Summary: The content discusses how the four major banks in Australia are constantly under attack from threat actors, with the aim of stealing sensitive information and money from customers.
Threat …
Summary: The content discusses how the four major banks in Australia are constantly under attack from threat actors, with the aim of stealing sensitive information and money from customers.
Threat …
Summary: Operation First Light 2024, orchestrated by Interpol, resulted in the arrest of thousands of suspects involved in online scams, the freezing of bank accounts, and the seizure of assets …
Summary: The FBI is warning of cybercriminals posing as law firms and lawyers that offer cryptocurrency recovery services to victims of investment scams and steal funds and personal information.
Threat …
Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and Cyber Analysts who hunt, investigate, contain and respond to threats …
Summary: This article discusses a new phishing campaign, dubbed PHANTOM#SPIKE, that targets people in Pakistan using a custom backdoor. The campaign uses military-related phishing documents to activate the infection sequence.…
Date Reported: 2024-06-20 Country: FRA | France Victim: La Scam | scam.fr Additional Information :
La Scam, a French collective rights management organization, has fallen victim to a ransomware cyberattack…Summary: This content discusses the recent series of attacks surrounding the Trump campaign, particularly focusing on donation scams impersonating the campaign and the use of malicious domains in phishing and …
Two men have been extradited from Malaysia to face charges in Singapore for their suspected involvement in a series of malware-enabled scams that have targeted Singaporeans since June 2023.
Two …
Summary: This article discusses the use of dozens of servers to distribute malicious Android apps by a cybercrime group in Asia, resulting in a $25 million fraud scheme.
Threat Actor: …
Summary: A Nigerian national has been convicted of participating in a $1.5 million business email compromise (BEC) scam, using social engineering and malicious software to deceive businesses into sending money …
Summary: Using conversational AI to respond to spam messages and engage with cybercriminals can provide valuable threat intelligence and extract details about their infrastructure.
Threat Actor: Cybercriminals
Victim: Financial institutions …
This blog is part of my Tracking Adversaries blog series, whereby I perform a summary analysis of a particular adversary that has caught my attention and made me feel like …
Resecurity has identified a new activity of Smishing Triad, which has expanded its operations to Pakistan. The group’s latest tactic involves sending malicious messages on behalf of Pakistan Post …
What happened
Proofpoint recently identified a fraudulent website purporting to sell tickets to the Paris 2024 Summer Olympic Games. The website “paris24tickets[.]com” claimed to be a “secondary marketplace for sports and live events …
Summary: Criminals are impersonating employees of the Cybersecurity and Infrastructure Security Agency (CISA) in phone calls to deceive potential victims into transferring money, part of a broader trend of fraudsters …
Summary: Chinese crime syndicates have shifted their operations from illicit gambling houses to online cybercrime fraud, targeting vulnerable victims worldwide through romance scams and other long-con cyber fraud.
Threat Actor: …
Summary: British police have arrested two individuals involved in an SMS-based phishing campaign using a homemade device that bypassed network operators’ anti-SMS-based phishing defenses.
Threat Actor: Unknown | SMS-based phishing …
Summary: The content discusses the seizure of 70 domains connected to a pig butchering scam that targeted members of the Russian diaspora through fraudulent cryptocurrency investments.
Threat Actor: Unknown | …
Summary: This article discusses a cyber fraud case in Zambia, where 22 Chinese nationals have pleaded guilty to cyber-related crimes as part of an organized internet fraud syndicate.
Threat Actor: …
Summary: A Romanian citizen named Vlad Terebes has been charged with identity theft and bank fraud for conducting card skimming at several large retail stores in Puerto Rico.
Threat Actor: …
AhnLab SEcurity intelligence Center (ASEC) has been publishing the Online Scams series to inform the readers about the ever-evolving scams. Prevention and blocking are the two most important measures to …
Back in February, we reported on malicious ads related to utility bills (electricity, gas) that direct victims to call centers where scammers will collect their identity and try to extort …
Summary: This content discusses the CarnavalHeist banking Trojan, which targets users in Brazil and is capable of stealing banking credentials and performing other malicious actions.
Threat Actor: CarnavalHeist | CarnavalHeist …
Summary: The content warns about scammers offering fake work-from-home jobs and using cryptocurrency payments as part of the scam.
