article thumbnail

BH EU 2022 and BSides London

Javvad Malik

My presentation on navigating the social engineering jungle. Andy and I had met at the first BSides back in 2011, and we decided to recreate the photo we took back then. And then, it was my turn to take the stage (a considerably smaller stage compared to Dan, in the basement, at the back).

article thumbnail

Confessions of an ID Theft Kingpin, Part I

Krebs on Security

For several years beginning around 2010, a lone teenager in Vietnam named Hieu Minh Ngo ran one of the Internet’s most profitable and popular services for selling “ fullz ,” stolen identity records that included a consumer’s name, date of birth, Social Security number and email and physical address.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Charming Kitten APT is targeting Iranian dissidents in Germany

Security Affairs

The Charming Kitten group made the headlines in 2014 when experts at iSight issued a report describing the most elaborate net-based spying campaign organized by Iranian hackers using social media. The cyber spies used social media to gather information on the targets and as a vector for social engineering attacks.

article thumbnail

SHARED INTEL: How ransomware evolved from consumer trickery to deep enterprise hacks

The Last Watchdog

Balaban This ransomware was doing the rounds over spam generated by the Gameover ZeuS botnet, which had been originally launched in 2011 as a toolkit for stealing victim’s banking credentials and was repurposed for malware propagation.

article thumbnail

Charming Kitten Campaign involved new impersonation methods

Security Affairs

Microsoft has been tracking the threat actors at least since 2013, but experts believe that the cyberespionage group has been active since at least 2011. . As part of the recently observed campaign, the state-sponsored hackers used three different spear-phishing methods: Ending an email message leveraging social engineering methods.

Media 93
article thumbnail

No, Colonel Gaddafi’s daughter isn’t emailing to give you untold riches

Malwarebytes

Ayesha fled Libya shortly after the Battle of Tripoli back in 2011. The scammers can’t even get this right; Aisha has had four children , but two of them were killed during the fighting in 2011. She eventually moved from Algeria to Oman, where she claims political asylum to this day.

article thumbnail

The Scammers’ Playbook: How Cybercriminals Get Ahold of Your Data

eSecurity Planet

As a matter of fact, the most-reported crime in the 2021 Internet Crime Report report was phishing , a social engineering scam wherein the victim receives a deceptive message from someone in an attempt to get the victim to reveal personal information or account credentials or to trick them into downloading malware. Social Tactics.