article thumbnail

Two Russians Charged in $17M Cryptocurrency Phishing Spree

Krebs on Security

authorities today announced criminal charges and financial sanctions against two Russian men accused of stealing nearly $17 million worth of virtual currencies in a series of phishing attacks throughout 2017 and 2018 that spoofed websites for some of the most popular cryptocurrency exchanges. Separately, the U.S.

article thumbnail

Fake Lawsuit Threat Exposes Privnote Phishing Sites

Krebs on Security

The disclosure revealed a profitable network of phishing sites that behave and look like the real Privnote, except that any messages containing cryptocurrency addresses will be automatically altered to include a different payment address controlled by the scammers. co showing the site did indeed swap out any cryptocurrency addresses.

Phishing 205
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Google Looker Studio abused in cryptocurrency phishing attacks

Bleeping Computer

Cybercriminals are abusing Google Looker Studio to create counterfeit cryptocurrency phishing websites that phish digital asset holders, leading to account takeovers and financial losses. [.]

article thumbnail

Compromised cloud accounts leading to Cryptocurrency mining

CyberSecurity Insiders

Google, the business subsidiary of tech giant Alphabet Inc, has released a report saying that the compromised cloud accounts were leading hackers to mine cryptocurrency that could prove as a double threat to customers. And then use a 2FA to add an extra layer of security protection to safeguard an online account.

article thumbnail

Microsoft Warns of Hackers Exploiting OAuth for Cryptocurrency Mining and Phishing

The Hacker News

Microsoft has warned that adversaries are using OAuth applications as an automation tool to deploy virtual machines (VMs) for cryptocurrency mining and launch phishing attacks.

article thumbnail

Trezor’s Twitter account hijacked by cryptocurrency scammers via bogus Calendly invite

Graham Cluley

Hardware wallet manufacturer Trezor has explained how its Twitter account was compromised - despite it having sensible security precautions in place, such as strong passwords and multi-factor authentication. Read more in my article on the Hot for Security blog.

article thumbnail

Rogue cryptocurrency billboards go phishing for wallets

Malwarebytes

However, a “wallet drainer” is just another way of saying “phishing website” There are three ways the majority of cryptocurrency phishes take place: Airdrop phishing. The phishing component depended on them manually entering their details into the fake website. Bogus giveaways.