Threat Actor: Scammers posing as legitimate businesses, such as staffing or …
Summary: Two former executives of Epsilon Data Management LLC were convicted of selling data of millions of Americans to perpetrators of mail fraud schemes.
Threat Actor: Robert Reger and David …
Summary: This content discusses a campaign involving malicious ads related to utility bills that direct victims to call centers where scammers collect their identity and attempt to extort money from …
Summary: This article discusses a WhatsApp scam where the author receives a message from an unknown sender claiming to have added a financial account and provides login details.
Threat Actor: …
Summary: Cybersecurity researchers have discovered a surge in malware and phishing attacks on the popular communication platform Discord, with over 50,000 malicious links identified in the last six months.
Threat …
What happened
Proofpoint recently identified a cluster of activity conducting malicious email campaigns using piano-themed messages to lure people into advance fee fraud (AFF) scams. The campaigns have occurred since …
During the Hajj season, there is an increased risk of online scams targeting individuals who are planning to make the pilgrimage to Mecca. Fraudsters employ various tactics to deceive …
Summary: This content discusses criminal campaigns that exploit cloud storage services to redirect users to malicious websites and steal their information using SMS messages.
Threat Actor: Unnamed threat actors | …
Summary: A Morocco-based cybercriminal group known as Atlas Lion or Storm-0539 is targeting large retailers to fraudulently issue gift card codes to themselves, allowing them to generate their own money.…
Summary: Bolster, an AI startup, has raised $14 million in funding to expand its work in tackling malicious emails containing deceptive links through its phish-checking portal called CheckPhish and its …
Netskope Threat Labs is tracking multiple phishing campaigns that abuse Cloudflare Workers. The campaigns are likely the work of different attackers since they use two very different techniques. One …
No one is safe from scams. In fact, scams targeting corporations and organizations employ meticulously social-engineered attack scenarios. Unlike smishing targeting individuals or online shopping scams, such attacks design tailored …
Summary: This content highlights the misuse of the client management tool Quick Assist by the threat actor Storm-1811 in social engineering attacks, targeting users for financial gain.
Threat Actor: Storm-1811 …
Threat Actor: GhostSec | GhostSec Victim: N/A Price: N/A Exfiltrated Data Type: N/A
Additional Information:
GhostSec has transitioned from money-making activities to hacktivism. The group has decided to cease providing…Summary: The Avast Q1/2023 Threat Report highlights the increase in social engineering scams and the evolving tactics used by cybercriminals to exploit deepfakes, YouTube, malvertising, and phishing.
Threat Actor: Cybercriminals …
Research by: Antonis Terefos
IntroductionPDF (Portable Document Format) files have become an integral part of modern digital communication. Renowned for their universality and fidelity, PDFs offer a robust platform …
Summary: A cybercriminal named “salfetka” is claiming to sell the source code of INC Ransom, a ransomware-as-a-service operation that has targeted various organizations including Xerox Business Solutions, Yamaha Motor Philippines, …
Summary: Online fraud operations in Southeast Asia are growing rapidly, with organized scamming syndicates stealing an estimated $64 billion each year worldwide.
Threat Actor: Organized scamming syndicates
Victim: Potential victims …
Summary: The Federal Communications Commission (FCC) has identified a threat actor named ‘Royal Tiger’ who is responsible for conducting robocall campaigns impersonating government agencies, banks, and utility companies.
Threat Actor: …
Summary: This content discusses a phone scam where cybercriminals pose as the PayPal security team and trick victims into giving them access to their online accounts.
Threat Actor: Cybercriminals | …
Summary: This article discusses the emergence of new sophisticated attack techniques in the cybercrime ecosystem and the need for defenders to stay updated on these developments.
Threat Actor: Cybercriminals
Victim: …
AhnLab’s Mobile Analysis Team has confirmed cases of romance scams where perpetrators establish rapport by posing as overseas friends or romantic partners. They exploit this connection to solicit money under …
Summary: The number of ransomware payments is decreasing, despite the rising number of victims, due to increased cyber resilience, availability of decryptors, and law enforcement actions.
Threat Actor: Ransomware gangs …
Summary: This article discusses the activities of the Yahoo Boys, a group of young men in West Africa who are prolific scammers and engage in various types of fraud.
Threat …
With the advancement of scamming technology, determining the authenticity of a site solely based on appearance has become exceedingly difficult. In the past, it was possible to identify fakes by …