phishing

  1. Father

    Without packages and money: phishing Mail sites become leaders in traffic

    How holidays and trustfulness of citizens affect the activity of scammers. Despite an extensive information campaign and warnings, fraudulent schemes that mimic the services of the postal service continue to operate successfully. Akamai found a significant increase in the activity of such...
  2. Father

    Six Homel residents are accused of embezzlement of funds using phishing links

    The Prosecutor General's Office has sent a criminal case to the court against six Homel residents who were charged with embezzlement of property by modifying computer information as part of an organized group, BelTA has learned from the Department for Media Relations and Editorial Activities of...
  3. Father

    Deceptive CAPTCHA: Latin America suffers from new Phishing methods

    How did the invoice go viral and why did emails become so dangerous? According to Trustwave SpiderLabs, a new phishing campaign has hit Latin America, during which Windows systems are infected with viruses through emails. The attack chain starts with sending out emails with a ZIP file...
  4. Father

    Google vs phishing: the company changes the rules for sending emails

    The new standards are designed to strengthen protection against spam and phishing. Google is taking new steps to strengthen the protection of Gmail users from spam and phishing attacks, tightening requirements for senders of mass mailings. Recently, the company has started automatically...
  5. Father

    In Lviv, law enforcement officers exposed an attacker who created phishing sites

    A nineteen-year-old resident of Lviv, who fraudulently lured out more than 100 thousand hryvnias from citizens, was exposed by operatives of the Department for Countering Cybercrime in the Lviv region, joint investigators of the Police Department No. 1 of the Lviv District Police Department No...
  6. Teacher

    A criminal group that used a phishing site to extort money from people was exposed

    Now it is established about the losses caused to citizens in the amount of almost 119 thousand UAH. Investigators informed the defendants about the suspicion. They face up to 8 years in prison. The illegal activity was stopped by employees of the Department of Countering Cybercrime in the...
  7. Teacher

    20,000 Fake brands: Darcula's Phishing empire launches

    RCS messages - a new loophole for attacks on Android and iPhone users. Netcraft has discovered a new phishing service called Darcula, which uses more than 20,000 domains to mimic popular brands and steal the credentials of Android and iPhone users in more than 100 countries. The PHAAS service...
  8. Teacher

    Large-scale phishing has spread to governments in Europe, America and Asia

    Properly written emails allowed hackers to deploy their tools. IBM X-Force reports on a series of phishing campaigns by the ITG05 group, during which fake documents are sent on behalf of government and non-governmental organizations in Europe, Transcaucasia, Central Asia, and North and South...
  9. Teacher

    Reverse SE or whatever the fuck it is on the example of "Phishing as a service" (PhaaS)

    Hello! Everyone knows what phishing is. He has been with us for over 20 years. But now, it seems that phishing has become more accessible than before. This article explains how scammers can benefit from increasing the popularity of phishing service sales in the form of a service. In this...
  10. Teacher

    Carding. We put phishing on hosting.

    Hello! Any carder should have a number of essential items. This is a credit card, good hosting and, of course, a domain. All this will provide the cardboard lover with a cherished second-level name. This article will help you figure it out. This article will also be useful for ordinary people...
  11. Teacher

    Appropriated more than half a million hryvnias: cyber police exposed phishing scammers

    Five attackers obtained bank card data from citizens using phishing links that copied the interface of popular Internet services. 44 people were identified as victims of the actions of intruders. The defendants face up to twelve years behind bars. The fraudsters were exposed by the cyber police...
  12. Teacher

    TA577 changes tactics: Phishing emails to steal NTLM hashes

    The world will have to find out what the new attack technique will lead to. The information security company Proofpoint discovered that the TA577 group has changed the tactics of its attacks. Hackers are now using phishing emails to steal NT LAN Manager (NTLM) authentication hashes, enabling...
  13. Teacher

    CryptoChameleon: a Phishing kit that can Destroy the cryptocurrency industry

    Now you need to be vigilant, even if you go to the sites of federal services. Lookout reports that the new CryptoChameleon phishing kit has become a tool for attacks on employees of the Federal Communications Commission( FCC), during which the fake Okta authentication system is used. The...
  14. Teacher

    The swindler who stole using phishing money allegedly for restoration of the temple is detained

    Employees of the Criminal investigation Department of the Ministry of Internal Affairs of Russia in the Nizhny Novgorod region detained a suspect in fraud under the pretext of collecting money for the restoration of the Orthodox Church of the Assumption of the Blessed Virgin Mary in the village...
  15. Brother

    Quishing - phishing with QR codes

    Check Point experts have identified a new variant of quishing (phishing with QR codes). A link embedded in the QR code leads to a resource that captures the user's digital fingerprint.Based on the results of verification, it works out a particular redirect. According to analysts, in August –...
  16. Brother

    Phishing for dummies: how much does an entrance ticket to the world of cybercrime cost?

    Everyone can now run their own malicious campaign. Cybersecurity experts draw attention to the" democratization " of the phishing ecosystem due to the transformation of Telegram into the epicenter of cybercrime, which allows attackers to organize mass attacks for relatively little money...
  17. Brother

    Adaptive phishing turns off victims guard

    A new threat is gaining momentum in the world of cybersecurity: adaptive phishing campaigns. This method is an evolution of traditional phishing: attackers use a personalized approach to overcome defenses, using information about victims collected from social networks, public sites and past data...
  18. Brother

    New Year's surge of phishing: scammers use clever tricks to fish out the data of company employees

    "You have a bonus! Open the file for more details." Cofense, a company specializing in electronic security, reports an increase in cases of cyber attacks aimed at stealing the credentials of employees of companies. Attackers use New Year's Eve messages about changes in pension accounts, salary...
  19. Brother

    European organizations lose data in new UAC-0050 phishing campaign

    Hackers have been quietly infiltrating vulnerable systems for several months now. The hacker group, known as UAC-0050, actively uses phishing attacks to distribute malicious software Remcos RAT. This software is designed for remote surveillance and management, and plays a key role in the...
  20. Brother

    Email hacking, new domains, and phishing: how to force a company to transfer $7.5 million to its accounts

    Hacker arrested for stealing funds from charitable organizations. A Nigerian citizen has been arrested in Ghana for fraud involving the Business Email Compromise (BEC) attack, which resulted in the loss of more than $7.5 million to a charity in the United States. Olusegun Samson Adejorin was...
Top