article thumbnail

Using Google Search to Find Software Can Be Risky

Krebs on Security

Google continues to struggle with cybercriminals running malicious ads on its search platform to trick people into downloading booby-trapped copies of popular free software applications. 252 do serve actual software downloads, but none of them are likely to be malicious if one visits the sites through direct navigation.

Software 325
article thumbnail

This Windows PowerShell Phish Has Scary Potential

Krebs on Security

Those who clicked the link for details were asked to distinguish themselves from bots by pressing a combination of keyboard keys that causes Microsoft Windows to download password-stealing malware. Executing this series of keypresses prompts the built-in Windows Powershell to download password-stealing malware.

Phishing 325
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Calendar Meeting Links Used to Spread Mac Malware

Krebs on Security

The file that Doug ran is a simple Apple Script (file extension “ scpt”) that downloads and executes a malicious trojan made to run on macOS systems. But Doug does still have a copy of the malicious script that was downloaded from clicking the meeting link (the online host serving that link is now offline).

Malware 332
article thumbnail

PayPal Phishing Scam Uses Invoices Sent Via PayPal

Krebs on Security

Recipients who call the supplied toll-free number to contest the transaction are soon asked to download software that lets the scammers assume remote control over their computer. com to download a remote administration tool. Very quickly into the conversation he suggested visiting a site called globalquicksupport[.]com

Scams 340
article thumbnail

Scam ‘Funeral Streaming’ Groups Thrive on Facebook

Krebs on Security

A typical set of logs for a compromised PC will include any usernames and passwords stored in any browser on the system, as well as a list of recent URLs visited and files downloaded. com show this user’s PC became infected immediately after they downloaded a booby-trapped mobile application development toolkit.

Scams 64
article thumbnail

Karma Catches Up to Global Phishing Service 16Shop

Krebs on Security

A search in Constella on 16Shop’s domain name shows that in mid-2022, a key administrator of the phishing service infected their Microsoft Windows desktop computer with the Redline information stealer trojan — apparently by downloading a cracked (and secretly backdoored) copy of Adobe Photoshop.

Phishing 242
article thumbnail

The Link Between AWM Proxy & the Glupteba Botnet

Krebs on Security

One of the most common ways PPI affiliates generate revenue is by secretly bundling the PPI network’s installer with pirated software titles that are widely available for download via the web or from file-sharing networks. An example of a cracked software download site distributing Glupteba. Image: Google.com.

Passwords 319