Remove Accountability Remove Cryptocurrency Remove Social Engineering Remove Spyware
article thumbnail

Security Affairs newsletter Round 422 by Pierluigi Paganini – International edition

Security Affairs

Xplain hack impacted the Swiss cantonal police and Fedpol Zyxel published guidance for protecting devices from ongoing attacks Kimsuky APT poses as journalists and broadcast writers in its attacks New Linux Ransomware BlackSuit is similar to Royal ransomware CISA adds Progress MOVEit Transfer zero-day to its Known Exploited Vulnerabilities catalog (..)

Spyware 85
article thumbnail

Crimeware and financial cyberthreats in 2023

SecureList

Unlike common stealers, this malware gathered data that can be used to identify the victims, such as browsing histories, social networking account IDs and Wi-Fi networks. Cryptocurrency targeted attacks. More cryptocurrency-related threats: fake hardware wallets, smart contract attacks, DeFi hacks, and more.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Don't plug your phone into a free charging station, warns FBI

Malwarebytes

There are crawlers that can search your phone for personally identifiable information (PII), account credentials, banking-related or credit card data in seconds. Instead, hackers know that our mobile devices store a lot of PII, which can be sold on the dark web for profit or re-used in social engineering campaigns.

Mobile 98
article thumbnail

Spam and phishing in 2022

SecureList

These sites referenced public figures and humanitarian groups, offering to accept cash in cryptocurrency, something that should have raised a red flag in itself. For example, one website offered users to obtain a COVID vaccination certificate by entering their British National Health Service (NHS) account credentials.

article thumbnail

45 Main Cyber Security Terms Everyone Must Know

Spinone

Spyware – malware that spies on the computer to collect the information about a product, a company, a person. The most widespread spyware are keyloggers and trojans. Hacking and Social Engineering Attack vector – a specific method used by a hacker to accomplish his malicious goal.

article thumbnail

Types of Malware & Best Malware Protection Practices

eSecurity Planet

Additional features of botnets include spam, ad and click fraud, and spyware. Cybersecurity vendors like Panda Security suggest the best way to defend against crimeware is using a combination of antivirus, anti-spyware, firewalls, and threat detection technology. Phishing and Social Engineering. Jump ahead: Adware.

Malware 105
article thumbnail

IT threat evolution Q1 2022

SecureList

In January, we reported a malicious campaign targeting companies that work with cryptocurrencies, smart contracts, decentralized finance and blockchain technology: the attackers are interested in fintech in general. The campaign has two goals: gathering information and stealing cryptocurrency. Other malware.

Phishing 103