Remove Cryptocurrency Remove Energy and Utilities Remove Social Engineering
article thumbnail

A massive phishing campaign using QR codes targets the energy sector

Security Affairs

A phishing campaign employing QR codes targeted a leading energy company in the US, cybersecurity firm Cofense reported. “Beginning in May 2023, Cofense has observed a large phishing campaign utilizing QR codes targeting the Microsoft credentials of users from a wide array of industries.” ” continues the report.

article thumbnail

Zanubis in motion: Tracing the active evolution of the Android banking malware

SecureList

The threat actors behind Zanubis continue to refine its code adding features, switching between encryption algorithms, shifting targets, and tweaking social engineering techniques to accelerate infection rates. Join us in this blogpost as we take a closer look at the malware’s evolution over time.

Banking 105
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IT threat evolution Q3 2024

SecureList

The malware utilizes cloud resources for its C2 (command and control) servers, which it accesses via APIs using authentication tokens. Interestingly, Twelve shares infrastructure, utilities and TTPs (Tactics, Techniques and Procedures) with the DARKSTAR ransomware group (formerly known as Shadow or COMET).

article thumbnail

The Scammers’ Playbook: How Cybercriminals Get Ahold of Your Data

eSecurity Planet

As a matter of fact, the most-reported crime in the 2021 Internet Crime Report report was phishing , a social engineering scam wherein the victim receives a deceptive message from someone in an attempt to get the victim to reveal personal information or account credentials or to trick them into downloading malware. Social Tactics.

article thumbnail

Cybersecurity threats: what awaits us in 2023?

SecureList

The economic downturn (caused by energy prices, inflation, sanctions, etc.) In 2023, we might see a slight decline in ransomware attacks, reflecting the slowdown of the cryptocurrency markets. We can therefore expect that cybercrime groups from either block will feel safe to attack companies from the opposing side.

article thumbnail

Advanced threat predictions for 2025

SecureList

This is particularly notable in the case of Lazarus APT, specifically its attacks against cryptocurrency investors in May. In general, we’ve observed hacktivists in the Russo-Ukrainian conflict become more skilled and more focused on attacking large organizations such as government, manufacturing and energy entities.

IoT 117
article thumbnail

Advanced threat predictions for 2024

SecureList

APT targeting turns toward satellite technologies, producers and operators The only known case of an attack utilizing satellite technologies that happened in recent years was the KA-SAT network hack of 2022. They advertise on dark web platforms and employ various techniques, including malware, phishing, and other social engineering methods.

Hacking 140