-3.8 C
New York
Thursday, January 1, 2026
Home Blog

Dutch police confront ‘unprecedented’ levels of violence during New Year’s celebrations

0

Watch: Huge fire rips through historic Amsterdam church during New Year celebrations

Police in the Netherlands were pelted with fireworks and faced an “unprecedented amount of violence” on New Year’s Eve, officers have said.

A 19th century church in Amsterdam was engulfed by fire in the early hours of New Year’s Day, although the cause of the blaze is not yet known.

The Vondelkerk, which overlooks the largest park in the city, the Vondelpark, has been a tourist attraction since it was built in 1872.

Elsewhere in the Netherlands, a 17-year-old boy and 38-year-old man were killed in fireworks incidents. In Bielefeld, Germany, local police said two 18-year-olds died after setting off homemade fireworks.

The head of the Dutch Police Union, Nine Kooiman, said she had been pelted by fireworks and other explosives on her shift in Amsterdam.

The amount of violence was “unprecedented” she said.

Reports of attacks against police and firefighters were widespread across the country.

Petrol bombs were thrown at police in the southern city of Breda. In Rotterdam, the city’s eye hospital said it had treated 14 patients, including 10 minors, for eye injuries. Two received surgery.

A 17-year-old boy from Nijmegen and a 38-year-old man from Aalsmeer were killed in fireworks incidents, local media reported.

In Amsterdam the 50-metre high tower of the historic Vondelkerk church collapsed. Authorities said the roof was badly damaged but the structure was expected to remain intact.

The neo-Gothic basilica was designed by architect Pierre Cuypers whose works also include the Rijksmuseum.

A ban on unofficial fireworks is due to come into force in 2026. According to the Dutch Pyrotechnics Association, a record €129m (£112m) had been spent on them this year.

Icon of a Down Arrow Button

0

The job posts don’t immediately raise alarms, even though they’re clearly not for tutoring or babysitting.

 “Female candidates are a PRIORITY, even if you aren’t from US, if you do not have a clear accent please feel free to inquire,” a public Telegram channel post on Dec. 15 stated. “INEXPERIENCED people are OKAY, we can train you from scratch but we expect you to absorb information and take in what you are learning.” Those who are interested are expected to be available from 12 pm EST to 6 pm EST on weekdays and will earn $300 per “successful call,” paid in crypto.

Of course, the ad isn’t for a legitimate job at all. It’s a recruiting post to join a criminal underground organization, where the job is undertaking ransomware attacks against big corporations. And the ‘gig’ workers being recruited are largely kids in middle and high schools. The enterprise is called The Com, short for “The Community,” and it includes about 1,000 people involved in numerous ephemeral associations and business partnerships, including those known as Scattered Spider, ShinyHunters, Lapsus$, SLSH, and other iterations. Associations change and reframe frequently in what expert researcher Allison Nixon calls “a huge spaghetti soup.” Since 2022, the pipeline has successfully infiltrated U.S. and UK companies with a collective market cap valuation of more than $1 trillion with data breaches, theft, account compromise, phishing, and extortion campaigns. Some 120 companies have been targeted, including brands such as Chick-fil-A, Instacart, Louis Vuitton, Morningstar, News Corporation, Nike, Tinder, T-Mobile, and Vodafone, according to research from cyber intelligence firm Silent Push and court records

What makes The Com and these groups uniquely dangerous is both their sophistication, and in how they weaponize the youth of their own members. Their tactics exploit teenagers’ greatest strengths, including their technical savvy, cleverness, and ease as native English speakers. But their blindness to consequences, and habit of having conversations in public leaves them vulnerable to law enforcement. Starting in 2024, a series of high-profile arrests and indictments of young men and teenagers ranging in age from 18 to 25 has exposed the significant risk of getting involved in The Com. In August, a 20-year-old in Florida was sentenced to a decade in federal prison and ordered to pay restitution of $13 million for his role in multiple attacks. Unnamed juveniles have also been listed as co-conspirators, and the ages that some are alleged to have begun offending are as young as 13 or 14, according to law enforcement

Zach Edwards, senior threat researcher at Silent Push, said the structure is a classic one, in which young people do most of the dangerous grunt work in a criminal organization. “The people that are conducting the attacks are at dramatically more risk,” said Edwards. “These kids are just throwing themselves to the slaughter.”

