Categories: Cyber Security News

English-Language Cybercrime Hub “The COM” Orchestrates Varied Global Attacks

Over the past ten years, the English-speaking cybercriminal community known as “The COM” has evolved from a niche subculture focused on trading rare social media usernames (so-called “OG handles”) into an agile service-driven underground economy orchestrating a vast range of global attacks.

Early communities like Dark0de and RaidForums laid the foundation, fostering skills in data breaches, malware development, and reputation-based trading.

As forums like OGUsers popularized social engineering and SIM-swapping, the COM adapted to market realities and became a launchpad for a new generation of “callers,” “texters,” and sophisticated credential brokers.​

The demise of high-profile forums, driven by law enforcement takedowns such as the 2022 seizure of RaidForums and targeted actions against OGUsers, forced a Migration Effect.

This blended the social manipulation skills honed by OG traders with the technical pedigree of breach-focused hackers. Today’s COM is decentralized and adaptive, thriving in invite-only channels, Telegram groups, and private Discord servers, making it resilient against disruption.​

Tactics and Threat Actors: Social Engineering, Data Breach, Extortion

The COM’s operational backbone is the human element. Attackers deploy advanced social engineering, vishing, phishing, SIM swapping, and insider recruitment to compromise credentials and gain privileged access.

Groups like Lapsus$, ShinyHunters, and Scattered Spider (UNC3944) exemplify this, using a mix of psychological manipulation and automated intrusion to bypass technical safeguards and target everything from individual crypto wallets to multinational corporations.​

Notably, Lapsus$ leveraged social engineering not only for access but also for public spectacle, live-streaming breaches, and openly taunting both companies and law enforcement.

ShinyHunters industrialized data exfiltration, monetizing large data sets and selling access through as-a-service models.

Crypto market cap trends

Meanwhile, Scattered Spider and their affiliates pioneered hybrid attack vectors, mixing voice phishing with persistent access to internal networks, setting the stage for multi-step ransomware, extortion, and data-dumping campaigns.​

The Modern Supply Chain: Service Model and Global Collaboration

Today, the COM cybercrime hub operates more as a professionalized supply chain than as a loose federation. Dedicated roles callers (voice phishers), phishing kit developers, SIM swappers, initial access brokers, ransomware affiliates, and money launderers work in a modular, on-demand fashion, mirroring legitimate business ecosystems.

This specialization enables rapid scaling, risk outsourcing, and innovation while also making traditional indicators of compromise nearly obsolete. Infrastructure is short-lived, and attackers frequently leverage trusted cloud hosting and encrypted communication, hampering detection.​

Importantly, English-speaking COM specialists now collaborate with Russian-speaking cybercrime syndicates on platforms such as Exploit.in, sharing resources and techniques within a converged threat environment.

This east-west fusion grants access to advanced malware and robust laundering networks, upping the ante for defenders worldwide.​

Defending Against The New Frontier

As the line between technical and social vectors blurs, the primary security weakness is the “human perimeter.” Organizations must pivot to identity-centric defenses, robust helpdesk protections, phishing-resistant multi-factor authentication, and continuous monitoring for insider threats.

The COM’s orchestration of varied global attacks demonstrates that cybercrime is both a business and a performance targeting not just systems, but people, and the only effective defense is a blend of resilience, awareness, and adaptive response.

Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates

The post English-Language Cybercrime Hub “The COM” Orchestrates Varied Global Attacks appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Kevin Feige on Casting Robert Downey Jr. as Doctor Doom: ‘It’s Our Universe’

Marvel Studios mastermind Kevin Feige has opened up about the decision to bring Robert Downey…

27 minutes ago

Project Hail Mary Author Andy Weir Reveals the One Scene From the Book He Wishes Had Made It Into the Movie

Project Hail Mary author Andy Weir has revealed his “only regret” about the movie, confirming…

27 minutes ago

Slay the Spire 2 Roadmap Has No Release Dates So Dev Can Avoid ‘Sloppy Spire 2’

Slay the Spire 2 developer Mega Crit has published a detailed roadmap for Slay the…

2 hours ago

The Best Deals Today: Sony 4K OLED BRAVIA 8 TV, 4K Blu-ray Bundles, AirPods Pro 3, and More

A new weekend has arrived, and today, you can save big on the 4K Movies,…

3 hours ago

Resident Evil Requiem Mercenaries Rumors Heat Up After Alleged Leak

Resident Evil Requiem fans believe next month’s mysterious content update will add a new version…

4 hours ago

Wrestlemania 42: All of the Match Winners, Returns, and Surprises — Updating Live!

Wrestlemania 42 is finally here, and I’m here in Las Vegas at Allegiant Stadium to…

4 hours ago

This website uses cookies.