Remove Cryptocurrency Remove Manufacturing Remove Social Engineering
article thumbnail

Zanubis in motion: Tracing the active evolution of the Android banking malware

SecureList

The threat actors behind Zanubis continue to refine its code adding features, switching between encryption algorithms, shifting targets, and tweaking social engineering techniques to accelerate infection rates. The once-broad range of targets, including cryptocurrency wallets, has been abandoned.

article thumbnail

IT threat evolution Q3 2024

SecureList

As is the case with most hacktivist groups, Head Mare maintains a public account on the X social network, which it uses to post information about some of its victims. Head Mare post on X Head Mare has targeted a variety of industries, including government, energy, transportation, manufacturing and entertainment.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top Cyber Attacker Techniques, August–October 2024

Digital Shadows

The US, manufacturing sector, and professional, scientific, and technical services (PSTS) sector are primary targets amidst an overall increase in ransomware attacks. This underscores the importance of having additional compensating controls and educating employees on the risks associated with phishing and other social engineering attacks.

article thumbnail

Nastiest Malware 2024

Webroot

The rise of AI-driven phishing and social engineering, increased targeting of critical infrastructure, and the emergence of more sophisticated fileless malware are all trends that have shaped the cybersecurity battlefield this year. By August 2024, RansomHub had breached at least 210 victims across various critical U.S.

article thumbnail

Octo Tempest cybercriminal group is "a growing concern"—Microsoft

Malwarebytes

Octo Tempest is believed to be a group of native English speaking cybercriminals that uses social engineering campaigns to compromise organizations all over the world. This can be done in a number of ways, but the most common ones involve social engineering attacks on the victim's carrier.

article thumbnail

North Korea dedicates a hacking group to fund cyber crime

CyberSecurity Insiders

According to a study conducted by se-curity firm Mandiant, the group has been in operation since 2018 and has now been tasked with carrying out both espionage and financially motivated attacks such as credential harvesting and social engineering.

article thumbnail

The Scammers’ Playbook: How Cybercriminals Get Ahold of Your Data

eSecurity Planet

As a matter of fact, the most-reported crime in the 2021 Internet Crime Report report was phishing , a social engineering scam wherein the victim receives a deceptive message from someone in an attempt to get the victim to reveal personal information or account credentials or to trick them into downloading malware. Social Tactics.