phishing

  1. Friend

    In Gomel, the court sentenced a group of phishing scammers who deceived more than 50 people

    The Sovetsky District Court of Gomel has ruled a verdict in a criminal case of embezzlement of funds by modifying computer information and fraud, BelTA learned from the Gomel Regional Court. The defendants in the case were three people, each of whom had previously been convicted. One of them...
  2. Friend

    Sway and QR codes: A dangerous phishing tandem targeting Microsoft 365 services

    Mobile users were the most vulnerable to this attack. In July 2024, Netskope discovered a sharp increase in phishing attacks that use Microsoft Sway to steal Microsoft 365 user credentials. The 2,000-fold increase in attacks was in stark contrast to the minimal activity in the first half of the...
  3. Friend

    Phishing test caused mass panic at the US University

    Why did the administration have to apologize for improving cybersecurity? At the University of California, Santa Cruz (UCSC), students and staff received an alarming email warning of a case of Ebola virus infection among staff. According to the letter, one of the employees, who recently...
  4. Carding Forum

    Conclusion Games: How Hamster Kombat became a hotbed for Phishing

    Cybercriminals have created more than 600 fake websites to steal Telegram accounts. From May to July, F. A. C. C. T. researchers found more than 600 fake resources disguised as the clicker game Hamster Kombat and designed to hijack Telegram accounts. A representative of the company told...
  5. Carding Forum

    Beware of dangerous cargo: a global phishing attack on industrial companies

    Hackers attack businesses around the world under the guise of a logistics company. In the summer of 2024, cybercriminals became more active, attacking industrial enterprises around the world under the guise of a well-known transport company. Kaspersky Lab experts warn that hackers are stealing...
  6. Carding Forum

    EvilProxy + Cloudflare: A new era of sophisticated phishing

    Step-by-step tutorials make complex attacks accessible to everyone. The developers of the EvilProxy phishing kit have created and are actively distributing step-by-step instructions on how to use legitimate Cloudflare services to mask malicious traffic. Such malicious guides add new tools to...
  7. Carding Forum

    Russian language, local realities: Phishing becomes personalized

    F. A. C. C. T. analyzed malicious mailings in the second quarter of 2024. The company F. A. C. C. T. conducted a study of malicious mailings for the second quarter of 2024. The analysis revealed a number of significant changes and trends that companies and users should pay attention to in order...
  8. Carding Forum

    Microsoft tops the list of brands for phishing attacks according to Check Point Research

    New names have been added to the list of victims of cyber attacks. Phishing attacks remain one of the most common cyber threats and are often the beginning of larger supply chain campaigns. Recently, Check Point Research (CPR), the threat analysis division of Check Point® Software Technologies...
  9. Carding Forum

    Phishing with approval: one signature can cost $2.7 billion

    Operation Spincaster reveals a scheme to combat asset theft with a couple of taps. Approval phishing scams are becoming increasingly common and dangerous methods of stealing funds in the cryptocurrency space. Criminals fraudulently (Pig Butchering or romance scam) force users to sign malicious...
  10. Carding Forum

    FishXProxy: A bloodthirsty phishing monster has broken free

    The darknet has spawned another monster for advanced cyber fraud. A new phishing tool called FishXProxy has appeared on the darknet, which greatly simplifies the task for cybercriminals. This set of tools was identified by researchers of the SlashNext Security platform. FishXProxy offers...
  11. Carding Forum

    Creating the perfect phishing scam by bypassing 2FA

    Part 1 Nowadays, we very often have to deal with phishing. Of course, more or less savvy people can easily recognize it. But only demand determines supply, and if they use it, it means it works. But the developers of security systems are also not asleep, you say, and you will be absolutely...
  12. Tomcat

    102 years for phishing: scam for $1.5 million ended for scammers with a prison cell

    Living on another continent did not save cyberbandsters from justice. The US Department of Justice has convicted a Nigerian citizen for participating in a business email compromise scam (BEC attack) that caused $1.5 million in damages. Ebuka Raphael Umethi, aged 35, along with two alleged...
  13. Tomcat

    The psychology of phishing: how carders use psychological techniques to deceive users and how to resist them

    Tamara Chechetkina, head of marketing for information security VK, told KP.RU how to avoid becoming a victim of carders. Any phishing attack is based on carding methods of psychological influence on a person. Whatever technical implementation the carders choose, they always strive to ensure...
  14. Tomcat

    What is a phishing email and how to do it!

    Although phishing emails are not new or the only method of using social engineering, they work well and are almost always applicable. But every detail obtained at the OSINT stage is important for success, starting from the email addresses themselves and ending with the style of corporate...
  15. Tomcat

    Scammers attacked London with a phishing SMS cannon

    The criminals built a makeshift antenna for a large-scale campaign, but somewhere they miscalculated... British law enforcement officers have managed to uncover an unprecedented Internet fraud scheme in which attackers used a makeshift phone tower for a massive phishing operation. Two suspects...
  16. Tomcat

    In Zhytomyr region, three young people were caught in phishing fraud

    Investigators and cyber police found that the criminal scheme to gain access to bank accounts of citizens was implemented by young men aged 16 and 17 years. To do this, they used phishing links that were distributed in social network chats. Among those deceived are residents of different...
  17. Tomcat

    V3B: Phishing epidemic engulfs European banks

    A new phishing kit allows you to steal your account unnoticed using modern methods. Resecurity specialists have discovered a new V3B phishing kit that targets customers of European banks. According to a report from Resecurity, a group of cybercriminals are selling the V3B phishing kit via...
  18. Tomcat

    The mechanism of operation of the Estate robo-phishing platform has been revealed

    Atropos.ai researchers were able to gain access to the internal database of the Estate platform, which entered the market of robotic phishing campaigns in mid-2023. As TechCrunch reports, the service allows for SIM spoofing attacks, and thousands of people could become its victims. “Estate...
  19. Tomcat

    Phishing mammoths: how to avoid becoming a victim of Scam 1.0 and Scam 2.0?

    Who are the workers and how do they cheat on trading platforms? Fraud on message boards and trading platforms has become a serious problem due to the emergence of organized criminal groups. They work on the Fraud-as-a-Service model, constantly improving schemes for stealing money and personal...
  20. Tomcat

    The release of Arc Browser for Windows was marred by a sophisticated phishing campaign

    How did hundreds of Internet users manage to download a Trojan browser instead of a legitimate one? A new campaign to distribute malware through the Google Ads advertising platform coincided with the launch of the Arc web browser for Windows, which led to the infection of many users with Trojan...
Top