With the advancement of scamming technology, determining the authenticity of a site solely based on appearance has become exceedingly difficult. In the past, it was possible to identify fakes by …
Tag: SCAM
Summary: Law enforcement agencies from multiple countries have shut down 12 locations responsible for scam calls, arresting 21 individuals and seizing assets totaling €1 million ($1.08 million).
Threat Actor: Criminal …
Summary: This content discusses the prevalence of recovery fraud in the cryptocurrency space, where victims of crypto scams or cyberattacks are targeted again by individuals or companies claiming to offer …
Summary: Sixteen people are facing charges for their involvement in a grandparent scam that targeted elderly Americans and scammed them out of millions of dollars.
Threat Actor: Scammers involved in …
Summary: This blog post discusses a campaign that uses sponsored search results to target home users and redirect them to tech support scams.
Threat Actor: Malicious advertisers
Victim: Home users…
Summary: The content discusses the most active ransomware groups in Q1 2024, with a focus on LockBit and its setback due to law enforcement actions.
Threat Actor: LockBit | LockBit …
The 2024 U.S. tax season is well underway, and as usual, scams of all kinds targeting taxpayers and causing the Internal Revenue Service (IRS) problems have cropped up. One such …
Threat actors consistently alter and develop their schemes in order to further escalate their payoffs. In a new trend, ransomware affiliates are actively re-monetizing stolen data outside of their original …
Summary: Japanese police have created fake payment cards to protect elderly individuals who are targeted by tech support scams or unpaid money fraud.
Threat Actor: Tech support scammers and individuals …
Summary: Cybercriminals are using fake “verification” apps in online dating scams to steal information and money, according to the FBI. This scam is similar to romance scams and pig butchering …
Zscaler ThreatLabz researchers recently encountered a significant number of websites associated with fraudulent activities being hosted on popular web hosting and blogging platforms. Threat actors intentionally create these sites …
Summary: This article discusses a malicious ad campaign targeting Facebook users through Google search and explores the techniques used by threat actors to impersonate top brands and evade detection.
Threat …
Summary: This content highlights the concerns and impact of deepfake technology, particularly in relation to elections and the spread of misinformation and disinformation.
Threat Actor: AI-generated deepfake technology
Victim: General …
In the 1960s and ’70s, the US firearms market saw an influx of cheaply-made, imported handguns. Legislators targeted the proliferation of these inexpensive and frequently unreliable weapons, ostensibly because they were believed …
Summary: Scammers are using a sophisticated tactic to steal Toncoins from Telegram users by enticing them with promises of an “exclusive earning program” and directing them to join an unofficial …
Summary: The GRIT Q1 2024 Ransomware Report highlights shifts in activity from Ransomware-as-a-Service (RaaS) groups, an increase in the number of ransomware victims, and changes in the behavior of ransomware …
Infostealers are one of the most lucrative types of malware employed by criminals. And because this is a tried and tested approach, there are still new players entering this illegal …
Summary: Cybersecurity researchers have discovered almost 30 phishing websites that are impersonating the electronic toll collection service E-ZPass, following an FBI warning about smishing attacks targeting road toll collection services.…
AhnLab SEcurity intelligence Center (ASEC) has recently identified the distribution of phishing files identical to Korean portal website login screens. Cases impersonating multiple Korean portal websites, logistics and shipping brands, …
In early 2024, Group-IB’s Threat Intelligence team observed a surge in phishing URLs targeting INTERAC, a Canadian payment service. Subsequently, a client operating in Canada reported an uptick in phishing attempts against …
In late 2023, BlackBerry analysts identified a spear-phishing campaign by threat group FIN7 that targeted a large automotive manufacturer based in the United States. FIN7 identified employees at the …
Summary: The number of ransomware victims who choose to pay a ransom has dropped to a record low, with only 28% paying in the first quarter of 2024, down from …
Summary: Cheap ransomware is being sold on dark web forums, allowing inexperienced individuals to enter the world of cybercrime without the need for affiliates, posing a challenge for defenders.
