I want to get continuous structured data on emerging fraud typologies, attack vectors, and associated threat intelligence from global cybersecurity forums, dark web marketplaces, and financial crime regulatory filings.
A shared demo template. Read-only preview of what would be monitored in a real pilot.
Pilot Configuration
Pilot Phase (Scoped Evaluation)
Up to 12 weeksTypical scope: multi-country, weekly updates, multiple categories
- Real data from real sources
- Live dashboards or export feeds
- Validate scope, refresh cadence, quality
- Fixed price, no ongoing commitment
Most teams start here to validate fit before expanding.
Now, schedule a short call below to confirm scope and start the pilot, or build something new.
or email us at paul@jsonify.co
Data sources are the websites and apps where information will be collected from. These can be changed or expanded at any time. This is turned into data rows.
| id | Source | Title | Summary | Threat_Type | TTPs | Indicators | Confidence | Published | Region | Severity | Source_Type | ||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1 |
|
New ATM Malware Variant Targets EMV Terminals | Researchers observed a new ATM skimmer malware that harvests EMV track 2 data and PINs via overlay injection ... show all |
ATM malware | EMV overlay, memory scraping, POS overlay skimmer | md5:9f1b2c3d4e5f6a7b8c9d0e1f2a3b4c5dC2:atm-update[.]onion |
High | Jan 31, 2026 | Global | Critical | Investigation Article | ||
| 2 |
|
Phishing-as-a-Service Market Expands with Low-Cost SaaS Kits | Operators selling turnkey phishing kits with auto-template builders and credential harvesting dashboards ... show all |
Phishing-as-a-Service | SaaS phishing kits, credential harvesting, template marketplace | phish-kit pricing:$49/monthPayment: BTC/Tether |
Medium | Feb 1, 2026 | Global | High | Market Analysis | ||
| 3 |
|
New Ransomware Strain 'GlassDoor' Encrypts Cloud Backups | GlassDoor targets misconfigured cloud backup APIs and exfiltrates before encryption | Ransomware | API abuse, exfiltration, multi-stage encryption | ext: .gz.enc.onion leak site: glassdoor-leaks[.]onion |
High | Feb 2, 2026 | North America, EMEA | Critical | Threat Advisory | ||
| 4 |
|
Credential Stuffing Campaign Hits Financial Institutions | Large-scale credential stuffing campaign leveraging breached combo lists and residential proxies | Credential stuffing | combination lists, proxy chaining, account takeover | login-attempt-rate: 2500/hrIPs: rotating residential pools |
Medium | Feb 2, 2026 | Global | High | News Report | ||
| 5 |
|
Fraud Rings Exploit Faster Payments Networks | Organized fraud groups exploiting instant payment rails for mule layering and rapid cash-outs | Payment fraud | instant rail abuse, mule recruitment, synthetic IDs | suspicious-volume:$1.2M in 48hPayment channel: Faster PayNet |
Medium | Jan 30, 2026 | APAC, EMEA | High | Investigative Report | ||
| 6 |
|
Advisory: Emerging Trade-Based Money Laundering Techniques | FinCEN warns about trade invoice manipulation using shell companies and crypto-on-ramps | Trade-based money laundering | invoice falsification, shell firms, crypto conversion | #SARs flagged: increase 18% Q4 2025Common commodities: electronics, textiles |
High | Jan 29, 2026 | US International | High | Government Advisory | ||
| 7 |
|
BlueKeep 2.0 Proof-of-Concept Sparks Patch Rush | PoC exploit demonstrates remote RCE against legacy RDP stacks prompting emergency patches | Remote code execution | RDP exploit, exploit chaining, wormable payload | CVE: pending CVE-2026-XXXXXExploit repo: github[.]com/evil/bluekeep2 |
High | Feb 1, 2026 | Global | Critical | Research Paper | ||
| 8 |
|
Android Dropper Distributes Multiple Banking Trojans | New Android dropper sideloads modular banking trojans after phishing SMS prompts | Mobile banking trojan | SMS phishing, sideloading, accessibility abuse | package: com.payhelper.updPlayStore: none (sideload) |
High | Jan 31, 2026 | EMEA, LATAM | High | Threat Research | ||
| 9 |
|
AA22-XX: Mitigation for Supply Chain Compromise via CI/CD Pipelines | CISA guidance for securing build artifacts and detecting pipeline tampering | Supply chain compromise | CI/CD artifact poisoning, compromised runners, malicious dependencies | IOC: altered checksum patterns in build artifactsMitigation: sign artifacts, pipeline integrity checks |
High | Feb 2, 2026 | US Global | High | Advisory | ||
| 10 |
|
