Remove 2019 Remove Cryptocurrency Remove Cybercrime Remove Internet
article thumbnail

Fake Lawsuit Threat Exposes Privnote Phishing Sites

Krebs on Security

The disclosure revealed a profitable network of phishing sites that behave and look like the real Privnote, except that any messages containing cryptocurrency addresses will be automatically altered to include a different payment address controlled by the scammers. co showing the site did indeed swap out any cryptocurrency addresses.

Phishing 222
article thumbnail

How Did Authorities Identify the Alleged Lockbit Boss?

Krebs on Security

This post examines the activities of Khoroshev’s many alter egos on the cybercrime forums, and tracks the career of a gifted malware author who has written and sold malicious code for the past 14 years. was used by a Russian-speaking member called Pin on the English-language cybercrime forum Opensc. Dmitry Yuryevich Khoroshev.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Does One Get Hired by a Top Cybercrime Gang?

Krebs on Security

This post explores answers to those questions, as well as some of the ways Trickbot and other organized cybercrime gangs gradually recruit, groom and trust new programmers. Alla Witte’s personal website — allawitte[.]nl nl — circa October 2018. 6 in Miami, Fla. “Several group members had AllaWitte folders with data.

article thumbnail

Reading the FBI IC3’s ‘2020 Internet Crime Report’

Security Affairs

The FBI’s Internet Crime Complaint Center has released its annual report, the 2020 Internet Crime Report , which includes data from 791,790 complaints of suspected cybercrimes. billion and authorities observed an increase of more than 300,000 complaints from 2019 (+69%). ” reads 2020 Internet Crime Report.

Internet 102
article thumbnail

Highly evasive cryptocurrency miner targets macOS

Security Affairs

Trojanized versions of legitimate applications are being used to deploy XMRig cryptocurrency miner on macOS systems. This malware relies on the i2p (Invisible Internet Project) anonymization network for communication. The experts identified three generation of malware since August 2019. ” concludes the report.

article thumbnail

Disrupting Ransomware by Disrupting Bitcoin

Schneier on Security

Now, it’s become the criminal business model of the internet for two reasons. This is where the suggestion to ban cryptocurrencies as a way to “solve” ransomware comes from. In this light, banning cryptocurrencies like bitcoin is an obvious solution. The second is a safe way of collecting ransoms: bitcoin.

article thumbnail

A Ukrainian Raccoon Infostealer operator is awaiting trial in the US

Security Affairs

The man was held in the Netherlands, and he was charged for his alleged role in the international cybercrime operation known as Raccoon Infostealer. The Raccoon stealer was first spotted in April 2019, it was designed to steal victims’ credit card data, email credentials, cryptocurrency wallets, and other sensitive data.