Threat …
The Trellix Advanced Research Center has recently observed an uptick of LockBit-related cyber activity surrounding vulnerabilities in ScreenConnect. This surge suggests that despite the Law Enforcement’s (LE) “Operation Cronos” aimed …
Summary: The World Cybercrime Index reveals that Russia is the top hub for digital threat actors and the most significant source of global cybercrime, followed by Ukraine, China, the United …
Summary: The Federal Bureau of Investigation (FBI) has issued a warning about a wave of SMS phishing attacks targeting Americans with fake road toll fee messages, with thousands of people …
Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and Cyber Analysts who hunt, investigate, contain and respond to threats …
Anyone who has had to deal with HTML emails on a technical level has probably reached the point where they wanted to quit their job or just set fire to …
Podcasts provide an easy and effective way to stay up to date on the threat intelligence landscape. They cover a wide range of topics, including insights into the most recent …
A hacker has confessed to orchestrating his own death to evade over $100,000 in child support payments to his ex-wife. Jesse …
10/04/2024
Today a phishing campaign aimed at misappropriating credentials for access to Certified Email (PEC) mailboxes has emerged. This fraudulent operation is carried out through the sending of a deceptive …
Check out our on-demand Annual Report webinar or read on for a summary of key topics and themes in the report.
2023 was a year in which cybercrime evolved in …
Summary: The U.S. Department of Health and Human Services (HHS) has warned that hackers are using social engineering tactics to target IT help desks in the Healthcare and Public Health …
Online investment scams these days are no longer an issue limited to specific nations, now becoming a social issue prevalent around the globe. Scammers (criminals) deceive their victims through illegal …
Summary: Google is suing two China-based Android app developers for allegedly scamming 100,000 users worldwide through fake cryptocurrency and investment apps, with victims losing up to $75,000.
Threat Actor: China-based …
Summary: Hackers are using Facebook advertisements and hijacked pages to promote fake Artificial Intelligence services, such as MidJourney, OpenAI’s SORA and ChatGPT-5, and DALL-E, to infect unsuspecting users with password-stealing …
Summary: This article discusses the escalating threat of a fake e-shop campaign that targets banking security across various regions. The campaign has expanded from targeting Malaysian banks to financial institutions …
The impact that AI has on society has steadily crept into the darkest nooks and crannies of the internet. So much so that cybercrooks are hitching free rides on the …
Threat Actor: Sanggiero and IntelBoker Victim: PandaBuy
Information: 🌟 Data belonging to more than 1.3 million customers of the PandaBuy online shopping platform has been leaked. 🌟 Two threat actors …
____________________ Losses linked to impersonation scams top $1 billion yearly, FTC says Key Point : * Impersonation scams reported to the Federal Trade Commission cost victims about $1.1 billion in …
____________________ India says it has rescued 250 citizens from Cambodian cyber slavery
Key Point : * Indian government rescued 250 citizens from Cambodia * Citizens were forced to carry out …
____________________ Summary: A PhaaS campaign called “Darcula” has been targeting organizations in over 100 countries using more than 20,000 fake domains. The campaign utilizes unique tools and platforms to carry …
Summary : UnitedHealth Group has admitted that patient data was taken in a mega attack, leading to a significant breach of sensitive personal, financial, and health information.
Key Point : …
____________________ Summary: Apple users are being targeted by a campaign that bombards them with phony password reset requests, leading to potential security risks.
Key Point 🚨 – Users are flooded …
Chinese-language Phishing-as-a-Service platform ‘darcula’ targets organizations in 100+ countries with sophisticated techniques using more than 20,000 phishing domains
‘darcula’ [sic] is a new, sophisticated Phishing-as-a-Service (PhaaS) platform used on more …
____________________ Summary: The ‘Darcula’ phishing-as-a-service operation is a sophisticated and pervasive scam targeting consumers worldwide.
Key Point 🦇: – Darcula has created 19,000 phishing domains in cyberattacks against over 100 …