Criminal New York

  • Home
  • Criminal New York

Criminal New York Criminal New York

25/11/2025

New York City Mayor Eric Adams announced two new Project Labor Agreements with the Building & Construction Trades Council of Greater New York and Vicinity that will cover more than $7 billion in city capital projects, ensuring fair wages, union benefits, and strong safety protections for workers. The agreements will support the construction and renovation of critical infrastructure such as recreation centers, libraries, clean energy systems, and water treatment facilities, while advancing the city’s community hiring goals by prioritizing residents of NYCHA housing and low-income ZIP codes. These PLAs are designed to create more pathways to middle-class, union careers through expanded apprenticeship and pre-apprenticeship opportunities, supporting the mayor’s “moonshot” goal of connecting 30,000 New Yorkers to apprenticeships by 2030. Through a new memorandum of understanding with BCTC and the Building Trades Employers’ Association, the city will recruit and place 700 pre-apprentices from underserved communities, demonstrating a long-term commitment to a skilled, diverse construction workforce that builds and benefits from New York City’s growth.

Explore Greater New York and Beyon: Manhattan, Brooklyn, Queens, Staten Island, Bronx, New Jersey, Connecticut, US, and the World – Your One-Stop Catalog, News Web-Search Portal

24/05/2025

FBI Warns of Surge in Social Engineering Attacks Targeting U.S. Law FirmsSilent Ransom Group exploiting remote access tools for data theft and extortion.
https://tv503.com/fbi-warns/
The FBI’s Internet Crime Complaint Center (IC3) has issued a critical cybersecurity advisory warning businesses—particularly legal firms—of an escalating campaign of social engineering and data extortion led by a threat actor known as the Silent Ransom Group (SRG). Also identified by cybersecurity firms as Luna Moth, Chatty Spider, or UNC3753, the group has refined its methods to bypass traditional defenses and exploit remote access tools for financial gain.

Since spring 2023, SRG has systematically targeted law firms and other professional services through phishing campaigns and voice-based social engineering (vishing), gaining unauthorized access to sensitive internal systems and client data. According to the FBI’s bulletin dated May 23, 2025, these attacks are designed to extract data, followed by extortion attempts with threats to publish or sell the stolen information.

Tactics and Techniques
Initially, SRG lured victims through phishing emails impersonating legitimate subscription services (e.g., antivirus or cloud software providers), urging them to cancel fake subscriptions via a phone call. Once contact was made, victims were instructed to install remote access software such as Atera, AnyDesk, or Zoho Assist under the pretense of resolving the issue.

More recently, SRG has shifted tactics by cold-calling firm employees directly, posing as internal IT staff. In these scenarios, employees are persuaded to install remote access tools for supposed system maintenance or updates. Once inside the network, SRG uses legitimate file transfer utilities like WinSCP and Rclone to exfiltrate gigabytes of sensitive documents.

Extortion Phase
Upon successful data theft, SRG sends ransom notes via email, often followed by phone calls, threatening to release the stolen data unless payment is made. The group has demonstrated a sophisticated understanding of corporate structure, leveraging personal details in communications to amplify psychological pressure on victims.

FBI Recommendations
In its advisory, the FBI urges all businesses—especially legal and professional service firms—to implement the following measures:

Establish strict protocols for verifying internal IT requests.
Conduct regular phishing awareness and cybersecurity training for staff.
Limit and monitor the use of remote access software.
Enforce multi-factor authentication (MFA) across all systems.
Maintain regular, encrypted data backups stored offline.

The FBI emphasizes that Silent Ransom Group’s use of commercially available tools and socially engineered entry points makes their attacks especially difficult to detect and prevent. Proactive defense, employee vigilance, and clear internal procedures remain the best line of protection against this evolving cyber threat.

For full details, the official FBI advisory can be found at IC3.gov.

May 23, 2025 – Washington, D.C.

Sources:https://www.ic3.gov/CSA/2025/250523.pdf , TV503.com

Address


Website

Alerts

Be the first to know and let us send you an email when Criminal New York posts news and promotions. Your email address will not be used for any other purpose, and you can unsubscribe at any time.

  • Want your business to be the top-listed Media Company?

Share