Edwards said the group even tends to slow down during the holidays “because they’re opening presents from Mom under the Christmas tree,” he said. “They’re, you know, 15-year-olds opening stockings.”

And usually parents only find out their kids are involved when the FBI knocks on the door, noted Cynthia Kaiser, former deputy assistant director of the FBI’s cyber division. 

“When they’re at a federal felony level is when the parents know because that’s when the FBI comes into play,” she said. Cybercrime lacks all the natural “offramps” that exist with other types of juvenile offenses, explained Kaiser. If a kid defaces a school gym with spray paint, they’re usually caught by a security guard or teacher and they get in trouble. It’s a warning sign for further intervention that doesn’t exist in the online spaces kids frequent.

“It allows these kids to get to the point where they’re conducting federal crimes that no one’s ever talked to them about,” said Kaiser. She often saw “loving parents, involved parents, kids who really did have a lot of advantages, but they just kind of got swept up into this, which I think is easy to do.”

Learning from LinkedIn and Slack  

Silent Push, which has tracked Scattered Spider and other groups for years, found that since March 2025, the group has pivoted back to social engineering as the backbone to its ransomware operations, a feat it is incredibly skilled at pulling off. The group allegedly steals employee lists and job titles by compromising HR software platforms and conducting extensive reconnaissance on LinkedIn, said Nixon. With a full roster in hand, the group will call employees directly, pretending to be a new hire with innocuous-seeming questions about platforms, cloud access, and other tech infrastructure. They’ve also been known to read internal Slack message boards to pick up on corporate lingo and acronyms and to find out who to target for permissions to systems. Edwards said the group leans hard on A/B testing to determine which types of calls are most successful and then doesn’t stray far from that path.

Charles Carmakal, chief technology officer of Google Cloud’s Mandiant Consulting, said group members also learn from each other as they work through more intrusions and they share their insights in chat rooms. They often abuse legitimate software in a way that gets them to their ultimate objective without having to create malware or malicious software, he said. 

“They’re resourceful,” said Carmakal. “They read the blogs, they understand what the red teams are finding, what the blue teams are finding, what other adversaries are doing, and they’ll replicate some of those techniques as well. They’re smart folks.”

Nixon has seen phishing lures in which attackers claim to be running an internal HR investigation into something a person allegedly said that was racist or another type of complaint. “They’re really upsetting false accusations, so the employee is going to be quite upset, quite motivated to shut this down,” said Nixon. “If they can get the employee emotional, they’ve got them on the hook.”

Once the employee gets rattled, the attackers will direct them to a fake helpdesk or HR website to input their login credentials. In more sophisticated companies that use multi-factor authentication or physical security keys, the attackers use the company’s remote software like AnyDesk or TeamViewer to eventually get inside internal networks. “They are very savvy as to how these companies defend themselves and authenticate their own employee users, and they’ve developed these techniques over a long period of time,” said Nixon.

Plus, Scattered Spider has picked up on a key asymmetry in authentication, said Sherri Davidoff, founder of LMG Security. When help desks call employees, they rarely have to identify themselves or prove they work for a company. Whereas when employees contact help desks, they have to verify who they are.

“Many organizations, either intentionally or unintentionally, condition their staff to comply with help desk requests,” said Davidoff. “[Threat actors] will then mimic the urgency, they’ll mimic any stress, and they’ll mimic the sense of authority that these callers have.”

Kids Today 

One of Scattered Spider’s signatures is that the group is incredibly chaotic, noted Greg Linares, a former hacker who is now a cybersecurity researcher at Eeye Digital Security. Unlike more established ransomware operators, Scattered Spider members communicate directly with victims’ C-level executives without formal negotiators. “They don’t have a professional person in the middle, so it’s just them being young adults and having fun,” said Linares. “That unpredictability among the group makes them charismatic and dangerous at the same time.”

