article thumbnail

Octo Tempest cybercriminal group is "a growing concern"—Microsoft

Malwarebytes

Octo Tempest is believed to be a group of native English speaking cybercriminals that uses social engineering campaigns to compromise organizations all over the world. This can be done in a number of ways, but the most common ones involve social engineering attacks on the victim's carrier.

article thumbnail

Investment fraud overtakes business email compromise as most reported fraud

Malwarebytes

Within those complaints, cryptocurrency investment fraud rose from $907 million in 2021 to $2.57 There are a number of different methods that cryptocurrency investment fraudsters deploy: Liquidity mining. The scammer contacts a real estate agent, usually offering to buy a very expensive property for cash or cryptocurrency.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SharkBot, a new Android Trojan targets banks in Europe

Security Affairs

The trojan allows to hijack users’ mobile devices and steal funds from online banking and cryptocurrency accounts. Once the banking Trojan is installed on the victim’s device, threat actors can steal sensitive banking information through the abuse of Accessibility Services (i.e. ” concludes the report.

Banking 124
article thumbnail

Cyber Attack news headlines trending on Google

CyberSecurity Insiders

The first news that is trending is associated with financial service provider PayPal. News is out that social security numbers of nearly 35,000 users were leaked in a cyber attack that could have emerged from a credential stuffing campaign launched by a state funded actor.

article thumbnail

Attackers Use Bots to Circumvent Some Two-Factor Authentication Systems

eSecurity Planet

“Over the past few months, we’ve seen actors provide access to services that call victims, appear as a legitimate call from a specific bank and deceive victims into typing an OTP or other verification code into a mobile phone in order to capture and deliver the codes to the operator,” the Intel 471 researchers wrote.

article thumbnail

Security Affairs newsletter Round 450 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

CISA and ENISA enhance their Cooperation CISA adds Qlik bugs to exploited vulnerabilities catalog Report: 2.6

article thumbnail

Research partnership to examine how fraudsters abuse financial tech innovations

SC Magazine

The research will cover such innovations of interest as P2P payments, mobile payments, digital wallets and central bank digital currencies – nationally sponsored cryptocurrencies that, unlike Bitcoin or Monero, would serve as a legitimate substitute for a country’s official currency.