article thumbnail

Austin Energy Customers Targeted in Vishing Scams After Severe Winter Storm Provokes Utility Outages

Hot for Security

Utility provider Austin Energy is warning residents that scammers are exploiting the chaos surrounding the severe winter storms that cut power to millions of Texans and left many households freezing. The company said it will never call residential customers to ask for instant payment via cash, gift card or cryptocurrency.

article thumbnail

Actions Target Russian Govt. Botnet, Hydra Dark Market

Krebs on Security

Federal Bureau of Investigation (FBI) says it has disrupted a giant botnet built and operated by a Russian government intelligence unit known for launching destructive cyberattacks against energy infrastructure in the United States and Ukraine. energy facilities. Separately, law enforcement agencies in the U.S. Dragonfly 2.0,

Marketing 308
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ransomware attack hits Suncor Energy disrupting fuel station payments across Canada

CyberSecurity Insiders

Numerous gas and fuel filling stations throughout Canada experienced significant disruptions in processing credit card and reward points-based payments due to a cyber attack on Suncor Energy, the parent company.

article thumbnail

A massive phishing campaign using QR codes targets the energy sector

Security Affairs

A phishing campaign employing QR codes targeted a leading energy company in the US, cybersecurity firm Cofense reported. “Beginning in May 2023, Cofense has observed a large phishing campaign utilizing QR codes targeting the Microsoft credentials of users from a wide array of industries.” ” continues the report.

article thumbnail

IT threat evolution Q3 2024

SecureList

The malware utilizes cloud resources for its C2 (command and control) servers, which it accesses via APIs using authentication tokens. Interestingly, Twelve shares infrastructure, utilities and TTPs (Tactics, Techniques and Procedures) with the DARKSTAR ransomware group (formerly known as Shadow or COMET).

article thumbnail

Is the Grid Secure Enough for the Electric Vehicle Influx?

IT Security Guru

Two goods have emerged as the most popular: cryptocurrencies and electric vehicles. According to a forecast by the International Energy Agency (IEA), electric car sales are expected to reach an all-time high in 2022. million EVs in the United States utilizes less than 0.5 percent of the total energy produced in 2021.

article thumbnail

Norton Crypto, the controversial cryptomining feature of Norton 360

Security Affairs

Experts warn that the popular antivirus product Norton 360 has installed a cryptocurrency miner on its customers’ computers. Many users ignore that Norton 360 comes with a cryptomining feature, dubbed Norton Crypto, that could allow them to earn money mining Ethereum (ETH) cryptocurrency while the customer’s computer is idle.