New names have been added to the list of victims of cyber attacks.
Phishing attacks remain one of the most common cyber threats and are often the beginning of larger supply chain campaigns. Recently, Check Point Research (CPR), the threat analysis division of Check Point® Software Technologies...
Operation Spincaster reveals a scheme to combat asset theft with a couple of taps.
Approval phishing scams are becoming increasingly common and dangerous methods of stealing funds in the cryptocurrency space. Criminals fraudulently (Pig Butchering or romance scam) force users to sign malicious...
The darknet has spawned another monster for advanced cyber fraud.
A new phishing tool called FishXProxy has appeared on the darknet, which greatly simplifies the task for cybercriminals. This set of tools was identified by researchers of the SlashNext Security platform.
FishXProxy offers...
Part 1
Nowadays, we very often have to deal with phishing. Of course, more or less savvy people can easily recognize it. But only demand determines supply, and if they use it, it means it works.
But the developers of security systems are also not asleep, you say, and you will be absolutely...
Living on another continent did not save cyberbandsters from justice.
The US Department of Justice has convicted a Nigerian citizen for participating in a business email compromise scam (BEC attack) that caused $1.5 million in damages.
Ebuka Raphael Umethi, aged 35, along with two alleged...
Tamara Chechetkina, head of marketing for information security VK, told KP.RU how to avoid becoming a victim of carders.
Any phishing attack is based on carding methods of psychological influence on a person. Whatever technical implementation the carders choose, they always strive to ensure...
Although phishing emails are not new or the only method of using social engineering, they work well and are almost always applicable. But every detail obtained at the OSINT stage is important for success, starting from the email addresses themselves and ending with the style of corporate...
The criminals built a makeshift antenna for a large-scale campaign, but somewhere they miscalculated...
British law enforcement officers have managed to uncover an unprecedented Internet fraud scheme in which attackers used a makeshift phone tower for a massive phishing operation. Two suspects...
Investigators and cyber police found that the criminal scheme to gain access to bank accounts of citizens was implemented by young men aged 16 and 17 years. To do this, they used phishing links that were distributed in social network chats.
Among those deceived are residents of different...
A new phishing kit allows you to steal your account unnoticed using modern methods.
Resecurity specialists have discovered a new V3B phishing kit that targets customers of European banks.
According to a report from Resecurity, a group of cybercriminals are selling the V3B phishing kit via...
Atropos.ai researchers were able to gain access to the internal database of the Estate platform, which entered the market of robotic phishing campaigns in mid-2023. As TechCrunch reports, the service allows for SIM spoofing attacks, and thousands of people could become its victims.
“Estate...
Who are the workers and how do they cheat on trading platforms?
Fraud on message boards and trading platforms has become a serious problem due to the emergence of organized criminal groups. They work on the Fraud-as-a-Service model, constantly improving schemes for stealing money and personal...
How did hundreds of Internet users manage to download a Trojan browser instead of a legitimate one?
A new campaign to distribute malware through the Google Ads advertising platform coincided with the launch of the Arc web browser for Windows, which led to the infection of many users with Trojan...
Phishing is a scam in which cybercriminals attempt to gain access to your sensitive information, such as passwords, credit card numbers, or social security numbers, by impersonating a legitimate sender.
In other words, phishing is a copy of a valid website or app.
What kind of phishing site is...
Content:
Phishing and scam history
Phishing and scam: current types of fraud
Phishing
Scam
Distribution
Instant Messengers
Social network
Marketplaces
Malicious methods: what phishing and scam consist of
Spoofing
Hacking websites
Using the functionality of legitimate services
Protection...
The attackers targeted the entire globe, without any exceptions.
Since April of this year, millions of phishing emails have been sent through the Phorpiex botnet as part of a large-scale campaign using the LockBit Black ransomware. The New Jersey Cybersecurity and Communications Integration...
Vaccination, tourism, cryptocurrency investments, major sports events, movie news, and subscriptions to popular services are among the top topics that are most actively exploited in phishing attacks according to Positive Technologies. You can find out which cyber fraud schemes have become the...
How holidays and trustfulness of citizens affect the activity of scammers.
Despite an extensive information campaign and warnings, fraudulent schemes that mimic the services of the postal service continue to operate successfully. Akamai found a significant increase in the activity of such...
The Prosecutor General's Office has sent a criminal case to the court against six Homel residents who were charged with embezzlement of property by modifying computer information as part of an organized group, BelTA has learned from the Department for Media Relations and Editorial Activities of...