serves as the primary motivator for many Com actors, generating millions of dollars in profits that members frequently showcase through screen sharing sessions.
However, this financial success has created a dangerous internal dynamic in which members become targets of their own community through SIM swaps and other cybercrime triggered by perceived slights, rival group membership, or cryptocurrency balance boasts.
The intensification of online conflicts has spawned a concerning evolution within The Com ecosystem: the emergence of “In Real Life (IRL) Com,” which facilitates actual physical violence stemming from digital disputes.
This escalation includes kidnapping, torture, threats against family members, and firearm usage as means of cryptocurrency extortion.
Some Com subgroups now offer swat-for-hire services through communication applications and social media platforms, accepting cryptocurrency payments while using various technologies to obscure their identities.
These swatting operations serve dual purposes: retaliating against rival members and creating diversions during active cryptocurrency thefts or corporate network intrusions.
The FBI urges victims to immediately contact emergency services if facing life-threatening situations, report incidents to the Internet Crime Complaint Center at www.ic3.gov, and utilize resources like the National Center for Missing and Exploited Children’s Take It Down service for exploitation cases.
PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…
Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…
Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…
Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…
Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…
Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…