article thumbnail

FBI: Spike in Hacked Police Emails, Fake Subpoenas

Krebs on Security

The trouble is, these EDRs largely bypass any official review and do not require the requester to supply any court-approved documents. Others simply sell access to hacked government or police email accounts, and leave it up to the buyer to forge any needed documents. “Unlimited Emergency Data Requests. . Reset as you please.

Hacking 294
article thumbnail

How to Lose a Fortune with Just One Bad Click

Krebs on Security

But when the thieves tried to move $100,000 worth of cryptocurrency out of his account, Coinbase sent an email stating that the account had been locked, and that he would have to submit additional verification documents before he could do anything with it.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Cryptocurrency Turns to Cash in Russian Banks

Krebs on Security

This address was the subject of an investigation published in July by CTV National News and the Investigative Journalism Foundation (IJF) , which documented dozens of cases across Canada where multiple MSBs are incorporated at the same address, often without the knowledge or consent of the location’s actual occupant. in Vancouver, BC.

article thumbnail

Pakistani Firm Shipped Fentanyl Analogs, Scams to US

Krebs on Security

” Riley’s well-documented lawsuit (not linked here because it features a great deal of personal information) includes screenshots of conversations with the ghostwriting team, which was constantly assigning her to new writers and editors, and ghosting her on scheduled conference calls about progress on the project.

Scams 270
article thumbnail

Arrest, Raids Tied to ‘U-Admin’ Phishing Kit

Krebs on Security

2020 blog post on an ongoing Qakbot campaign that was first documented three months earlier by Check Point Research. That vulnerability was documented in more detail at exploit archive Packet Storm Security in March 2020 and indexed by Check Point Software in May 2020, suggesting it still persists in current versions of the product.

Phishing 341
article thumbnail

GoDaddy Employees Used in Attacks on Multiple Cryptocurrency Services

Krebs on Security

In due course, the malicious actor was able to partially compromise our infrastructure, and gain access to document storage.” If you receive a vishing call, document the phone number of the caller as well as the domain that the actor tried to send you to and relay this information to law enforcement.

article thumbnail

How Phishers Are Slinking Their Links Into LinkedIn

Krebs on Security

31 that uses Linkedin.com links to redirect anyone who clicks to a site that spoofs Adobe , and then prompts users to log in to their Microsoft email account to view a shared document. Here’s one example from Jan. A recent phishing site that abused LinkedIn’s marketing redirect. Image: Urlscan.io.

Phishing 359