Top

Category: Phishing


Phishing

Don’t fall for fake NEO, Tether and MetaMask cryptocurrency wallets on Google Play

November 15, 2018

Via: Hot for Security

Fake cryptocurrency wallets continue to creep their way into Google’s application store for Android aficionados, as one researcher has recently discovered. Using his personal website, independent researcher Lukas Stefanko sounds the alarm over four new fake cryptocurrency wallets that trick […]


Phishing

Nation-State Phishing: A Country-Sized Catch

October 30, 2018

Via: Threat Post

Sophisticated nation-state groups now integrate phishing as a core component of their statecraft. Thanks to the traditional role of phishing in widespread email scams, there is a general tendency to equate it with clearly fraudulent and obnoxiously implausible emails. While […]


Phishing

Phishing attacks becoming more targeted, phishers love Microsoft the most

October 23, 2018

Via: Help Net Security

Microsoft remains ensconced on the top of the list of brands impersonated by phishers in North America, Vade Secure has revealed. Phishers’ favorite targets The company compiles a list of the top 25 “phishers’ favorites” each quarter by tallying the […]


Email security, Phishing

Most government domains adopt program to prevent sending of fake emails

October 16, 2018

Via: The Hill

The majority of federal domains met a deadline to adopt an email authentication program aimed at preventing fake emails from being sent, according to an analysis by the cybersecurity firm Proofpoint. The Department of Homeland Security (DHS) announced last October […]


Hacker, Phishing

Zoho abused by cyber criminals worldwide

October 4, 2018

Via: TechRadar

One of the world’s most popular online software suites has been hijacked to deliver phishing campaigns, new research has found, Zoho and its online platforms are currently linked to 40 percent of keylogger and phishing campaigns in the last month, […]


Phishing, Threats & Malware

Roaming Mantis part III: iOS crypto-mining and spreading via malicious content delivery system

October 1, 2018

Via: Securelist

In Q2 2018, Kaspersky Lab published two blogposts about Roaming Mantis sharing details of this new cybercriminal campaign. In the beginning, the criminals used DNS hijacking in vulnerable routers to spread malicious Android applications of Roaming Mantis (aka MoqHao and […]


Phishing

Account Takeover Attacks Become a Phishing Fave

September 21, 2018

Via: Dark Reading

More than three-quarters of ATOs resulted in a phishing email, a new report shows. Why spoof an email address for phishing messages when you can hijack an account and send them from the real one? That’s the theory behind account […]


Phishing, Vulnerabilities

Threats posed by using RATs in ICS

September 20, 2018

Via: Securelist

While conducting audits, penetration tests and incident investigations, we have often come across legitimate remote administration tools (RAT) for PCs installed on operational technology (OT) networks of industrial enterprises. In a number of incidents that we have investigated, threat actors […]


Email security, Phishing

State Department confirms breach of unclassified email system

September 19, 2018

Via: CSO Online

The U.S. State Department confirmed it suffered a data breach that exposed employee data; the breach affected the State Department’s unclassified email system. It’s not like the agency suddenly decided to tell the public about the breach, though. The incident […]


Identity theft, Phishing

Here’s Why Business Email Compromise Is Still Driving Executive Identity Theft

September 12, 2018

Via: Security Intelligence

All it took was access to a lawyer’s email, and suddenly, almost $532,000 was in the wrong hands. This business email compromise (BEC) scam began simply: A criminal in Los Angeles named Ochenetchouwe Adegor Ederaine, Jr. gained access to a […]