Cybercriminal adoption of browser fingerprinting

Browser fingerprinting is one of many tactics phishing site authors use to evade security checks and lengthen the lifespan of malicious campaigns. While browser fingerprinting has been used by legitimate organizations to uniquely identify web browsers … Continue reading Cybercriminal adoption of browser fingerprinting

Thread Hijacking: Phishes That Prey on Your Curiosity

Thread hijacking attacks. They happen when someone you know has their email account compromised, and you are suddenly dropped into an existing conversation between the sender and someone else. These missives draw on the recipient’s natural curiosity about being copied on a private discussion, which is modified to include a malicious link or attachment. Here’s the story of a recent thread hijacking attack in which a journalist was copied on a phishing email from the unwilling subject of a recent scoop. Continue reading Thread Hijacking: Phishes That Prey on Your Curiosity

Cyberespionage Campaign Targets Government, Energy Entities in India

Threat intelligence firm EclecticIQ documents the delivery of malware phishing lures to government and private energy organizations in India.
The post Cyberespionage Campaign Targets Government, Energy Entities in India appeared first on SecurityWeek.
Continue reading Cyberespionage Campaign Targets Government, Energy Entities in India

Protect Your Business With This Seamless Firewall — Now $150 Off

DNS FireWall is an intuitive security app built to protect you and your business from malware, phishing, botnets and more security threats. Continue reading Protect Your Business With This Seamless Firewall — Now $150 Off

Attackers leverage weaponized iMessages, new phishing-as-a-service platform

Scammers are leveraging the Darcula phishing-as-a-service platform, iMessages and Google Messages to great effect. The platform allows them to impersonate a variety of brands based in over 100 different countries: postal services, public and private ut… Continue reading Attackers leverage weaponized iMessages, new phishing-as-a-service platform

Trezor’s Twitter account hijacked by cryptocurrency scammers via bogus Calendly invite

Hardware wallet manufacturer Trezor has explained how its Twitter account was compromised – despite it having sensible security precautions in place, such as strong passwords and multi-factor authentication.

Read more in my article on the Hot for Se… Continue reading Trezor’s Twitter account hijacked by cryptocurrency scammers via bogus Calendly invite

Notorious Nemesis Market zapped by video game-loving German police

Nemesis Market, a notorious corner of the darknet beloved by cybercriminals and drug dealers, has been suddenly shut down after German police seized control of its systems.

Read more in my article on the Tripwire State of Security blog. Continue reading Notorious Nemesis Market zapped by video game-loving German police

Scammers steal millions from FTX, BlockFi claimants

Customers of bankrupt crypto platform BlockFi have been targeted with a very convincing phishing email impersonating the platform, asking them to connect their wallet to complete the withdrawal of remaining funds. Judging by this Reddit thread, many ha… Continue reading Scammers steal millions from FTX, BlockFi claimants

APT29 hit German political parties with bogus invites and malware

APT29 (aka Cozy Bear, aka Midnight Blizzard) has been spotted targeting German political parties for the first time, Mandiant researchers have shared. Phishing leading to malware The attack started in late February 2024, with phishing emails containing… Continue reading APT29 hit German political parties with bogus invites and malware