article thumbnail

Booking.com Phishers May Leave You With Reservations

Krebs on Security

Booking.com said it now requires 2FA , which forces partners to provide a one-time passcode from a mobile authentication app (Pulse) in addition to a username and password. .” The phony booking.com website generated by visiting the link in the text message. SecureWorks said these attacks had been going on since at least March 2023.

Phishing 273
article thumbnail

A Day in the Life of a Prolific Voice Phishing Crew

Krebs on Security

Lookout researchers discovered multiple voice phishing groups were using a new phishing kit that closely mimicked the single sign-on pages for Okta and other authentication providers. Federal Communications Commission (FCC), as well as those working at the cryptocurrency exchanges Coinbase and Binance. “ Annie.”

Phishing 336
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Chinese Innovations Spawn Wave of Toll Phishing Via SMS

Krebs on Security

Those who fall for the scam are asked to provide payment card data, and eventually will be asked to supply a one-time password sent via SMS or a mobile authentication app. Reports of similar SMS phishing attacks against customers of other U.S. state-run toll facilities surfaced around the same time as the MassDOT alert.

Phishing 300
article thumbnail

FBI: Spike in Hacked Police Emails, Fake Subpoenas

Krebs on Security

.” Echoing the FBI’s warning, Donahue said far too many police departments in the United States and other countries have poor account security hygiene, and often do not enforce basic account security precautions — such as requiring phishing-resistant multifactor authentication.

Hacking 291
article thumbnail

Crime Shop Sells Hacked Logins to Other Crime Shops

Krebs on Security

One example is Genesis Market , where customers can search for stolen credentials and authentication cookies from a broad range of popular online destinations. What’s more, relatively few cybercrime shops online offer their users any sort of multi-factor authentication.

Hacking 349
article thumbnail

Crooks Bypassed Google’s Email Verification to Create Workspace Accounts, Access 3rd-Party Services

Krebs on Security

Google says it recently fixed an authentication weakness that allowed crooks to circumvent the email verification required to create a Google Workspace account, and leverage that to impersonate a domain holder at third-party services that allow logins through Google’s “Sign in with Google” feature.

article thumbnail

Recycle Your Phone, Sure, But Maybe Not Your Number

Krebs on Security

The Princeton team further found 100 of those 259 numbers were linked to leaked login credentials on the web, which could enable account hijackings that defeat SMS-based multi-factor authentication. While you’re at it, consider removing your phone number as a primary or secondary authentication mechanism wherever possible.

Mobile 360