article thumbnail

Russian Reshipping Service ‘SWAT USA Drop’ Exposed

Krebs on Security

SWAT apparently kept its books in a publicly accessible Google Sheets document, and that document reveals Fearlless and his business partner each routinely made more than $100,000 every month operating their various reshipping businesses.

article thumbnail

Calendar Meeting Links Used to Spread Mac Malware

Krebs on Security

Unfortunately for us, Doug freaked out after deciding he’d been tricked — backing up his important documents, changing his passwords, and then reinstalling macOS on his computer. If you’re approached in a similar scheme, the response from the would-be victim documented in the SlowMist blog post is probably the best.

Malware 270
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

‘Spam Nation’ Villain Vrublevsky Charged With Fraud

Krebs on Security

But according to information obtained by KrebsOnSecurity, it is equally likely Vrublevsky was arrested thanks to his propensity for carefully documenting the links between Russia’s state security services and the cybercriminal underground. The latest document in the hacked archive is dated April 2021.

Banking 195
article thumbnail

Identity Thieves Bypassed Experian Security to View Credit Reports

Krebs on Security

Experian said I had three options for a free credit report at this point: Mail a request along with identity documents, call a phone number for Experian, or upload proof of identity via the website. Your mileage on this front may vary, and you may end up having to send copies of your identity documents through the mail or website.

article thumbnail

Mozilla Drops Onerep After CEO Admits to Running People-Search Networks

Krebs on Security

Those include voting registries, property filings, marriage certificates, motor vehicle records, criminal records, court documents, death records, professional licenses, and bankruptcy filings. states exempt so-called “public” or “government” records from consumer privacy laws.

Media 261
article thumbnail

Why Your VPN May Not Be As Secure As It Claims

Krebs on Security

In this well-documented tactic, known as a DHCP starvation attack , an attacker floods the DHCP server with requests that consume all available IP addresses that can be allocated. As an attacker, we can select which IP addresses go over the tunnel and which addresses go over the network interface talking to our DHCP server.”

VPN 264
article thumbnail

Teach a Man to Phish and He’s Set for Life

Krebs on Security

Like attaching a phishing email to a traditional, clean email message, or leveraging link redirects on LinkedIn , or abusing an encoding method that makes it easy to disguise booby-trapped Microsoft Windows files as relatively harmless documents.

Phishing 208