article thumbnail

Mobile Malware Uses Deepfakes, Social Engineering to Bypass Biometric Authentication

SecureWorld News

The hackers rely heavily on social engineering tactics to distribute the malware. Android users were directed to fake app store pages to download infected apps. The malware has been active since 2023, specifically targeting victims in Vietnam and Thailand.

article thumbnail

The Rise of AI Social Engineering Scams

Identity IQ

The Rise of AI Social Engineering Scams IdentityIQ In today’s digital age, social engineering scams have become an increasingly prevalent threat. Social engineering scams leverage psychological manipulation to deceive individuals and exploit the victims’ trust.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Navy Insider Threat Bust: Encryption, Social Engineering, and Crypto

SecureWorld News

SecureWorld News just analyzed dozens of pages of court documents to understand this story of the Naval Engineer—an insider—who is accused of going rogue in a high-tech and high-stakes operation. Tools involved digital media, encrypted communication, cryptocurrency, and secret data handoffs. Government. But this took time.

article thumbnail

ZINC Hackers Leverage Open-source Software to Lure IT Pros

eSecurity Planet

PuTTY, KiTTY, TightVNC, Sumatra PDF Reader, and the muPDF/Subliminal Recording software installer have been backdoored to perform a wide range of social engineering campaigns that started in April 2022. Then they moved the conversation away from the platform to encrypted messaging apps like WhatsApp. Putty) and networking tools.

Software 126
article thumbnail

Xamalicious Android malware distributed through the Play Store

Security Affairs

Xamalicious relies on social engineering to gain accessibility privileges, then it connects to C2 to evaluate whether or not to download a second-stage payload. The authors also implemented different obfuscation techniques and custom encryption to avoid detection.

Malware 98
article thumbnail

Microsoft disables ms-appinstaller after malicious use

Malwarebytes

Typically, an app needs to be on a device before it can be installed, which normally means that a user has to download it first. To save time and disk space, Microsoft introduced the ability to install applications directly from a web server , without downloading it first. Social engineering. Stop malicious encryption.

article thumbnail

FBI warns of ransomware gang – What you need to know about the OnePercent group

CyberSecurity Insiders

This gang of cybercriminals targets individuals within an organization with social engineering tactics designed to fool them into opening a document from a ZIP file attached to an email. Ransomware is then downloaded and the breach is underway. How do hackers use social engineering? OnePercent Group attacks.