article thumbnail

Chinese Innovations Spawn Wave of Toll Phishing Via SMS

Krebs on Security

Researchers say the surge in SMS spam coincides with new features added to a popular commercial phishing kit sold in China that makes it simple to set up convincing lures spoofing toll road operators in multiple U.S. Reports of similar SMS phishing attacks against customers of other U.S.

Phishing 302
article thumbnail

A Day in the Life of a Prolific Voice Phishing Crew

Krebs on Security

Besieged by scammers seeking to phish user accounts over the telephone, Apple and Google frequently caution that they will never reach out unbidden to users this way. million in an elaborate voice phishing attack. Before we get to the Apple scam in detail, we need to revisit Tony’s case. Image: Shutterstock, iHaMoo.

Phishing 339
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Arrests in Tap-to-Pay Scheme Powered by Phishing

Krebs on Security

Details released by authorities so far indicate the mobile wallets being used by the scammers were created through online phishing scams, and that the accused were relying on a custom Android app to relay tap-to-pay transactions from mobile devices located in China. It all starts with phishing. Authorities in at least two U.S.

Phishing 211
article thumbnail

“Urgent reminder” tax scam wants to phish your Microsoft credentials

Malwarebytes

If the receiver were to scan the QR code, they would be sent to a phishing site. But that’s just one example of a tax scam. The IRS’s annual Dirty Dozen list of tax scams shows common schemes that threaten your tax and financial information. The other big type of scams are phishing emails, like we saw above.

Scams 140
article thumbnail

China-based SMS Phishing Triad Pivots to Banks

Krebs on Security

China-based purveyors of SMS phishing kits are enjoying remarkable success converting phished payment card data into mobile wallets from Apple and Google. On the left is the (test) data entered at the phishing site. On the left is the (test) data entered at the phishing site. Image: Ford Merrill. Image: SilentPush.

Phishing 216
article thumbnail

FBI, Dutch Police Disrupt ‘Manipulaters’ Phishing Gang

Krebs on Security

Department of Justice refers to the cybercrime group as Saim Raza , after a pseudonym The Manipulaters communally used to promote their spam, malware and phishing services on social media. ” Manipulaters advertisement for Office 365 Private Page with Antibot phishing kit sold via Heartsender. Image: DomainTools. ” U.S.

Phishing 256
article thumbnail

PayPal Phishing Scam Uses Invoices Sent Via PayPal

Krebs on Security

” A copy of the phishing message included in the PayPal.com invoice. While the phishing message attached to the invoice is somewhat awkwardly worded, there are many convincing aspects of this hybrid scam. Details of this scam were shared Wednesday with PayPal’s anti-abuse (phish@paypal.com) and media relations teams.

Scams 344