Remove Advertising Remove Scams Remove Social Engineering
article thumbnail

Happy 15th Anniversary, KrebsOnSecurity!

Krebs on Security

In January, KrebsOnSecurity told the story of a Canadian man who was falsely charged with larceny and lost his job after becoming the victim of a complex e-commerce scam known as triangulation fraud. In this scam, you receive what you ordered, and the only party left to dispute the transaction is the owner of the stolen payment card.

article thumbnail

A Day in the Life of a Prolific Voice Phishing Crew

Krebs on Security

Before we get to the Apple scam in detail, we need to revisit Tony’s case. Each participant in the call has a specific role, including: -The Caller: The person speaking and trying to social engineer the target. The Owner: The phishing panel owner, who will frequently listen in on and participate in scam calls.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Crazy Evil gang runs over 10 highly specialized social media scams

Security Affairs

The Russian-speaking Crazy Evil group runs over 10 social media scams, tricking victims into installing StealC, AMOS, and Angel Drainer malware. Security experts identified six Crazy Evil’s subteams, called AVLAND, TYPED, DELAND, ZOOMLAND, DEFI, and KEVLAND, which are running targeted scams for specific victim profiles.

article thumbnail

Romantic Lawsuit for Two? Don't Let Cybercriminals Scam You this Valentine's Day

SecureWorld News

And 2025 will be no different, as increasingly sophisticated online hackers seek to take advantage of Valentine's themed email traffic, social media advertisements, or marketing campaigns, and exploit heightened emotions and a desire to connect. Last year saw a 110% rise in cybercrime in the lead up to Valentine's Day.

article thumbnail

15 SpyLoan Android apps found on Google Play had over 8 million installs

Security Affairs

SpyLoan apps exploit social engineering to gain sensitive user data and excessive permissions, leading to extortion, harassment, and financial loss. Some of the malicious apps were promoted through deceptive advertising on social media. Similar scams were reported globally. ” concludes the report.

article thumbnail

March Madness Meets Cyber Mayhem: How Cybercriminals Are Playing Offense this Season

SecureWorld News

March Madness is here, and while fans are busy filling out brackets and making last-minute bets, cybercriminals are running their own full-court presstargeting unsuspecting fans with phishing scams, fake betting apps, and credential-harvesting schemes.

article thumbnail

AI-Driven Fraud and Impersonation: The New Face of Financial Crime

SecureWorld News

Introduction: A high-tech twist on age-old scams Impersonation fraud is not new, but the scale and believability of recent AI-driven schemes pose an unprecedented threat to financial organizations. In 2025, U.S. Figure 1: Projected U.S. What used to require Hollywood-level resources can now be done with off-the-shelf AI tools.