article thumbnail

Spam and phishing in 2022

SecureList

If the movie lover entered their bank card details on the fake site, they risked paying more than the displayed amount for content that did not exist and sharing their card details with the scammers. Soccer fans chasing merchandise risked compromising their bank cards or just losing some money.

Phishing 102
article thumbnail

Threats to ICS and industrial enterprises in 2022

SecureList

For instance, we see a new trend emerging in the criminal ecosystem of spyware-based authentication data theft, with each individual attack being directed at a very small number of targets (from single digits to several dozen). Cybercriminals will protect themselves better and hedge the risks. Current attack vectors.

Spyware 118
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hackers Target Oil Producers During COVID-19 Slump

Security Affairs

Real-Life Examples of Spear-Phishing Attacks in the Energy Production Sector. The threat of spear-phishing for energy companies is, unfortunately, not a theoretical one. Downloading them infected a user’s system with a type of trojan spyware not previously seen in other utilities industry cyberattacks.

article thumbnail

Advanced threat predictions for 2024

SecureList

APT targeting turns toward satellite technologies, producers and operators The only known case of an attack utilizing satellite technologies that happened in recent years was the KA-SAT network hack of 2022. This politician became the target of a previously undiscovered “zero-day” attack aimed at infecting his phone with spyware.

Hacking 119