The Scattered Spider attacks have featured brazen and audacious behaviors, like renaming the CEO to something profane in the company email address book, or calling customers directly and demanding ransom payments—general troll behavior “for the lols,” said Edwards. Serious criminal actors involved in ransomware money-making schemes, usually working for nation states like Russia or North Korea, use Signal or encrypted services, he added. The younger Scattered Spider members often create new channels on Telegram and Discord if they get banned and announce the new channel and make it public again. 

Experienced criminals “don’t run out there and create another Telegram, like, ‘Come on, everybody, back in the pool, the water’s fine,’” said Edwards. “It is absolutely what kids do.”

CrowdStrike senior vice president of counter adversary Adam Meyers told Fortune these techniques have been honed after years of escalating pranks in video game spaces. Kids will start by stealing items or destroying other kids’ worlds in video games like Minecraft, mostly to troll and bully each other, said Meyers. From there, they progress to conducting identity takeovers, usually because they want account names that have been claimed by users long ago, said Meyers. The account takeovers then evolve into targeting crypto holders. 

“Many of these teen offenders have been recruited and groomed from gaming sites, first with the offer of teaching then how to acquire in-game currency, and moving on to targeting girls for sextortion,” said Katie Moussouris, founder of startup Luta Security. “From there, they are encouraged to shift to other hacking crimes. There’s a well-established criminal pipeline that grooms young offenders to avoid adult prosecutions.”

A complaint unsealed in September in New Jersey alleged that UK teenager, Thalha Jubair, 19, was part of Scattered Spider starting from when he was 15 or 16. Jubair is facing a maximum of 95 years in prison in a scheme that U.S. authorities allege infiltrated 47 unnamed companies including airlines, manufacturers, retailers, tech, and financial services firms, and raked in more than $115 million in ransom payments. 

Owen Flowers, 18, was charged along with Jubair in the UK, according to the UK’s National Crime Agency. Both are accused in attacks on Transport for London and for allegedly conspiring to damage two U.S. healthcare companies. Flowers and Jubair have pleaded not guilty and a trial is set for next year.

Those charges came after another alleged Scattered Spider ringleader, Noah Michael Urban, 20,  pleaded guilty to wire fraud, identity theft, and conspiracy charges and was sentenced to 10 years in federal prison in August. He was ordered to pay $13 million in restitution. 

Four others, all under the age of 25, were charged alongside Urban in 2024 for allegedly being part of Scattered Spider’s cyber intrusion and crypto theft scheme, including an unnamed minor. In another alleged Scattered Spider attack, at least one unnamed juvenile turned himself in to police in Las Vegas for taking part in attacks on gaming companies in Las Vegas, according to police. 

‘Female candidates are a PRIORITY’ 

The field of cybercrime is almost exclusively dominated by male actors, but Scattered Spider has effectively recruited teenage and young adult women who have become a strategic asset. Nixon of Unit 221B said the number of girls in The Com is “exploding.”

Arda Büyükkaya, a senior threat intelligence analyst at EclecticIQ based in the EU, said he’s also found that some callers are using AI systems that will alter their voices to mimic a regional accent or other features, such as a woman “with a neutral tone” who offers pleasantries, such as “take your time,” that also downplay suspicions. 

Social engineering is rife with gender presumptions, said Karl Sigler, senior security manager at Trustwave SpiderLabs. Men tend to lean on their positions of authority as a senior executive or even a CFO or CEO, while women take the tactic of being in distress. 

“Women tend to be more successful at social engineering because, frankly, we’re underestimated,” said Moussouris of Luta Security. “This holds true whether trying to talk our way in by voice or in person. Women aren’t viewed as a threat by most and we’ve seen this play out in testing organizations where women may succeed in getting in and men don’t.”

In Nixon’s observation, The Com finds young women are useful “for social engineering purposes, and they’re also useful to them for just straight-up sexual purposes.” Some of the girls respond to ads in gaming spaces that specify “girls only” and others are victims of online sexual violence, said Nixon. 

“The people running these groups are still almost all male, and very sexist,” said Nixon. “The girls might be doing the low-level work, but they’re not going to be taught anything more than the bare minimum that they need to know. Knowledge is power in these groups, and mentorship is not given to girls.”

Many involved seem to be seeking money, notoriety among the group, a sense of belonging, and the rush and thrill of a successful attack, experts said.

