Remove Phishing Remove Retail Remove Web Fraud
article thumbnail

China-based SMS Phishing Triad Pivots to Banks

Krebs on Security

China-based purveyors of SMS phishing kits are enjoying remarkable success converting phished payment card data into mobile wallets from Apple and Google. On the left is the (test) data entered at the phishing site. On the left is the (test) data entered at the phishing site. Image: Ford Merrill. Image: SilentPush.

Banking 246
article thumbnail

SMS Phishers Harvested Phone Numbers, Shipment Data from UPS Tracking Tool

Krebs on Security

The United Parcel Service (UPS) says fraudsters have been harvesting phone numbers and other information from its online shipment tracking tool in Canada to send highly targeted SMS phishing (a.k.a. ” Pivoting on the domain in the smishing message sent to Dylan shows the phishing domain shared an Internet host in Russia [91.215.85-166]

Phishing 327
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Life Cycle of a Breached Database

Krebs on Security

TARGETED PHISHING. But the more insidious threat with hacked databases comes not from password re-use but from targeted phishing activity in the early days of a breach, when relatively few ne’er-do-wells have got their hands on a hot new hacked database. The targeted phishing message that went out to classicfootballshirts.co.uk

Passwords 363
article thumbnail

How Phished Data Turns into Apple & Google Wallets

Krebs on Security

But a flurry of innovation from cybercrime groups in China is breathing new life into the carding industry, by turning phished card data into mobile wallets that can be used online and at main street stores. An image from one Chinese phishing group’s Telegram channel shows various toll road phish kits available.

Phishing 300
article thumbnail

Busting SIM Swappers and SIM Swap Myths

Krebs on Security

In this case, the victim didn’t download malware or fall for some stupid phishing email. It’s not like the person who leaves a laptop in plain view in the car, and when the laptop gets stolen you say well someone just encouraged the thief in that case. ” Lt. But Detective Tuttle said Terpin’s example is an outlier.

Mobile 275
article thumbnail

Meet the World’s Biggest ‘Bulletproof’ Hoster

Krebs on Security

For at least the past decade, a computer crook variously known as “ Yalishanda ,” “ Downlow ” and “ Stas_vl ” has run one of the most popular “bulletproof” Web hosting services catering to a vast array of phishing sites, cybercrime forums and malware download servers.

article thumbnail

Infrastructure Laundering: Blending in with the Cloud

Krebs on Security

In October 2024, the security firm Silent Push published a lengthy analysis of how Amazon AWS and Microsoft Azure were providing services to Funnull, a two-year-old Chinese content delivery network that hosts a wide variety of fake trading apps, pig butchering scams , gambling websites, and retail phishing pages.