article thumbnail

GoDaddy Employees Used in Attacks on Multiple Cryptocurrency Services

Krebs on Security

Fraudsters redirected email and web traffic destined for several cryptocurrency trading platforms over the past week. 13, with an attack on cryptocurrency trading platform liquid.com. Restrict VPN access hours, where applicable, to mitigate access outside of allowed times. 2019 that wasn’t discovered until April 2020.

article thumbnail

Feds Charge Five Men in ‘Scattered Spider’ Roundup

Krebs on Security

Some SMS phishing messages told employees their VPN credentials were expiring and needed to be changed; other phishing messages advised employees about changes to their upcoming work schedule. According to prosecutors, the group mainly sought to steal cryptocurrency from victim companies and their employees. com and ouryahoo-okta[.]com.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Is Your Computer Part of ‘The Largest Botnet Ever?’

Krebs on Security

” The arrest coincided with the seizure of the 911 S5 website and supporting infrastructure, which the government says turned computers running various “free VPN” products into Internet traffic relays that facilitated billions of dollars in online fraud and cybercrime. government, they were unaware,” Leatherman said.

VPN 344
article thumbnail

US DoJ charges five alleged members of the Scattered Spider cybercrime gang

Security Affairs

Victims included gaming, telecom, and cryptocurrency firms, with losses reaching millions in stolen cryptocurrency and data from hundreds of thousands of accounts. Victims included gaming, telecom, and cryptocurrency firms, with losses reaching millions in stolen cryptocurrency and data from hundreds of thousands of accounts.

article thumbnail

SilentCryptoMiner Infects 2,000 Russian Users via Fake VPN Tools

eSecurity Planet

A new wave of cyberattacks is sweeping through Russia as cybercriminals deploy the so-called SilentCryptoMiner a cryptocurrency miner masquerading as a legitimate internet bypass tool. Beyond cryptocurrency theft, such attacks could pave the way for further exploitation, including deploying remote access tools (RATs) and stealers.

VPN 52
article thumbnail

Black Kingdom ransomware operators exploit Pulse VPN flaws

Security Affairs

Black Kingdom ransomware operators are targeting organizations using unpatched Pulse Secure VPN software to deploy their malware. The flaw can be used in combination with the CVE-2019-11539 remote command injection issue gain access to private VPN networks. and Italy hosting Android and cryptocurrency mining malware.”

VPN 139
article thumbnail

Panda Stealer dropped in Excel files, spreads through Discord to steal user cryptocurrency

Zero Day

The malware hones in on cryptocurrency funds as well as VPN credentials.