Dark Web Forum Offers 'Bank Bot' for Automated Fraud | Forum thread selling an automated bot to test and cash out fraudulently opened bank accounts | Automated fraud tooling | bot automation, mule account creation, SIM swap support | Price: $350/monthSupport: Telegram channel t[.]me/bankbot-support |
Medium | Feb 1, 2026 | Global | High | Dark Web Watch | ||
| 11 |
|
Exchange Vulnerability Leads to Hot Wallet Theft | Hot wallet private keys exfiltrated after exploiting a third-party analytics plugin | Cryptocurrency theft | plugin compromise, private key exfiltration, chain hopping | Stolen: 4,200 ETH (~$7.8M)Affected: exchange-xyz.com |
High | Jan 30, 2026 | Global | Critical | Incident Report | ||
| 12 |
|
E-commerce Fraudsters Use AI-Generated Synthetic IDs | Threat actors adopt generative tools to create high-quality synthetic identity profiles for credit fraud ... show all |
Synthetic identity fraud | AI-generated faces, synthetic SSNs, layered mule networks | False KYC pass rate: 32% in testingTools: generative face + deepfake voices |
Medium | Jan 31, 2026 | US, EMEA | High | Feature Story | ||
| 13 |
|
SIM Swap Wave Targets High-Value Crypto Holders | Coordinated SIM swap attacks enabling account takeovers on exchanges and custodial services | SIM swap | SIM porting, social engineering, SS7 probing | Victims: 12 high-net-worth individualsLosses: ~$5.3M |
High | Feb 2, 2026 | Global | Critical | Victim Report | ||
| 14 |
|
IoT Botnet 'Furnace' Repurposes Devices for DDoS and Crypto-mining | Furnace uses zero-day in smart thermostats to recruit devices into a hybrid botnet | IoT botnet | zero-day exploit, cryptomining, DDoS amplification | Exploit: thermostatech CVE-2026-1001Ports scanned: 5555, 7547 |
Medium | Jan 30, 2026 | North America | High | Technical Analysis | ||
| 15 |
|
Card-Not-Present Fraud Surges Ahead of Tax Season | Retailers and payment processors report spike in CNP fraud using carding services | Card-not-present fraud | carding shops, BIN attack, automated checkout bots | Losses: estimated $120M Q4 2025Top method: scripted checkout bots |
Medium | Feb 1, 2026 | US | High | Business News | ||
| 16 |
|
Notice: Increased SAR Filings Related to Crypto-Mixers | FinCEN notes uptick in suspicious activity reports involving centralized mixing services and tumblers ... show all |
Crypto mixing | chain hopping, centralized mixers, OTC exchangers | #SARs increase: 42% YoY for mixersCommon rails: ERC-20, Tornado-like services |
High | Feb 2, 2026 | US International | High | Regulatory Notice | ||
| 17 |
|
Browser Extension Malware Steals 2FA Cookies | Malicious Chrome extension exfiltrates session cookies and 2FA tokens to bypass MFA | Extension malware | cookie theft, persistent persistence, exfil to cloud storage | extension id: jkfhdgpllmno4321Exfil endpoint: storage.googleapis[.]com/malware-lair |
High | Feb 1, 2026 | Global | Critical | Threat Report | ||
| 18 |
|
Alert: Iranian-linked APT Observed Targeting Financial Sector | CISA and partners track an APT conducting credential harvesting and spear-phishing against banks | Nation-state APT | spear-phishing, credential harvesting, living-off-the-land binaries | malicious domains: securelogin-update[.]irMalware: custom .NET loader |
High | Jan 29, 2026 | US, MEA | Critical | Joint Advisory | ||
| 19 |
|
Marketplace Listing: Fullz Packs with Verified DOBs and SSNs | Vendor selling curated fullz bundles claiming high verification rates for KYC bypass | Identity fraud marketplace | fullz distribution, verified DOBs, identity verification bypass | Price: $200 per 100 fullzContact: X account @fullz_dealer |
Medium | Jan 30, 2026 | Global | High | Dark Market Listing | ||
| 20 |
|
Insider Threat: Contractor Steals Customer Data for Sale | Ex-contractor exfiltrated customer PII from fintech startup and listed it on private forum | Insider data theft | unauthorized export, encrypted exfil, forum sale | Records: 78k user profilesSale price: $12k |
High | Feb 2, 2026 | US | High | Breach Report | ||
| 21 |
|
Credential Leasing Service Offers Time-limited Bank Access | Service rents out bank logins with rotating IPs and built-in cashout workflows | Credential leasing | timed credential access, proxy rotation, automated cashout modules | Rental rates: $20/hour for USD 10k-limit accountsDelivery: Telegram bot |
Medium | Jan 31, 2026 | Global | High | Investigative Feature | ||
| 22 |
|
Card Skimming Rings Upgrade to Bluetooth-enabled Pads | Skimming gangs deploying Bluetooth-enabled overlay devices transmits stolen data in real time | Card skimming | Bluetooth skimmer, overlay devices, remote data exfiltration | Device cost: $180/unitBluetooth MAC patterns observed at multiple ATMs |
