article thumbnail

FBI: Spike in Hacked Police Emails, Fake Subpoenas

Krebs on Security

based technology companies. Donahue said 60 technology companies are now routing all law enforcement data requests through Kodex, including an increasing number of financial institutions and cryptocurrency platforms. “That can include control over data, like an account freeze or preservation request.”

Hacking 281
article thumbnail

How Cryptocurrency Turns to Cash in Russian Banks

Krebs on Security

An analysis of their technology infrastructure shows that all of these exchanges use Russian email providers, and most are directly hosted in Russia or by Russia-backed ISPs with infrastructure in Europe (e.g. A machine-translated version of Flymoney, one of dozens of cryptocurrency exchanges apparently nested at Cryptomus.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Chinese Innovations Spawn Wave of Toll Phishing Via SMS

Krebs on Security

SMS phishing kits are hardly new, but Merrill said Chinese smishing groups recently have introduced innovations in deliverability, by more seamlessly integrating their spam messages with Apple’s iMessage technology, and with RCS , the equivalent “rich text” messaging capability built into Android devices.

Phishing 301
article thumbnail

How Phished Data Turns into Apple & Google Wallets

Krebs on Security

Rather, the missives are sent through the Apple iMessage service and through RCS , the functionally equivalent technology on Google phones. And they are not traditional SMS phishing or “ smishing ” messages, as they bypass the mobile networks entirely.

Phishing 284
article thumbnail

Fake Emergency Search Warrants Draw Scrutiny from Capitol Hill

Krebs on Security

Senate’s most tech-savvy lawmakers said he was troubled by the report and is now asking technology companies and federal agencies for information about the frequency of such schemes. Today, one of the U.S. At issue are forged “emergency data requests,” (EDRs) sent through hacked police or government agency email accounts.

article thumbnail

The Fake Browser Update Scam Gets a Makeover

Krebs on Security

But when Cloudflare blocked those accounts the attackers began storing their malicious files as cryptocurrency transactions in the Binance Smart Chain (BSC), a technology designed to run decentralized apps and “smart contracts,” or coded agreements that execute actions automatically when certain conditions are met.

Scams 336
article thumbnail

How Phishers Are Slinking Their Links Into LinkedIn

Krebs on Security

” In a statement provided to KrebsOnSecurity, Linkedin said it has “industry standard technologies in place for URL sharing and chained redirects that help us identify and prevent the spread of malware, phishing and spam.” . “The idea is to create a link that contains a clean page, redirecting to a phishing page.”

Phishing 359