article thumbnail

Fake Lawsuit Threat Exposes Privnote Phishing Sites

Krebs on Security

The disclosure revealed a profitable network of phishing sites that behave and look like the real Privnote, except that any messages containing cryptocurrency addresses will be automatically altered to include a different payment address controlled by the scammers. co showing the site did indeed swap out any cryptocurrency addresses.

Phishing 222
article thumbnail

Decrypting Cryptocurrencies

IT Security Guru

Cryptocurrencies are a topic that touches many areas; not only finance and investing but technology and even political arenas. Although apolitical in itself, it is the structure behind these cryptocurrencies that make them a much talked about subject amongst political purists from across the political spectrum.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Canada Charges Its “Most Prolific Cybercriminal”

Krebs on Security

According to cyber intelligence firm Intel 471 , that dark_cl0ud6@hotmail.com address has been used in conjunction with the handle “ DCReavers2 ” to register user accounts on a half-dozen English-language cybercrime forums since 2008, including Hackforums , Blackhatworld, and Ghostmarket.

article thumbnail

Cybercriminals’ friend VPNLab.net shut down by law enforcement

Malwarebytes

VPNLab had been around since 2008 and had built its service around the OpenVPN technology, used strong encryption, and provided double VPN, with servers located in many different countries. The basic technology is called VPN server chaining and the idea behind it is pretty simple, but that doesn’t mean the technology is.

VPN 73
article thumbnail

New Cyberthreats for 2021

Adam Levin

Ransomware was a relatively obscure form of malware until the early 2010s , but it has increased in scope and the amount of damage it has caused year after year, aided by a proliferation of botnets , cryptocurrencies , and sophisticated criminal enterprises. An artificially generated “person.” Source: ThisPersonDoesNotExist.com?????.

IoT 130
article thumbnail

Three UK-based Nigerian BEC Scammers Used Construction Intelligence Service to Target Victims

Security Boulevard

Because "bridgetclark" was using a TOR-based cryptocurrency wallet to obscure his true location, the FBI pursued a Rule 41(b)(6)(A) search warrant. A review of the email account, which had been active since 2008, showed that he was in regular communications with the scammers listed above on their yahoo.co.uk addresses. .

Banking 64
article thumbnail

StripedFly: Perennially flying under the radar

SecureList

Introduction It’s just another cryptocurrency miner… Nobody would even suspect the mining malware was merely a mask, masquerading behind an intricate modular framework that supports both Linux and Windows. During that time, it had effectively evaded analysis and had previously been misclassified as a cryptocurrency miner.

Malware 112