High | Jan 30, 2026 | EMEA, LATAM | High | Field Report | ||
| 23 |
|
Supply Chain Malware Found in Build Dependency of Popular SDK | Malicious code introduced via compromised NPM package affecting thousands of apps | Software supply chain | dependency poisoning, exfil via telemetry, targeted rollout | package: sdk-logger v3.2.1Downloads impacted: ~120k projects |
High | Feb 2, 2026 | Global | Critical | Technical Advisory | ||
| 24 |
|
Organized Crime Funnels Illicit Proceeds Through Prepaid Cards and P2P Apps | Criminal networks increasingly use prepaid cards and P2P payment apps for layering | Money laundering | prepaid card loading, P2P laundering loops, mule network | Typical load per mule:$2k-$10kPreferred apps: PayLink, QuickSend |
Medium | Jan 29, 2026 | Global | High | Business Intelligence | ||
| 25 |
|
Advisory: Red Flags for Trade-Based Crypto Laundering | Guidance on indicators such as over/under invoicing and mismatched shipping documents tied to crypto brokers ... show all |
Trade-based crypto laundering | invoice mismatch, false bills of lading, crypto gateways integration | Red flags: frequent USD invoices to low-risk countriesPublished templates: included |
High | Jan 30, 2026 | US International | High | Regulatory Guidance | ||
| 26 |
|
MacOS Adware Campaign Uses Fake Updaters to Deploy Backdoors | Adware masquerading as legitimate updaters installs persistent backdoor components | MacOS backdoor | fake updater, notarization abuse, persistence via launch agents | Bundle id: com.apple.update.helperInstaller SHA256: a1b2c3d4e5f67890... |
High | Feb 1, 2026 | Global | High | Malware Analysis | ||
| 27 |
|
Mitigation Bulletin: Hardening Public-Facing Web Apps Against SSRF | Recommendations to detect and block SSRF abuse used to pivot to internal services | SSRF exploitation | Server-Side Request Forgery, internal port scanning, metadata API access | Observed attempts: 1200 SSRF probes/dayMitigation: strict allowlist, outbound filtering |
High | Feb 2, 2026 | Global | High | Security Bulletin | ||
| 28 |
|
Vendor Offers 'Fraud-as-a-Service' with Compliance Evasion Guides | Operator sells end-to-end fraud packages with guides on evading AML/KYC controls | Fraud-as-a-Service | compliance evasion, mule automation, fake docs | Package price: $2,500 one-timeDelivery: encrypted drop on forum |
Medium | Jan 31, 2026 | Global | Critical | Marketplace Intelligence | ||
| Looking for more? Great news − this is just a small sample. Jsonify production workflows process anywhere from tens of thousands to millions of real data rows per run! | |||||||||||||
Filters
Total Fraud Reports Monitored
Recent Threat Intelligence Reports
| Source | Fraud Typology | Attack Vector | Date | Severity |
|---|---|---|---|---|
|
|
Credential Stuffing | API Exploitation | 2026-01-25 | High |
|
|
Ransomware | Phishing Emails | 2026-01-20 | Critical |
|
|
Business Email Compromise | Social Engineering | 2026-01-15 | High |
|
|
Account Takeover | Malware | 2026-01-10 | Medium |
|
|
Supply Chain Attack | Third-Party Software Manipulation | 2026-01-05 | Critical |
|
|
Data Breach | Unauthorized Access | 2026-01-02 | Severe |
|
|
Phishing | Email Spoofing | 2026-01-01 | Medium |
|
|
Money Laundering | Cryptocurrency Transactions | 2025-12-30 | High |
Key Observations from Cybersecurity Forums
Emerging Fraud Typologies Over Time
Volume of Regulatory Filings Over Time
Top Dark Web Marketplaces for Fraud
| Marketplace Name | Type of Fraud | Average Price ($) | Number of Listings | Date of Last Update |
|---|---|---|---|---|
| Silk Road 2.0 | Identity Theft | $150 | 1200 | 2026-02-01 |
| AlphaBay | Credit Card Fraud | $200 | 800 | 2026-01-28 |
| Dream Market | Account Takeover | $100 | 600 | 2026-01-30 |
| Wall Street Market | Phishing Kits | $75 | 450 | 2026-01-29 |
| Dark0de | Ransomware Tools | $300 | 900 | 2026-02-02 |
| CannaHome | Synthetic Identity Fraud | $250 | 300 | 2026-01-27 |
Top Attack Vectors Identified
Fraud Incidents by Region
Trends in Financial Crime Regulatory Actions
Distribution of Threat Sources
New Attack Patterns This Month
Types of Fraud by Frequency
Loading...
Loading...
Radar continuously monitors your selected web sources and alerts you the moment something changes.
+7
Data connections determine where the collected data will be delivered. You can add, remove, or change connections at any time.