Virtual credit card fraud: An old scam reinvented

In today’s rapidly evolving financial landscape, as banks continue to broaden their range of services and embrace innovative technologies, they find themselves at the forefront of a dual-edged sword. While these advancements promise greater convenience and accessibility for customers, they also inadvertently expose the financial industry to an ever-shifting spectrum of emerging fraud trends. This […]

The post Virtual credit card fraud: An old scam reinvented appeared first on Security Intelligence.

Continue reading Virtual credit card fraud: An old scam reinvented

What to do about the rise of financial fraud

As our lives become increasingly digital, threat actors gain even more avenues of attack. With the average person spending about 400 minutes online, many scammers enjoy a heyday. Old impersonation scams continue to deceive people every day, as con artists and hackers are armed with advanced technologies and sophisticated social engineering tactics. According to the […]

The post What to do about the rise of financial fraud appeared first on Security Intelligence.

Continue reading What to do about the rise of financial fraud

Magecart Attacks Continue to ‘Skim’ Software Supply Chains

Did your company or e-commerce firm recently buy third-party software from a value-added reseller (VAR) or systems integrator? Did you vet the vendor code? If not, you could be at risk for a Magecart group attack. Magecart is an association of threat actor groups who target online shopping carts, mostly from within the e-commerce platform […]

The post Magecart Attacks Continue to ‘Skim’ Software Supply Chains appeared first on Security Intelligence.

Continue reading Magecart Attacks Continue to ‘Skim’ Software Supply Chains

Confessions of a Famous Fraudster: How and Why Social Engineering Scams Work

In a world in which bad news dominates, social engineering scams that carry a promise of good news can be incredibly lucrative for cyber criminals.  In one recent example, fraudsters set up a phony job posting using a real recruiter as the contact person for the hiring process. Applicants hoping for a chance at the […]

The post Confessions of a Famous Fraudster: How and Why Social Engineering Scams Work appeared first on Security Intelligence.

Continue reading Confessions of a Famous Fraudster: How and Why Social Engineering Scams Work

Synthetic Identity Theft: When Everybody Knows Your Name

You probably have a place where everyone knows your name — and maybe your address and your birthday and your favorite drink. That place could be your favorite restaurant, your office or your grandma’s house. It doesn’t matter where that place is; when everyone in the room greets you by name, it gives you a […]

The post Synthetic Identity Theft: When Everybody Knows Your Name appeared first on Security Intelligence.

Continue reading Synthetic Identity Theft: When Everybody Knows Your Name

State of Underground Card Shops in 2021

(life after Joker’s Stash)   Table of Contents Introduction Active credit card shops FERum Shop Brian’s Club Thefreshstuffs Missing Credit Card Shops ValidCC VaultMarket Rescator Conclusions   Introduction    On February 15, 2021, after nearly 6.5 year… Continue reading State of Underground Card Shops in 2021

Millions of Hotel Guests Worldwide Caught Up in Mass Data Leak

A cloud misconfiguration affecting users of a popular reservation platform threatens travelers with identity theft, scams, credit-card fraud and vacation-stealing. Continue reading Millions of Hotel Guests Worldwide Caught Up in Mass Data Leak

Tennessee Man Sentenced to 17 Years in Federal Prison for Identity Theft and Fraud

James Jackson, a 58-year-old resident of Memphis, Tennessee, has been sentenced to 17 years in federal prison for 13 counts of mail fraud, aggravated identity theft, access device fraud and mail theft. According to US Attorney Michael Dunavant, between… Continue reading Tennessee Man Sentenced to 17 Years in Federal Prison for Identity Theft and Fraud

This Week in Security: Zero Days, Notarized Malware, Jedi Mind Tricks, and more

Honeypots are an entertaining way to learn about new attacks. A simulated vulnerable system is exposed to the internet, inviting anyone to try to break into it. Rather than actually compromising a deployed device, and attacker just gives away information about how they would attack the real thing. A honeypot …read more

Continue reading This Week in Security: Zero Days, Notarized Malware, Jedi Mind Tricks, and more

American Payroll Association Forgets to Patch Web Portal, Hackers Skim Credit Cards and Passwords Off Site

• American Payroll Association uncovered unusual activity on the site dating back to May 13 • Hackers exploited vulnerability to deploy card-skimming techniques and steal credit card data • Identity thieves gained access to login information (i.e. user… Continue reading American Payroll Association Forgets to Patch Web Portal, Hackers Skim Credit Cards and Passwords Off Site