Remove 2019 Remove Identity Theft Remove Passwords Remove Social Engineering
article thumbnail

T-Mobile Store Owner Made $25M Illegally Unlocking Cellphones

SecureWorld News

Department of Justice (DOJ) says Argishti Khudaverdyan, 44, was found guilty of 14 federal criminal charges for the scheme he ran from 2014 to 2019 that netted $25 million in criminal proceeds. Very often he would socially engineer employees at the IT help desk to get their credentials.

Mobile 83
article thumbnail

The Revival of Raccoon Stealer

Approachable Cyber Threats

Raccoon Stealer has been around since April 2019, and was one of the most prolific information stealers in 2021. DropBox and social engineering. Scammers would use social engineering to trick users into navigating to filesharing sites, like DropBox, via a malicious URL, causing them to download Raccoon Stealer.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

An odd kind of cybercrime: Gift vouchers, medical records, and.food

Malwarebytes

According to Brighton and Hove news , his spree began in 2019 with the initial purchase of a laptop from Amazon, bought with “fake Honey gift vouchers” I would love to know more about how this initial foray into system compromise worked, as one would imagine purchasing anything with fake vouchers would be a bit of a tall order.

article thumbnail

Account Takeover: What is it and How to Prevent It?

Identity IQ

Account takeover, also known as ATO, is a form of identity theft in which a malicious third party gains access to or “takes over” an online account. It’s one of the fastest-growing cybersecurity threats today, growing a staggering 300% since 2019 and leading to consumer losses of $3.5 What is Account Takeover?

article thumbnail

T-Mobile customers were hit with SIM swapping attacks

Security Affairs

Impacted T-Mobile customers are recommended to change their password, PIN, and security questions. T-Mobile offers two years of free credit monitoring and identity theft detection services to impacted customers. Unfortunately, this isn’t the first data breach suffered by T-Mobile in the past years.

Mobile 91
article thumbnail

Staying a Step Ahead of the Hack

Webroot

Hackers, never at a loss for creative deception, have engineered new tactics for exploiting the weakest links in the cybersecurity chain: ourselves! Social engineering and business email compromise (BEC) are two related cyberattack vectors that rely on human error to bypass the technology defenses businesses deploy to deter malware.

Hacking 47
article thumbnail

Online marketing company exposes 38+ million US citizen records

Security Affairs

The statement of work documents for marketing campaigns date between 2018 and 2019: Who owns the bucket? If your email happens to be among those leaked, immediately change your email password. Most of the CSV files contain user records for what we assume to be target demographics for either digital or physical marketing materials.