Remove Cryptocurrency Remove Data collection Remove Phishing
article thumbnail

LLMs and Phishing

Schneier on Security

Here’s an experiment being run by undergraduate computer science students everywhere: Ask ChatGPT to generate phishing emails, and test whether these are better at persuading victims to respond or click on the link than the usual spam. The impersonations in such scams are no longer just princes offering their country’s riches.

Phishing 340
article thumbnail

Happy 13th Birthday, KrebsOnSecurity!

Krebs on Security

You just knew 2022 was going to be The Year of Crypto Grift when two of the world’s most popular antivirus makers — Norton and Avira — kicked things off by installing cryptocurrency mining programs on customer computers. A single bitcoin is trading at around $45,000.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IT threat evolution Q3 2024

SecureList

CloudSorcerer is a sophisticated cyber-espionage tool used for stealth monitoring, data collection and exfiltration via Microsoft, Yandex and Dropbox cloud infrastructures. The campaign, which we dubbed EastWind , used phishing emails with malicious shortcuts attached to deliver malware to target computers.

article thumbnail

Privacy Roundup: Week 12 of Year 2025

Security Boulevard

Android Apps Use Bluetooth and WiFi Scanning to Track Users Without GPS Cyber Insider Researchers found that 86% of apps they analyzed collect sensitive data, including location data stemming from scanning Wi-Fi network details, and collecting device identifiers.

article thumbnail

Group-IB presented latest cybercrime and nation-state hacking trends in Asia

Security Affairs

To infiltrate critical infrastructure networks hackers will continue to use phishing as one of their main tools, but the focus of attacks might shift to vulnerable network equipment connecting the network to the Internet. In 2017-2018 hackers’ interest in cryptocurrency exchanges ramped up. Attacks on Crypto.

article thumbnail

Crypto-inspired Magecart skimmer surfaces via digital crime haven

Malwarebytes

Digging further into the skimmer's infrastructure on Russian-based hosting provider DDoS-Guard, we came across a digital crime haven for cryptocurrency scams, Bitcoin mixers, malware distribution sites and much more. We should note that the sites we found injected with this skimmer had nothing to do with cryptocurrencies themselves.

DDOS 97
article thumbnail

Good game, well played: an overview of gaming-related cyberthreats in 2022

SecureList

Additionally, we looked at the phishing activity around gaming, specifically that related to cybersports tournaments, bookmakers, gaming marketplaces, and gaming platforms, and found numerous examples of scams that target gamers and esports fans. Launching the malware resulted in decryption and activation of a Trojan-stealer dubbed Taurus.

Mobile 133