Linares, who is known as the youngest ever hacker arrested in Arizona at age 14, said the hacking community he joined as a teen became closer to him than his actual family members at the time. If he were born in this era, Linares said he “absolutely” could see himself alerted to this type of crime and the money-making potential. Since sharing his story on a podcast over this summer, he’s heard from kids who are involved in cyber crime and he urges them to participate in legal bug bounty programs. Many have told him they are also autistic—a diagnosis Linares himself didn’t get until he was well in his 30s.

“A lot of these kids come from broken households, alcoholic parents, and they’re on the path of doing drugs as well,” said Linares. “Life is hard and they’re just looking for a way through.”

However, there is more to the picture. Marcus Hutchins, a cybersecurity researcher who famously stopped the global WannaCry ransomware attack and who previously faced federal charges related to malware he created as a teenager, said he’s learned that a lot of kids involved come from stable backgrounds with supportive parental figures. 

“A lot of these are privileged kids who come from loving families and they still somehow end up doing this,” Hutchins said. “How does someone who has everything going for them decide that they’re going to go after a company that is just absolutely going to insist that they go to jail?”

According to Kaiser, who after leaving the FBI joined cybersecurity firm Halcyon, the complexity lies in that the crimes are happening online and in secret. And in the grand tradition of parents not understanding kids’ slang, parents often find messages incomprehensible, which isn’t unusual, noted Nixon.  

Despite the natural tendency to underestimate kids’ abilities or always see the best in them as parents, Kaiser said parents have to protect kids—and it might mean getting uncomfortable about monitoring their online behavior. Even with her background as a top FBI cyber official, Kaiser said she still struggles as a parent. 

“I was the deputy director of the FBI’s Cyber Division, and I still don’t think I know how to fully secure my kids’ devices,” she said. “If my kid was acting foolish on the street, I’ll get a text. We’re not getting those alerts as parents, and that makes it really hard.”

Fortune contacted all the companies named in this article for comment. Some declined to comment and some could not comment directly due to ongoing investigations. Others noted their commitment to strong cybersecurity and that they had quickly neutralized threats to their systems.

Dozens of aid groups in Gaza forced to halt operations due to Israel’s NGO ban

0

NewsFeed

Israel is revoking the licenses of 37 international organisations, forcing them to stop operations in Gaza. Al Jazeera’s Hani Mahmoud explains how the new restrictions will worsen an already dire humanitarian crisis.

Challenging Client

0



Client Challenge



JavaScript is disabled in your browser.

Please enable JavaScript to proceed.

A required part of this site couldn’t load. This may be due to a browser
extension, network issues, or browser settings. Please check your
connection, disable any ad blockers, or try using a different browser.

Tony Bellew hails the greatest triumph in boxing history

0

Selecting boxing’s greatest fighter is difficult enough; choosing the sport’s greatest victory is an even tougher task. Tony Bellew, however, appeared to have little hesitation when offering his own verdict on New Year’s Eve.

The former cruiserweight world champion, now a familiar face on DAZN’s boxing coverage as a pundit, looked not to the modern era — nor even the 21st century — but instead cast his mind back more than half a century.

Responding on X to a clip shared by Vinny’s Corner of Muhammad Ali’s legendary clash with George Foreman in The Rumble in the Jungle, Bellew delivered a succinct verdict.

“The greatest victory in boxing history [in my opinion]!”

By the time Ali arrived in Kinshasa, Zaire, in October 1974, many believed the former heavyweight king was finished. At 32 years of age, and having been written off against the seemingly unstoppable Foreman, Ali instead produced one of the most audacious and intelligent performances the sport has ever seen.

For much of the contest, Ali stationed himself against the ropes, inviting Foreman to unload his fearsome power. Punch after punch thudded into Ali’s body and arms, but the challenger’s movement, guile and revolutionary “rope-a-dope” tactic gradually sapped the champion’s strength. When Foreman finally slowed, Ali seized his moment, unleashing a devastating combination in the eighth round to reclaim the heavyweight title he had lost to Joe Frazier three years earlier in The Fight of the Century.

The psychological edge was as important as the physical one. Foreman would later reveal that during exchanges Ali taunted him repeatedly.

