article thumbnail

Interpol arrests 2000 criminals launching social engineering attacks

CyberSecurity Insiders

In what appears as an operation first of its kind, Interpol has arrested over 2000 criminals who launched social engineering attacks worldwide. But in reality, they pose as others and perform acts in such a way that the victim reveals sensitive info, such as bank account details or e-wallet information disclosure.

article thumbnail

New ZLoader malware campaign hit more than 2000 victims across 111 countries

Security Affairs

The malware campaign is still active and threat actors have already stolen data and credentials of more than 2000 victims across 111 countries as of 2 Jan 2022. The post New ZLoader malware campaign hit more than 2000 victims across 111 countries appeared first on Security Affairs. Pierluigi Paganini.

Malware 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

E-Crime Rapper ‘Punchmade Dev’ Debuts Card Shop

Krebs on Security

Images from Punchmade Dev’s Twitter/X account show him displaying bags of cash and wearing a functional diamond-crusted payment card skimmer. The official Punchmadedev account on Instagram links to many of the aforementioned rap videos and tutorials on cybercriming, as well as to Punchmadedev’s other profiles and websites.

article thumbnail

The Cyentia Library Relaunches

Adam Shostack

There’s no ‘feature abuse’ or ‘account takeover.’ When I comment that “how attackers get access” is underserved, what I mean is that its insufficiently well addressed in 2000 reports to have emerged or been noticed by the NLP and manual analyses.

article thumbnail

It Might Be Our Data, But It’s Not Our Breach

Krebs on Security

For starters, email addresses ending in “ att.net ” accounted for 13.7 In contrast, Gmail users made up more than 30 percent of the data set, with Yahoo addresses accounting for 24 percent. Hold Security found these email domains account for 87% of all domains in the data set.

Mobile 54
article thumbnail

The Cyentia Library Relaunches

Adam Shostack

There's no 'feature abuse' or 'account takeover.' When I comment that "how attackers get access" is underserved, what I mean is that its insufficiently well addressed in 2000 reports to have emerged or been noticed by the NLP and manual analyses. My longstanding interest in how attackers get access is underserved.

article thumbnail

Breaking the Cycle: Embracing Change in Cybersecurity Practices

Security Boulevard

While checking my cybersecurity news feed a couple of days ago, an account (re-)publishing stories from years gone by was highlighting a late 2000 (actual year 2000, not the decade) event involving Microsoft and a hack that affected the company.