article thumbnail

Half of Americans Experienced Identity Theft During COVID-19 Pandemic, New Study Shows

Hot for Security

A new report uncovers a striking pervasiveness of identity theft perpetrated against U.S. consumers experienced identity theft between 2019 and 2020. the unauthorized use of one’s identity to apply for an account), and 38% experienced account takeover (i.e.,

article thumbnail

T-Mobile Store Owner Made $25M Illegally Unlocking Cellphones

SecureWorld News

Department of Justice (DOJ) says Argishti Khudaverdyan, 44, was found guilty of 14 federal criminal charges for the scheme he ran from 2014 to 2019 that netted $25 million in criminal proceeds. Very often he would socially engineer employees at the IT help desk to get their credentials. How was he unlocking these phones?

Mobile 86
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Saudi Ministry exposed sensitive data for 15 months

Security Affairs

It was established in 2019 to diversify Saudi Arabia’s economy away from oil and gas. file was indexed by IoT search engines was in March 2022, meaning that the data was exposed for at least 15 months. The stolen data can be used for identity theft, blackmail, or sold on the black market,” researchers said.

article thumbnail

You’ve Never Heard of the C-Suite Targeting Scam, but It’s a Killer

Adam Levin

The Federal Bureau of Investigation’s 2019 annual Internet Crime Report included 467,361 complaints about suspected internet crime with losses of $3.5 billion, or roughly half, of the total losses in 2019 were attributed to generic email account compromise (EAC) complaints. billion in BEC scam-related losses the year before.

Scams 130
article thumbnail

The Revival of Raccoon Stealer

Approachable Cyber Threats

Raccoon Stealer has been around since April 2019, and was one of the most prolific information stealers in 2021. DropBox and social engineering. Scammers would use social engineering to trick users into navigating to filesharing sites, like DropBox, via a malicious URL, causing them to download Raccoon Stealer.

article thumbnail

An odd kind of cybercrime: Gift vouchers, medical records, and.food

Malwarebytes

According to Brighton and Hove news , his spree began in 2019 with the initial purchase of a laptop from Amazon, bought with “fake Honey gift vouchers” I would love to know more about how this initial foray into system compromise worked, as one would imagine purchasing anything with fake vouchers would be a bit of a tall order.

article thumbnail

T-Mobile customers were hit with SIM swapping attacks

Security Affairs

T-Mobile offers two years of free credit monitoring and identity theft detection services to impacted customers. Such kind of info could be used by hackers in social engineering attack against T-Mobile’s customer support employees with the intent of stealing the victim’s phone number.

Mobile 90