article thumbnail

Beware Ukraine-themed fundraising scams

Malwarebytes

It was rife during the earthquake and tsunami of 2011 , with bogus Red Cross websites and email addresses set up to part people from their money. Reports indicate a big run on phishing and scams. The tactics used match those deployed in 2011, and pretty much every other major catastrophe. Cryptocurrency scamming is rampant.

Scams 113
article thumbnail

Phishers turning hard-working: CERT-GIB records upsurge of phishing resource blockages as duration of attacks grows

Security Affairs

Group-IB, a Singapore-based cybersecurity company, observed the growth of the lifespan of phishing attacks in the second half of 2019. Figure 1 The distribution of web-phishing among target categories . CERT-GIB’s findings indicate that phishing attack perpetrators have revised their so-called target pool. Target reshuffle.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Scammers’ Playbook: How Cybercriminals Get Ahold of Your Data

eSecurity Planet

As a matter of fact, the most-reported crime in the 2021 Internet Crime Report report was phishing , a social engineering scam wherein the victim receives a deceptive message from someone in an attempt to get the victim to reveal personal information or account credentials or to trick them into downloading malware. Technological tactics.

article thumbnail

Another NFT explainer, with a bonus look at the data security implications

Webroot

“What Bitcoin was to 2011, NFTs are to 2021.”. Since cryptocurrencies were, are and will continue to be impactful technologies, surely NFTs are a topic worth exploring. NFTs use the same blockchain ledger technology to verify uniqueness that cryptocurrencies rely on to prove ownership.

article thumbnail

NullMixer: oodles of Trojans in a single dropper

SecureList

SmokeLoader (aka Smoke) is a modular malware that has been known since 2011, distributed via phishing emails and drive-by downloads. The malware is known to be sold on online forums, and distributed via phishing emails. A full technical description will be provided in subsequent reports. SmokeLoader. RedLine Stealer.

Malware 114
article thumbnail

Security Affairs newsletter Round 178 – News of the week

Security Affairs

. · Iran-linked COBALT DICKENS group targets universities in new phishing campaign. · Security firm attributes Cosmos Bank cyberheist to Lazarus APT. · Cryptocurrency Platform Atlas Quantum hacked, 260k users impacted. · CVE-2018-15919 username enumeration flaw affects OpenSSH Versions Since 2011. · Data of 130 Million hotel (..)

Spyware 41
article thumbnail

ChatGPT: Cybersecurity friend or foe?

Malwarebytes

From the first Roomba in 2002 to the first virtual assistant (Siri) in 2011, AI has slowly and steadily penetrated the consumer technology market, often with little comprehension from buyers that artificial intelligence is actually powering the functionality behind their favorite devices.