Remove Cryptocurrency Remove Identity Theft Remove Social Engineering
article thumbnail

Feds Charge Five Men in ‘Scattered Spider’ Roundup

Krebs on Security

According to prosecutors, the group mainly sought to steal cryptocurrency from victim companies and their employees. Those accounts state that the intruders assaulted Tylerb’s mother in the home invasion, and that they threatened to burn him with a blowtorch if he didn’t give up the keys to his cryptocurrency wallets.

article thumbnail

US DoJ charges five alleged members of the Scattered Spider cybercrime gang

Security Affairs

Each faces two conspiracy counts and aggravated identity theft charges. Scattered Spider members are part of a broader cybercriminal community called “The Com,” where hackers brag about high-profile cyber thefts, typically initiated through social engineering tactics like phone, email, or SMS scams to gain access to corporate networks.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Feds Break Up Major SIM-Hijacking Ring

Adam Levin

million worth of wire fraud and identity theft. The hacking group, called “The Community” primarily used social engineering (trickery) and SIM card hijacking to steal funds and cryptocurrency from their victims. Members of The Community face charges of wire fraud and aggravated identity theft.

article thumbnail

Fla. Man Charged in SIM-Swapping Spree is Key Suspect in Hacker Groups Oktapus, Scattered Spider

Krebs on Security

authorities arrested a 19-year-old Florida man charged with wire fraud, aggravated identity theft, and conspiring with others to use SIM-swapping to steal cryptocurrency. 12 blog post , the attackers used their access to Mailchimp employee accounts to steal data from 214 customers involved in cryptocurrency and finance.

article thumbnail

Experts warn of the new sophisticate Crocodilus mobile banking Trojan

Security Affairs

Overlay Attacks: Checks for available overlays targeting installed applications, typically for credential theft. Notifications & Social Engineering: Posts fake push notifications to trick users. Data Theft: Captures Google Authenticator screen content to steal OTP codes. ” ThreatFabric concludes.

Banking 68
article thumbnail

Scams 101: All you need to know to protect against online fraud and identity theft

Hot for Security

They use social engineering techniques such as clickbait and scare tactics to persuade recipients to access a fraudulent link or malicious attachment. Billions of unsolicited emails are sent to inboxes every day. While some may be harmless, consisting of ads from retailers, criminals also use emails in mass-market phishing campaigns.

Scams 116
article thumbnail

Store manager admits SIM swapping his customers

Malwarebytes

SIM swapping can be done in a number of ways, but perhaps the most common involves a social engineering attack on the victim’s carrier. However, if you have a telecoms manager on your payroll then there’s no need for social engineering—they can just do the SIM swap for you. Katz pleaded guilty before Chief U.S.