Remove Cryptocurrency Remove Download Remove Phishing Remove Spyware
article thumbnail

Spam and phishing in 2023

SecureList

To get access to the content (or contest), phishing sites prompted the victim to sign in to one of their gaming accounts. If the victim entered their credentials on the phishing form, the account was hijacked. Cryptocurrency scams Phishing aimed at stealing crypto wallet credentials remained a common money-making tool.

Phishing 101
article thumbnail

Spam and phishing in 2022

SecureList

Short-lived phishing sites often offered to see the premieres before the eagerly awaited movie or television show was scheduled to hit the screen. These sites referenced public figures and humanitarian groups, offering to accept cash in cryptocurrency, something that should have raised a red flag in itself.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Spam and phishing in Q2 2021

SecureList

A fake notification about a Microsoft Teams meeting or a request to view an important document traditionally takes the victim to a phishing login page asking for corporate account credentials. pdf.exe) that the victim was asked to download was a malicious program known as Backdoor.Win32.RWS.a. In fact, the file named “??????? ?8883987726

Phishing 118
article thumbnail

Threat landscape for industrial automation systems, H2 2021

SecureList

. >Percentage of ICS computers on which malicious objects were blocked ( download ). Percentage of ICS computers on which malicious objects were blocked, January – December 2018 – 2021 ( download ). Percentage of ICS computers on which malicious objects were blocked in selected industries ( download ). Malicious objects.

Spyware 89
article thumbnail

Security Affairs newsletter Round 422 by Pierluigi Paganini – International edition

Security Affairs

Xplain hack impacted the Swiss cantonal police and Fedpol Zyxel published guidance for protecting devices from ongoing attacks Kimsuky APT poses as journalists and broadcast writers in its attacks New Linux Ransomware BlackSuit is similar to Royal ransomware CISA adds Progress MOVEit Transfer zero-day to its Known Exploited Vulnerabilities catalog (..)

Spyware 82
article thumbnail

IT threat evolution Q1 2022

SecureList

In January, we reported a malicious campaign targeting companies that work with cryptocurrencies, smart contracts, decentralized finance and blockchain technology: the attackers are interested in fintech in general. The campaign has two goals: gathering information and stealing cryptocurrency.

Phishing 108
article thumbnail

Types of Malware & Best Malware Protection Practices

eSecurity Planet

Adware, also known as malvertising , is a type of malware that downloads or displays advertisements to the user interface. Users sometimes unknowingly infect themselves with adware installed by default when they download and install other applications. Additional features of botnets include spam, ad and click fraud, and spyware.

Malware 104