Remove Scams Remove Social Engineering Remove Web Fraud
article thumbnail

How to Lose a Fortune with Just One Bad Click

Krebs on Security

More importantly, Tony recognized the voice of “Daniel from Google” when it was featured in an interview by Junseth , a podcaster who covers cryptocurrency scams. “No one gets arrested,” Daniel enthused to Junseth in the May 7 podcast, which quickly went viral on social media.

article thumbnail

A Day in the Life of a Prolific Voice Phishing Crew

Krebs on Security

Before we get to the Apple scam in detail, we need to revisit Tony’s case. Each participant in the call has a specific role, including: -The Caller: The person speaking and trying to social engineer the target. The Owner: The phishing panel owner, who will frequently listen in on and participate in scam calls.

Phishing 338
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GoDaddy Employees Used in Attacks on Multiple Cryptocurrency Services

Krebs on Security

The attacks were facilitated by scams targeting employees at GoDaddy , the world’s largest domain name registrar, KrebsOnSecurity has learned. In March, a voice phishing scam targeting GoDaddy support employees allowed attackers to assume control over at least a half-dozen domain names, including transaction brokering site escrow.com.

article thumbnail

When Low-Tech Hacks Cause High-Impact Breaches

Krebs on Security

GoDaddy described the incident at the time in general terms as a social engineering attack, but one of its customers affected by that March 2020 breach actually spoke to one of the hackers involved. One multifactor option — physical security keys — appears to be immune to these advanced scams.

Hacking 333
article thumbnail

How Do You Fight a $12B Fraud Problem? One Scammer at a Time

Krebs on Security

The fraudsters behind the often laughable Nigerian prince email scams have long since branched out into far more serious and lucrative forms of fraud, including account takeovers, phishing, dating scams, and malware deployment. The FBI says BEC scams netted thieves more than $12 billion between 2013 and 2018.

Scams 245
article thumbnail

Fla. Man Charged in SIM-Swapping Spree is Key Suspect in Hacker Groups Oktapus, Scattered Spider

Krebs on Security

2022 that an intrusion had exposed a “limited number” of Twilio customer accounts through a sophisticated social engineering attack designed to steal employee credentials. Sosa also was active in a particularly destructive group of accomplished criminal SIM-swappers known as “ Star Fraud.”

article thumbnail

How Cybercriminals are Weathering COVID-19

Krebs on Security

Most online retailers years ago stopped shipping to regions of the world most frequently associated with credit card fraud, including Eastern Europe, North Africa, and Russia. For example, reshipping scams have over the years become easier for both reshipping mule operators and the mules themselves.