article thumbnail

Spam and phishing in 2022

SecureList

In a typical internet hoax manner, crypto scam sites offered visitors to get rich quick by paying a small fee. In reality, the scheme worked the way any other internet hoax would: the self-professed altruists went off the radar once they received the deposit. Payout notices could arrive by mail, email, or as a text message.

article thumbnail

Threats to ICS and industrial enterprises in 2022

SecureList

For instance, we see a new trend emerging in the criminal ecosystem of spyware-based authentication data theft, with each individual attack being directed at a very small number of targets (from single digits to several dozen). Known vulnerabilities in internet-facing hardware are also sure to remain a popular penetration vector.

Spyware 110