How Phished Data Turns into Apple & Google Wallets

Carding — the underground business of stealing, selling and swiping stolen payment card data — has long been the dominion of Russia-based hackers. Happily, the broad deployment of more secure chip-based payment cards in the United States has weakened the carding market. But a flurry of innovation from cybercrime groups in China is breathing new life into the carding industry, by turning phished card data into mobile wallets that can be used online and at main street stores. Continue reading How Phished Data Turns into Apple & Google Wallets

Chinese Innovations Spawn Wave of Toll Phishing Via SMS

Residents across the United States are being inundated with text messages purporting to come from toll road operators like E-ZPass, warning that recipients face fines if a delinquent toll fee remains unpaid. Researchers say the surge in SMS spam coincides with new features added to a popular commercial phishing kit sold in China that makes it simple to set up convincing lures spoofing toll road operators in multiple U.S. states. Continue reading Chinese Innovations Spawn Wave of Toll Phishing Via SMS

What’s up India? PixPirate is back and spreading via WhatsApp

Quick recap This blog post is the continuation of a previous blog regarding PixPirate malware. If you haven’t read the initial post, please take a couple of minutes to get caught up before diving into this additional content. As a reminder, PixPirate malware consists of two components: a downloader application and a droppee application, and […]

The post What’s up India? PixPirate is back and spreading via WhatsApp appeared first on Security Intelligence.

Continue reading What’s up India? PixPirate is back and spreading via WhatsApp

Spooky action: Phantom domains create hijackable hyperlinks

According to a recent paper published at the 2024 Web Conference, so-called “phantom domains” make it possible for malicious actors to hijack hyperlinks and exploit users’ trust in familiar websites. The research defines phantom domains as active links to dot-com domains that have never been registered. Here’s what enterprises need to know about how phantom domains […]

The post Spooky action: Phantom domains create hijackable hyperlinks appeared first on Security Intelligence.

Continue reading Spooky action: Phantom domains create hijackable hyperlinks

This Week in Security: Unicode Strikes Again, Trust No One (Redditor), and More

There’s a popular Sysadmin meme that system problems are “always DNS”. In the realm of security, it seems like “it’s always Unicode“. And it’s not hard to see why. Unicode …read more Continue reading This Week in Security: Unicode Strikes Again, Trust No One (Redditor), and More

Chinese ‘Smishing Triad’ Group Targets Pakistanis with SMS Phishing

Protect yourself from Smishing attacks in Pakistan! Smishing Triad, a notorious cybercriminal group, is targeting Pakistani bank customers with fake Pakistan Post messages. Learn how to identify and avoid these scams to protect your financial information. Continue reading Chinese ‘Smishing Triad’ Group Targets Pakistanis with SMS Phishing