phishing

  1. Carding Forum

    Microsoft tops the list of brands for phishing attacks according to Check Point Research

    New names have been added to the list of victims of cyber attacks. Phishing attacks remain one of the most common cyber threats and are often the beginning of larger supply chain campaigns. Recently, Check Point Research (CPR), the threat analysis division of Check Point® Software Technologies...
  2. Carding Forum

    Phishing with approval: one signature can cost $2.7 billion

    Operation Spincaster reveals a scheme to combat asset theft with a couple of taps. Approval phishing scams are becoming increasingly common and dangerous methods of stealing funds in the cryptocurrency space. Criminals fraudulently (Pig Butchering or romance scam) force users to sign malicious...
  3. Carding Forum

    FishXProxy: A bloodthirsty phishing monster has broken free

    The darknet has spawned another monster for advanced cyber fraud. A new phishing tool called FishXProxy has appeared on the darknet, which greatly simplifies the task for cybercriminals. This set of tools was identified by researchers of the SlashNext Security platform. FishXProxy offers...
  4. Carding Forum

    Creating the perfect phishing scam by bypassing 2FA

    Part 1 Nowadays, we very often have to deal with phishing. Of course, more or less savvy people can easily recognize it. But only demand determines supply, and if they use it, it means it works. But the developers of security systems are also not asleep, you say, and you will be absolutely...
  5. Tomcat

    102 years for phishing: scam for $1.5 million ended for scammers with a prison cell

    Living on another continent did not save cyberbandsters from justice. The US Department of Justice has convicted a Nigerian citizen for participating in a business email compromise scam (BEC attack) that caused $1.5 million in damages. Ebuka Raphael Umethi, aged 35, along with two alleged...
  6. Tomcat

    The psychology of phishing: how carders use psychological techniques to deceive users and how to resist them

    Tamara Chechetkina, head of marketing for information security VK, told KP.RU how to avoid becoming a victim of carders. Any phishing attack is based on carding methods of psychological influence on a person. Whatever technical implementation the carders choose, they always strive to ensure...
  7. Tomcat

    What is a phishing email and how to do it!

    Although phishing emails are not new or the only method of using social engineering, they work well and are almost always applicable. But every detail obtained at the OSINT stage is important for success, starting from the email addresses themselves and ending with the style of corporate...
  8. Tomcat

    Scammers attacked London with a phishing SMS cannon

    The criminals built a makeshift antenna for a large-scale campaign, but somewhere they miscalculated... British law enforcement officers have managed to uncover an unprecedented Internet fraud scheme in which attackers used a makeshift phone tower for a massive phishing operation. Two suspects...
  9. Tomcat

    In Zhytomyr region, three young people were caught in phishing fraud

    Investigators and cyber police found that the criminal scheme to gain access to bank accounts of citizens was implemented by young men aged 16 and 17 years. To do this, they used phishing links that were distributed in social network chats. Among those deceived are residents of different...
  10. Tomcat

    V3B: Phishing epidemic engulfs European banks

    A new phishing kit allows you to steal your account unnoticed using modern methods. Resecurity specialists have discovered a new V3B phishing kit that targets customers of European banks. According to a report from Resecurity, a group of cybercriminals are selling the V3B phishing kit via...
  11. Tomcat

    The mechanism of operation of the Estate robo-phishing platform has been revealed

    Atropos.ai researchers were able to gain access to the internal database of the Estate platform, which entered the market of robotic phishing campaigns in mid-2023. As TechCrunch reports, the service allows for SIM spoofing attacks, and thousands of people could become its victims. “Estate...
  12. Tomcat

    Phishing mammoths: how to avoid becoming a victim of Scam 1.0 and Scam 2.0?

    Who are the workers and how do they cheat on trading platforms? Fraud on message boards and trading platforms has become a serious problem due to the emergence of organized criminal groups. They work on the Fraud-as-a-Service model, constantly improving schemes for stealing money and personal...
  13. Tomcat

    The release of Arc Browser for Windows was marred by a sophisticated phishing campaign

    How did hundreds of Internet users manage to download a Trojan browser instead of a legitimate one? A new campaign to distribute malware through the Google Ads advertising platform coincided with the launch of the Arc web browser for Windows, which led to the infection of many users with Trojan...
  14. BulletHost

    BulletHost.IO | BOTNET / PHISHING / BRUTE / EXPLOIT / SCAN ALLOWED | Bulletproof & Anonymous

    Website: www.bullethost.io Price: 29.99€ - 79.99€ Contact: Website Ticket Telegram: https://t.me/bullethost_support_bot
  15. Tomcat

    Phishing in carding (basics for beginners)

    Phishing is a scam in which cybercriminals attempt to gain access to your sensitive information, such as passwords, credit card numbers, or social security numbers, by impersonating a legitimate sender. In other words, phishing is a copy of a valid website or app. What kind of phishing site is...
  16. Father

    Phishing and scamming: basic techniques and trends

    Content: Phishing and scam history Phishing and scam: current types of fraud Phishing Scam Distribution Instant Messengers Social network Marketplaces Malicious methods: what phishing and scam consist of Spoofing Hacking websites Using the functionality of legitimate services Protection...
  17. Father

    Phorpiex phishing epidemic returns: collaboration with LockBit made attacks even more dangerous

    The attackers targeted the entire globe, without any exceptions. Since April of this year, millions of phishing emails have been sent through the Phorpiex botnet as part of a large-scale campaign using the LockBit Black ransomware. The New Jersey Cybersecurity and Communications Integration...
  18. Father

    Phishing - 2024. Top 10 most popular cybercrime schemes.

    Vaccination, tourism, cryptocurrency investments, major sports events, movie news, and subscriptions to popular services are among the top topics that are most actively exploited in phishing attacks according to Positive Technologies. You can find out which cyber fraud schemes have become the...
  19. Father

    Without packages and money: phishing Mail sites become leaders in traffic

    How holidays and trustfulness of citizens affect the activity of scammers. Despite an extensive information campaign and warnings, fraudulent schemes that mimic the services of the postal service continue to operate successfully. Akamai found a significant increase in the activity of such...
  20. Father

    Six Homel residents are accused of embezzlement of funds using phishing links

    The Prosecutor General's Office has sent a criminal case to the court against six Homel residents who were charged with embezzlement of property by modifying computer information as part of an organized group, BelTA has learned from the Department for Media Relations and Editorial Activities of...
Top