“Is that all you got, George?”

“It was a nightmare cos that all I had.”

Ali went on to make several more title defences before losing to Leon Spinks in 1978, only to defy logic once more by reclaiming the heavyweight championship in their rematch later that year — becoming the first man to win the title three times. Subsequent defeats to Larry Holmes and Trevor Berbick eventually brought an overdue end to a glorious, era-defining career.

Foreman, meanwhile, would author his own chapter of boxing immortality two decades later. In 1994, he stunned the world by knocking out Michael Moorer to become the oldest heavyweight champion in history — a fitting epilogue to a rivalry that produced one of boxing’s greatest nights.

Foreman’s late-career redemption only adds further weight to Bellew’s claim, but nothing that followed ever eclipsed that night in Kinshasa — when Muhammad Ali outthought, outlasted and ultimately overwhelmed the most feared heavyweight on the planet to produce a victory that still defines boxing greatness half a century on.

Comparison between IDrive and Dropbox

0

Since we began our around-the-world journey back in January 2012, we have taken a truck-load of photographs and created thousands of important files and documents. People often ask us how we back up and access this massive volume of data. Up until a few weeks ago, our answer was always Dropbox. But now, HoneyTrek has a new hands-down favorite cloud storage solution…IDrive! First, I will explain why cloud storage will transform your workflow (if you don’t use it already), and then I will tell you why we picked a new winner: IDrive vs. Dropbox.

What is cloud storage?

  • When files from your computers, phones, and other devices are constantly and automatically (without any user interaction required) backed up on a secure server (an off-site backup solution is crucial in case of theft/fire/damage/etc)

Why do I need cloud storage?

  • Have you ever lost an important file, photograph, or document due to a computer crash?
  • Have you ever been traveling, wishing you had access to a certain file?
  • Have you ever been at home wishing you had access to a file on your work computer and vice versa?
  • Do you take lots of photographs and need a way to back up and access them from the road?
  • Do you have multiple computers that you’d like to always have the most up-to-date version of every file (without having to email files back and forth)?
  • Do you ever want to send large files/images/videos to family, friends, or colleagues?

…I could go on and on about the reasons to use online file storage, but hopefully those are enough examples to pique your interest.

How does cloud storage work?

  1. Create an account on IDrive (note: you can test-drive the service for 15 days and get your $15 back if you aren’t happy))
  2. Download the IDrive program to your computer
  3. Open the Application and click the “SYNC” tab on the left (see screenshot below). Choose where to put your “My Sync Folder” (I like to store mine on my desktop, so it’s always accessible and top-of-mind). Then put all your files (Word documents, Excel files, Photos, Music, anything you have on your computer) inside that folder.
  4. Anytime you modify or add a file inside that folder, IDrive will back it up on their servers with 256-bit AES encryption (the same security on banking websites).
  5. Take a deep breath and know your files will be seamlessly updated, securely backed up, and accessible to you anytime you need them. If your computer/hard drive ever dies, simply install iDrive on your new computer and your files will be restored automatically!
iDrive How To

Why are we huge fans of IDrive?

  • Backup unlimited PCs, Macs, iPhones, Android Phones, tablets, or virtually any device into a single account (you only need one account per couple/family)
  • 256-bit AES encryption with a personal key that’s not stored anywhere on the servers
  • IDrive Rewind can restore an earlier version of your files
  • If you have lots of files, they will send you a 3TB hard drive to speed up your initial upload and save your bandwidth. For FREE!
IDrive vs. Dropbox

IDrive vs. Dropbox: The biggest and best difference? PRICE!

  • 1,000 GB account w/ Drobox = $100/year
  • 2,000 GB account w/ IDrive = $52/year
  • While we love and use all the IDrive extras, the bottom line is that either service will do practically the same thing…keep your files synced across all your devices, and securely back them up in case of disaster. The main question is, would you rather pay $100 for 1,000 Gigs of space on Dropbox, or $52 for 2,000 GBs of space on IDrive?

Switching to IDrive

If you are wondering (or a little nervous) about the process of switching from Dropbox to IDrive…we can tell you it was super simple. You install IDrive on your desktop, and simply copy every file currently in your Dropbox over to the folder you choose in “My Sync Folder,” and give it a day or so to complete the sync. We know it can be scary to move all your files to a new service. We felt the same way, so we kept Dropbox going while we tested IDrive during the two-week full-refund period.

