Remove search
article thumbnail

Fake Lawsuit Threat Exposes Privnote Phishing Sites

Krebs on Security

The disclosure revealed a profitable network of phishing sites that behave and look like the real Privnote, except that any messages containing cryptocurrency addresses will be automatically altered to include a different payment address controlled by the scammers. co showing the site did indeed swap out any cryptocurrency addresses.

Phishing 216
article thumbnail

Microsoft Warns a New Group of Threat Actors Is After Cryptocurrency Companies

Heimadal Security

Microsoft cautions cryptocurrency investment companies that a new threat cluster is wandering on Telegram groups searching for potential victims. The post Microsoft Warns a New Group of Threat Actors Is After Cryptocurrency Companies appeared first on Heimdal Security Blog.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Calendar Meeting Links Used to Spread Mac Malware

Krebs on Security

Malicious hackers are targeting people in the cryptocurrency space in attacks that start with a link added to the target’s calendar at Calendly , a popular application for scheduling appointments and meetings. The attackers impersonate established cryptocurrency investors and ask to schedule a video conference call. capital).

Malware 269
article thumbnail

Malvertisers zoom in on cryptocurrencies and initial access

Malwarebytes

During the past month, we have observed an increase in the number of malicious ads on Google searches for “Zoom”, the popular piece of video conferencing software. In this blog post, we chose to highlight two cases: Case #1 is about a new loader which we have not seen mentioned publicly before called HiroshimaNukes.

article thumbnail

Malicious Download Links Impersonating Popular Software Pushed by Hackers Through Google Ads

Heimadal Security

Security researchers discovered that lately a lot of fake websites impersonating popular free and open-source software have started to pop up in the sponsored section on Google search results. Crypto Influencer Stripped of NFTs At least one well-known cryptocurrency user claims to have been […].

article thumbnail

Hackers Actively Exploit Critical Vulnerability Found in Atlassian Confluence

Heimadal Security

Following the public release of a Proof-of-Concept (PoC) exploit for a recently disclosed Atlassian Confluence Remote Code Execution (RCE) bug, cybercriminals are actively searching for and abusing it to install cryptocurrency mining malware.

article thumbnail

Microsoft warns of the rise of cryware targeting hot wallets

Security Affairs

Microsoft researchers warn of the rising threat of cryware targeting non-custodial cryptocurrency wallets, also known as hot wallets. Microsoft warns of the rise of cryware, malicious software used to steal info an dfunds from non-custodial cryptocurrency wallets, also known as hot wallets. Password and info stealers.