article thumbnail

RansomHub Responsible for Christie's Hack, Threatens Data Leak

SecureWorld News

They can then launch sophisticated spear-phishing attacks that use text, audio, and video against the victims or their families, friends, and associates," Raju said. Leaked data targeting wealthy individuals also frequently leads to follow-on crimes such as extortion attempts, identity theft, and physical threats.

article thumbnail

FIFA Football lovers should know the latest cyber scam

CyberSecurity Insiders

Such activities not only disrupt the football fever among fans, but can also lead to future identity theft troubles or phishing scams. Use of cryptocurrency such as Bitcoins might also block with a ban on a temporary note, or till the world cup reaches its semifinal or final stage. .

Scams 97
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

APT41 actors charged for attacks on more than 100 victims globally

Security Affairs

The attacks also aimed at carrying out other criminal activities, such as the deployment of ransomware and cryptocurrency malware. They have been also charged with identity theft, access device fraud, wire fraud, money laundering, and violations of the Computer Fraud and Abuse Act (CFAA). 35, and Tan Dailin (???),

article thumbnail

T-Mobile customers were hit with SIM swapping attacks

Security Affairs

Crooks conduct SIM swapping attacks to take control of victims’ phone numbers tricking the mobile operator employees into porting them to SIMs under the control of the fraudsters. Once hijacked a SIM, the attackers can steal money, cryptocurrencies and personal information, including contacts synced with online accounts.

Mobile 89
article thumbnail

85 Millions of voter records available for sale ahead of the 2018 US Midterm Elections

Security Affairs

” The availability of such kind of data exposes voters to sophisticated identity theft. “Thousands of Instagram followers, Facebook likes, YouTube views and Twitter retweets are available for a small amount of cryptocurrency on the dark web. Most of the records belong to New York, 15 million voters, and Florida, 12.5

article thumbnail

Australia Recorded the Highest Rate of iOS & Android App Threats

Appknox

More threats were detected on iOS than Android devices; 68% of Australian CISOs expect their organization to suffer a material cyber-attack within the next year. Mobile devices pave the way to launch ransomware attacks on Australian businesses of every scale and domain.

article thumbnail

Cybersecurity in 2022, Predictions for digital ecosystem facing more challenges and sophisticated threats

CyberSecurity Insiders

Also, that threat actors, especially state-sponsored, and criminal enterprises would take advantage of the expanding cyber-attack surface by using their resources to employ more sophisticated means for discovering target vulnerabilities, automating phishing, and finding new deceptive paths for infiltrating malware.