Thousands detained as Thailand ramps up cybercrime suppression campaign


The Ministry of Digital Economy and Society (MDES) is intensifying its efforts to combat cybercrime. It reported a significant increase in access blocks to gambling websites and the closure of millions of suspicious mobile lines last month.

The Ministry of Digital Economy and Society (MDES) has been taking strong measures to combat cybercrime, particularly in the areas of gambling websites and suspicious mobile lines. The increase in access blocks to gambling websites indicates a proactive approach to preventing illegal online gambling activities.

Read more…
Source: Thailand Business 


Sign up for our Newsletter


Related:

  • An investigation into the tools and methods used by the Higaisa group

    August 19, 2024

    In March 2020 specialists from the PT Expert Security Center conducted an analysis on the activities of the APT group Higaisa. This group was first studied by security analysts at Tencent in November 2019. In that analysis, Tencent specialists reached the conclusion that Higaisa has its origins in South Korea. The group, which is still active ...

  • Thousands detained as Thailand ramps up cybercrime suppression campaign

    June 10, 2024

    The Ministry of Digital Economy and Society (MDES) is intensifying its efforts to combat cybercrime. It reported a significant increase in access blocks to gambling websites and the closure of millions of suspicious mobile lines last month. The Ministry of Digital Economy and Society (MDES) has been taking strong measures to combat cybercrime, particularly in the ...

  • Agenda Ransomware Propagates to vCenters and ESXi via Custom PowerShell Script

    March 26, 2024

    Since its discovery in 2022, the Agenda Ransomware group (also known as Qilin) has been active and in development. Agenda, which Trend Micro tracks as Water Galura, continues infecting victims globally with the US, Argentina, and Australia, and Thailand being among its top targets (based on the threat actor’s leak site data). Meanwhile the Agenda ransomware ...

  • The Updated APT Playbook: Tales from the Kimsuky threat actor group

    March 20, 2024

    Rapit7 team recently ran across some interesting activity that they believe is the work of the Kimsuky threat actor group, also known as Black Banshee or Thallium. Originating from North Korea and active since at least 2012, Kimsuky focuses primarily on intelligence gathering. The group is known to have targeted South Korean government entities, individuals associated with ...

  • Data From Chinese Security Services Company i-Soon Linked to Previous Chinese APT Campaigns

    February 23, 2024

    On Feb. 16, 2024, someone uploaded data to GitHub that included possible internal company communications, sales-related materials and product manuals belonging to the Chinese IT security services company i-Soon, also known as Anxun Information Technology. The leaked materials appear to show how a commercial entity developed and supported cyber espionage tools in support of Chinese-affiliated threat ...

  • A first analysis of the i-Soon data leak

    February 21, 2024

    Data from a Chinese cybersecurity vendor that works for the Chinese government has exposed a range of hacking tools and services. Although the source is not entirely clear, it seems that a disgruntled staff member of the group leaked the information on purpose. The vendor, i-Soon (aka Anxun) is believed to be a private contractor that ...