Remove Accountability Remove Scams Remove Telecommunications
article thumbnail

China-based SMS Phishing Triad Pivots to Banks

Krebs on Security

Thus, the missives bypass the mobile phone networks entirely and enjoy near 100 percent delivery rate (at least until Apple and Google suspend the spammy accounts). Phishers using multiple virtualized Android devices to orchestrate and distribute RCS-based scam campaigns. Image: Prodaft.

Phishing 230
article thumbnail

Thai police arrested Chinese hackers involved in SMS blaster attacks

Security Affairs

Thai authorities uncovered call center gangs using fake “02” numbers to deceive citizens into scams and fraudulent investments, generating over 700 million calls. Thai cyber police uncovered three companies using SIP Trunk technology to operate fake “02” numbers, generating 730 million scam calls.

Mobile 123
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

US Harbors Prolific Malicious Link Shortening Service

Krebs on Security

The top-level domain for the United States — US — is home to thousands of newly-registered domains tied to a malicious link shortening service that facilitates malware and phishing scams, new research suggests. The findings come close on the heels of a report that identified.US domains registered daily.US Department of Commerce.

Phishing 327
article thumbnail

Why You Should Opt Out of Sharing Data With Your Mobile Provider

Krebs on Security

Image: Shutterstock Telecommunications giant AT&T disclosed this month that a breach at a marketing vendor exposed certain account information for nine million customers. AT&T’s disclosure said the information exposed included customer first name, wireless account number, wireless phone number and email address.

Mobile 313
article thumbnail

Why is.US Being Used to Phish So Many of Us?

Krebs on Security

Domain names ending in “ US ” — the top-level domain for the United States — are among the most prevalent in phishing scams, new research shows. is overseen by the National Telecommunications and Information Administration (NTIA), an executive branch agency of the U.S. This is noteworthy because.US

Phishing 293
article thumbnail

Voice Phishers Targeting Corporate VPNs

Krebs on Security

According to interviews with several sources, this hybrid phishing gang has a remarkably high success rate, and operates primarily through paid requests or “bounties,” where customers seeking access to specific companies or accounts can hire them to target employees working remotely at home.

Phishing 363
article thumbnail

Flaw in Verizon call record requests put millions of Americans at risk

Malwarebytes

Security researcher Evan Connelly discovered an enormous flaw affecting one of the largest telecommunications companies in the world that could allow any single person to view the recent incoming call log for potentially any Verizon phone number. Tap Account, then Manage Plan. Follow the steps to disable Call Filter.

Risk 106