article thumbnail

No SOCKS, No Shoes, No Malware Proxy Services!

Krebs on Security

com , a malware-based proxy network that has been in existence since at least 2010. Cached versions of the site show that in 2010 the software which powers the network was produced with a copyright of “ Escort Software.” Among the more frequently recommended alternatives to 911 is SocksEscort[.]com SocksEscort[.]com

Malware 265
article thumbnail

Has Facebook leaked your phone number?

Malwarebytes

To be honest, between scraping vulnerabilities dating back to 2010 , and the Cambridge Analytica scandal , an old data breach is still a data breach, and you’re probably still going to need to pay attention to it. The first thing that comes to mind is a scam where people text you pretending to be a relative or dear friend.

Scams 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Cyberthreats for 2021

Adam Levin

The massive shift to work from home in response to the Covid-19 pandemic has meant a rush to secure a wider range of home devices and networks, and an instant spike in demand for training and services that protect employees in identifying attempted cyberattacks and scams. Economic stimulus checks were targeted.

IoT 130
article thumbnail

Nine-year Malaysia Airlines breach gave attackers lots of time to misuse data

SC Magazine

Malaysia Airlines faces the daunting task of investigating over nine years’ worth of compromised data after learning of a “data security incident” at a third-party IT service provider that exposed Enrich frequent flyer program member data from March 2010 through June 2019. Airline loyalty program data is a popular target among cybercriminals.

Scams 117
article thumbnail

SHARED INTEL: Ramifications of 86 cities storing citizens’ data in misconfigured AWS S3 buckets

The Last Watchdog

There was no need for a password or login credentials to access this information, and the data was not encrypted. Then, if it has indeed been accessed and exploited, it’s probable that most of the data would be sold on the DarkWeb to people looking for such details to help provide fake identities, phishing scams or else.

article thumbnail

Inside ‘Evil Corp,’ a $100M Cybercrime Menace

Krebs on Security

In March 2010, Aqua would divulge in an encrypted chat that his crew was working directly with the Zeus author (Slavik/Lucky12345), but that they found him abrasive and difficult to tolerate: dimka: I read about the king of seas, was it your handy work? 2010 Criminal complaint vs. Yukabets, et. Besides us no one reads his column .

article thumbnail

Cyber Security Roundup for April 2021

Security Boulevard

review Active Directory password policy. At the start of March 2021, Microsoft rushed out patches for a critical zero-day Vulnerability in Exchange Server (2010, 2013, 2016, and 2019). Stolen in Pandemic Scams. conduct employee phishing tests. conduct penetration testing. implement offline storage and tape-based backup.