Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Cybercriminal Groups 764 and The Com Use Tech for Violent Crimes
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Cybercriminal Groups 764 and The Com Use Tech for Violent Crimes

Highlights

  • 764 and The Com use cyber tools for violent crimes.

  • They target minors through social engineering and doxxing.

  • Law enforcement seeks coordinated efforts to combat these threats.

Kaan Demirel
Last updated: 5 December, 2024 - 6:10 pm 6:10 pm
Kaan Demirel 5 months ago
Share
SHARE

Intelligence reports reveal that the child sextortion group 764 and the network known as “The Com” are employing cybercrime methods to perpetrate violent offenses globally. These groups utilize tools like SIM swapping and IP grabbing to target and harm victims, particularly minors. Their operations pose significant challenges to law enforcement agencies aiming to protect vulnerable populations online.

Contents
How Groups Identify and Target VictimsThe Shift from Cybercrime to TerrorismLaw Enforcement’s Response and Challenges

Previously, The Com was primarily associated with non-violent cybercrimes such as data breaches and ransomware attacks. Earlier reports focused on their financial motives and technological prowess, without indicating a shift towards more direct forms of violence and exploitation. The latest findings highlight an expansion of their tactics to include terrorism-related activities.

How Groups Identify and Target Victims

The intelligence reports detail how 764 and The Com use social engineering and IP grabbing to locate and select their victims. By exploiting open-source tools and doxxing methods, they gather personal information to manipulate and extort individuals, especially targeting children as young as 10 years old.

The Shift from Cybercrime to Terrorism

Moving beyond traditional cybercriminal activities, The Com is now delving into terrorism, according to the FBI classification. This shift involves using their technical skills to incite violence and coercion, marking a significant escalation in their operational scope and the nature of their crimes.

Law Enforcement’s Response and Challenges

Law enforcement agencies have been actively sharing intelligence and coordinating efforts to dismantle these groups. Regional fusion centers play a crucial role in information sharing, but officials remain cautious about discussing specific cyber tactics publicly. A senior official from the National Center for Missing and Exploited Children highlighted the severe impacts, stating:

“We’ve had people kill their grandparents. It’s just awful.”

Additionally, FBI agents have emphasized the widespread nature of these threats. One agent remarked:

“I want to stress: this is everywhere.”

Another agent noted that arrests related to these networks have occurred in multiple regions:

“We have seen this in every state, every field office and arrests have been made in 23 countries.”

Addressing the complex interplay between cybercriminal strategies and violent extremism requires a multifaceted approach. Strengthening online protections for minors, enhancing inter-agency collaboration, and developing advanced monitoring capabilities are essential steps in combating the threats posed by groups like 764 and The Com. Public awareness and proactive measures can help mitigate the risks and safeguard vulnerable communities from such exploitative networks.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

US Authorities Dismantle Botnets and Indict Foreign Nationals

SonicWall Customers Face Spike in Device Vulnerabilities

Cyberattack Forces PowerSchool to Face Extortion Scandal

CrowdStrike Faces Workforce Reduction Amid Financial Shifts

Authorities Seize DDoS Platforms in Multi-National Operation

Share This Article
Facebook Twitter Copy Link Print
Kaan Demirel
By Kaan Demirel
Kaan Demirel is a 28-year-old gaming enthusiast residing in Ankara. After graduating from the Statistics department of METU, he completed his master's degree in computer science. Kaan has a particular interest in strategy and simulation games and spends his free time playing competitive games and continuously learning new things about technology and game development. He is also interested in electric vehicles and cyber security. He works as a content editor at NewsLinker, where he leverages his passion for technology and gaming.
Previous Article AWS Enhances Bedrock with New AI Models and Features
Next Article Chromia Enhances Blockchain with Asgard Mainnet Upgrade

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

North American Robot Orders Stabilize in Early 2025
Robotics
UR15 Boosts Automation Speed in Key Industries
Robotics
NHTSA Questions Tesla’s Robotaxi Plans in Austin
Electric Vehicle
Tesla’s Secretive Test Car Activities Ignite Curiosity
Electric Vehicle
AI Reshapes Global Workforce Dynamics
AI Technology
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?