Remove Cybercrime Remove Media Remove Social Engineering
article thumbnail

EDR-as-a-Service makes the headlines in the cybercrime landscape

Security Affairs

This approach reflects the as-a-service logic already prevalent in other areas of the cybercrime sector, significantly reducing the level of technical knowledge needed by those wishing to access this confidential data.

article thumbnail

FBI: Spike in Hacked Police Emails, Fake Subpoenas

Krebs on Security

One English-speaking cybercriminal who goes by the nicknames “ Pwnstar ” and “ Pwnipotent ” has been selling fake EDR services on both Russian-language and English cybercrime forums. “This is social engineering at the highest level and there will be failed attempts at times. .

Hacking 316
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Phishers Target Aviation Execs to Scam Customers

Krebs on Security

An investigation into the attacker’s infrastructure points to a long-running Nigerian cybercrime ring that is actively targeting established companies in the transportation and aviation industries. However, BEC scams were the second most costly form of cybercrime reported to the feds last year, with nearly $2.8

Scams 235
article thumbnail

Feds Charge Five Men in ‘Scattered Spider’ Roundup

Krebs on Security

That Joeleoli moniker registered on the cybercrime forum OGusers in 2018 with the email address joelebruh@gmail.com , which also was used to register accounts at several websites for a Joel Evans from North Carolina. Click to enlarge. A Scattered Spider phishing lure sent to Twilio employees.

article thumbnail

Crazy Evil gang runs over 10 highly specialized social media scams

Security Affairs

The Russian-speaking Crazy Evil group runs over 10 social media scams, tricking victims into installing StealC, AMOS, and Angel Drainer malware. ” Crazy Evil is referred as a traffer team, which is a group of social engineering specialists tasked with redirecting legitimate traffic to malicious landing pages.

Scams 90
article thumbnail

Hackers Exploit Zoom's Remote Control Feature in Cryptocurrency Heists

SecureWorld News

A sophisticated cybercrime campaign, dubbed Elusive Comet , has been uncovered, in which North Korean threat actors are exploiting Zoom's remote control feature to infiltrate the systems of cryptocurrency professionals. Victims are sent unsolicited invitations to join Zoom calls, often via links in phishing emails or messages.

article thumbnail

Brazil Arrests ‘USDoD,’ Hacker in FBI Infragard Breach

Krebs on Security

USDoD was known to use the hacker handles “ Equation Corp ” and “ NetSec ,” and according to the cyber intelligence platform Intel 471 NetSec posted a thread on the now-defunct cybercrime community RaidForums on Feb. national infrastructure. .”