Phishing Page 1

Hackers DNS Abuse Vanity Links Spoofing Brands Phishing Domain Names

Hackers abuse vanity links to spoof brands and victimise people

Many companies utilise vanity links mostly for their brands’ marketing purposes. However, researchers warned that threat actors had established ways to perform phishing attacks using this tool. Security experts explained that the issue regarding vanity links abuse begins when a cloud service would allow a vanity subdomain of a company but would not verify it...
Continue Reading
WHO Impersonation Phishing Campaign Nerbian RAT Malware Fraud Prevention Social Engineering

WHO impersonated in phishing campaign to spread the Nerbian RAT

Nerbian RAT, a new remote access trojan, has recently been found by experts possessing advanced capabilities such as bypassing security detection and being analysed by security researchers. Written in the Go programming language, the new trojan is a cross-platform 64-bit threat spread through a small-scale phishing campaign using macro-laced documents. The malware was discovered in...
Continue Reading
Cybersecurity Analysts Cybercriminal Sub Groups TA410 Hacker Gang JollyFrog FlowingFrog LookingFrog

Analysts found three cybercriminal sub-groups working for the TA410 gang

Recent research conducted by cybersecurity analysts revealed that the TA410 threat gang controls an operation containing three sub-groups. Although the groups are under the same umbrella, they have different tactics, techniques, and procedures for striking their victims. The three sub-groups working on the TA410 are JollyFrog, FlowingFrog, and LookingFrog. These three groups work separately but...
Continue Reading
Phishing Operator California Online Scam US DoD Fraud Prevention DNS Intelligence

A phishing operator from California scammed the US DoD with $23.5M

A California resident phishing operator named Sercan Oyuntur has been indicted by the US Department of Justice (DoJ) for its malicious campaigns causing the US Department of Defense (DoD) to lose over $23.5 million in damages. The money swindled from the US DoD was meant for funding a jet fuel supplier. However, the phishing operator...
Continue Reading
Verified Users Twitter Email Phishing Online Scam Fraud Prevention Social Media

Verified users on Twitter get targeted by email phishing scams

Verified user accounts on Twitter are warned about an ongoing phishing campaign which aims to steal account credentials. Those verified users on Twitter have a blue checkmark or badge beside their names, indicating their status as celebrities, politicians, and other figures representing their distinction. All verified users must submit a list of their information for...
Continue Reading
New Malware Exploits INITECH Process Lazarus Gang North Korean Hacker

New malware that exploits the INITECH Process is linked to Lazarus gang

Researchers link the North Korean-sponsored Lazarus group to a new malware that targeted over 40 institutions. The recent attacks in the first months of this year revealed further details regarding the malware attacking organisations by spoofing an executable of INISAFE CrossWeb EX version 3, a security program of INITECH. The threat actors input the malware...
Continue Reading
Global Phishing Attacks Records Phishing-as-a-Service Cyber Threat SMiShing

The global phishing attacks last year have broken previous records

Phishing attacks from last year have broken previous records from the past years. Experts claimed that the emergence of phishing-as-a-service methods and new attack vectors caused this massive upsurge of the attacks. Some researchers also think that the low barrier of entry contributed to the widespread of similar attacks. Threat actors take advantage of current...
Continue Reading
Emotet Malware Sophisticated Cyberattack Campaigns Trojan Phishing

Emotet malware returns to continue its sophisticated attack campaigns

After a year since its shutdown, the Emotet malware operation has resurfaced in the threat landscape to continue its attacks. Security analysts listed the malware as the top malicious tool deployed by its operators, which impacted about 10% of firms worldwide in March of this year. Moreover, the analysts have observed a rapid acceleration of...
Continue Reading
Hackers Steal Accounts Facebook Phishing Email Campaign Cybercrime Social Media

Hackers try to steal Facebook accounts via an ongoing phishing campaign

Facebook users and page admins are warned of an ongoing phishing attack where threat actors attempt to steal their account passwords. In the campaign, the attack operators send a phishing email to their victims, impersonating the Facebook team and informing the user about their accounts or pages being disabled due to violating some terms of...
Continue Reading
Surge Emotet Malware Cyberattacks Major Cyber threat Organisations

The surge of Emotet malware attacks poses a major threat to organisations

The highly elusive Emotet malware has deployed several attacks against numerous organisations. There have been few changes in the infection process method that the threat actors do in controlling the trojan, but the primary purpose is to steal information from targeted systems.   The Emotet malware distributes infected documents in their latest onslaught.   According...
Continue Reading
1 2 3 27