Remove 2013 Remove Scams Remove Social Engineering
article thumbnail

How to spot the signs of a virtual kidnap scam

Malwarebytes

In 2013, we had pretend hitmen threatening murder unless victims paid $25,000 to survive their non-existent wrath. Kidnap scams involve making a phone call to a victim and telling them a loved one has been taken. Things become even worse when social engineering combines with publicly available data to make it even more convincing.

Scams 130
article thumbnail

How Do You Fight a $12B Fraud Problem? One Scammer at a Time

Krebs on Security

The fraudsters behind the often laughable Nigerian prince email scams have long since branched out into far more serious and lucrative forms of fraud, including account takeovers, phishing, dating scams, and malware deployment. The FBI says BEC scams netted thieves more than $12 billion between 2013 and 2018.

Scams 228
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SHARED INTEL: How ransomware evolved from consumer trickery to deep enterprise hacks

The Last Watchdog

The epidemic went truly mainstream with the release of CryptoLocker back in 2013, and it has since transformed into a major dark web economy spawning the likes of Sodinokibi, Ryuk, and Maze lineages that are targeting the enterprise on a huge scale in 2020. FBI spoofs 2012 – 2013. File encryption 2013 – 2015.

article thumbnail

Top 5 Attack Vectors to Look Out For in 2022

Security Affairs

Phishing techniques use social engineering to trick victims into taking an action that helps an attacker compromise your network or access your sensitive information assets. Some threat actors carry out phishing attacks using social media and networking platforms, such as Twitter or LinkedIn. Stolen Credentials.

IoT 138
article thumbnail

BEC scammers go after more than just money

Malwarebytes

Malwarebytes' own glossary entry for BEC says: “A business email compromise (BEC) is an attack wherein an employee, who is usually the CFO or someone from the Finance department, is socially engineered into wiring a large sum of money to a third-party account.". In May 2022 we discussed some numbers published by the FBI.

article thumbnail

MY TAKE: COVID-19’s silver lining could turn out to be more rapid, wide adoption of cyber hygiene

The Last Watchdog

organizations between January 2013 and July 2019. In a typical BEC scam , an imposter carries out a con to persuade a subordinate employee to wire funds directly into a bank account controlled by the fraudsters. And yet, it remains true today that most folks do not take that responsibility seriously enough. million from U.S.

article thumbnail

The Origins and History of the Dark Web

Identity IQ

From 2011 to 2013, the Silk Road hosted 1.2 2013: The End of the Silk Road Authorities were able to trace the pseudonym back to Ulbricht thanks to the efforts of an IRS investigator who was working with the DEA on the Silk Road case in mid-2013. The FBI shut down the Silk Road in October 2013. billion in value.