Resources

NOTE: IDrive asked us if we would like to share their service with the HoneyTrek audience, and we told them we would only do it after we tested it ourselves and were able to successfully run our business using IDrive exclusively…and here we are! We receive a small affiliate payment if you use our iDrive link

BBC reports on a fire at a Swiss resort bar

0

BBC News’ Silvia Costeloe reports from the Swiss ski resort of Crans-Montana, where it is believed dozens of people have died in a fire in a bar which broke out shortly after midnight.

Authorities also say more than 100 people were injured in the incident.

Get the latest on this story with our live page.

Scientists suggest Neanderthals consumed maggots

0

Using chemical clues from Neanderthal bones, researchers have placed the species at the top of the food chain, alongside apex predators like lions – feasting on big animals such as mammoths or bison. However, experts have been missing out on one of their key, fat-rich, and easily collectible food sources: Maggots.

So how did Purdue University anthropologist Melanie Beasley and her colleague conclude that Neanderthals actively consumed fly larvae?

The elements found in the bones of animals could provide various insights, including what they devoured when alive. Stable nitrogen has two isotopes, Nitrogen-14 (lighter and abundant) and Nitrogen-15 (heavier and less common), which act like dietary fingerprints. Nitrogen-15 builds up step by step in the food chains: plants have very low levels, herbivores gather up some from plants, and meanwhile, the carnivores have the highest.

The analysis of nitrogen isotopes from Neanderthal bones from across Europe consistently showed high Nitrogen-15 values, as high as or higher than wolves or hyenas, suggesting a diet heavy on meat. But this pattern puzzled researchers. Unlike other apex predators, humans, including our extinct cousins, can’t handle high levels of proteins. If they ate as much protein as hypercarnivores, they might end up with a condition historically known as “rabbit starvation,” i.e., protein poisoning.

The team suspected that something else about Neanderthal’s diet was inflating Neanderthal’s nitrogen-15 values. Interestingly, prehistoric Homo sapiens, too, had a similar nitrogen signature as Neanderthals.

Since some Indigenous tribes from the Arctic and subarctic are known to eat maggots from putrefied meat, the researchers considered maggots a potential factor driving those isotope spikes. Surprisingly, Melanie found that the maggots feeding on decomposing meat have the highest nitrogen-15, almost four times higher than a lion.

To test if maggots could spike those isotope levels, the researchers analyzed fly larvae feeding on decomposing human muscle tissue. They found that as flesh breaks down, lighter nitrogen atoms escape as gases, leaving heavier ones behind. Maggots feasting on this rotting tissue become enriched in heavy Nitrogen. Winter-collected larvae showed even higher values, perhaps from slower decay in the cold. Eating maggots alongside tainted meat could explain their elevated isotopes without needing a hypercarnivore diet.

“In the particular case considered here of Eurasian Late Pleistocene hominins,” the research team conclude in the new study, “we suspect that the high [Nitrogen-15] values reflect routine consumption of stored decomposing fatty animal substrates laced with highly-enriched maggots.”

The study has been published in Science Advances.

Source: Purdue University

Kherson governor appointed by Russia blames Ukraine for 24 deaths in New Year drone attack

0


Russian-installed Kherson governor accuses Ukraine of killing 24 in New Year drone strike

Tracking Abuses in the Russian Army: Our Investigation

0

new video loaded: How We Tracked Abuses in the Russian Army

President Vladimir Putin has claimed that the Russian society can tolerate the high human cost of the war in Ukraine. But we’ve analyzed more than 6,000 official complaints by soldiers and their loved ones that paint a very different picture. Our international correspondent Paul Sonne explains how the documents offer rare insight into a violent military apparatus willing to abuse its own men to keep up the assault in Ukraine.

By Paul Sonne, Nikolay Nikolov, Rebecca Suner, David Jouppi, Alina Lobzina, Milana Mazaeva, Nataliya Vasilyeva, Nikita Pavlov and Arijeta Lajka

December 31, 2025