Remove Cybercrime Remove Scams Remove Social Engineering
article thumbnail

Phishers Target Aviation Execs to Scam Customers

Krebs on Security

An investigation into the attacker’s infrastructure points to a long-running Nigerian cybercrime ring that is actively targeting established companies in the transportation and aviation industries. However, BEC scams were the second most costly form of cybercrime reported to the feds last year, with nearly $2.8

article thumbnail

5 riskiest places to get scammed online

Malwarebytes

But, according to new research from Malwarebytes , while scammers can reach people through just about any modern method of communication, they have at least five favored tracts for finding new victims—emails, phone calls and voicemails, malicious websites, social media platforms, and text messages.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

US DoJ charges five alleged members of the Scattered Spider cybercrime gang

Security Affairs

Justice Department charged five suspects linked to the Scattered Spider cybercrime gang with wire fraud conspiracy. Justice Department charged five alleged members of the cybercrime gang Scattered Spider (also known as UNC3944 , 0ktapus ) with conspiracy to commit wire fraud. ” reads the press release published by DoJ.

article thumbnail

Happy 15th Anniversary, KrebsOnSecurity!

Krebs on Security

Maybe it’s indelicate to celebrate the birthday of a cybercrime blog that mostly publishes bad news, but happily many of 2024’s most engrossing security stories were about bad things happening to bad guys. Image: Shutterstock, Dreamansions. KrebsOnSecurity.com turns 15 years old today!

article thumbnail

A Day in the Life of a Prolific Voice Phishing Crew

Krebs on Security

Before we get to the Apple scam in detail, we need to revisit Tony’s case. ” Perm is the current administrator of Star Fraud , one of the more consequential cybercrime communities on Telegram and one that has emerged as a foundry of innovation in voice phishing attacks. The phishing domain used to steal roughly $4.7

article thumbnail

Crazy Evil gang runs over 10 highly specialized social media scams

Security Affairs

The Russian-speaking Crazy Evil group runs over 10 social media scams, tricking victims into installing StealC, AMOS, and Angel Drainer malware. Security experts identified six Crazy Evil’s subteams, called AVLAND, TYPED, DELAND, ZOOMLAND, DEFI, and KEVLAND, which are running targeted scams for specific victim profiles.

article thumbnail

How Google, Adidas, and more were breached in a Salesforce scam

Malwarebytes

The attacks underscore the vulnerability that all businesses face—large or small—in preventing cyberattacks that begin through basic social engineering scams. According to the outlet Bleepi n g Computer , the ShinyHunters cybercrime group is still stealing business data through this attack campaign. Train your staff.