Copyright complaint as phishing email
An anonymous bank worker writes, "What follows is the content of an email send to the whole company as a warning:" A fraudulent email has recently made its way into xxxxxxxx entitled “Cease and...
View ArticleRecursive phishing email
Bruce Sterling received a phishing email purporting to be a followup to a report of a phishing email. Coming soon: a phishing email purporting to be a phishing email purporting to be a followup to a...
View ArticleGangs run mass-scale romance cons with phished dating-site logins
Netcraft reports on a rising tide of automated phishing deployed against online dating sites; crooks steal accounts, strike up romantic relationships with their victims, then run 419-style cons on...
View ArticleTabnapping: a new phishing attack [2010]
Aza Raskin's Tabnapping is a proof-of-concept for a fiendish attack: a tab that waits until you're not watching, then turns itself into a convincing Google login screen that you assume you must have...
View ArticleSpear phishers with suspected ties to Russian government spoof fake EFF...
The spear-phishing attempt appears to be part of "Pawn Storm," a massive attack that's been underway across the net for more than a month, and involved a rare zero-day (previously unknown) Java...
View ArticlePhishers make off with W2 tax forms for several thousand Seagate employees
Seagate has emailed its employees and ex-employees to warn them that someone in the company sent their W2 tax data to a criminal who pulled off a successful phishing fraud. (more…)
View ArticleUS Embassy staffer ran a sextortion racket from work computer for 2 years
Michael C Ford has been sentenced to four years and nine months in prison, having pleaded guilty to running a sextortion/phishing operation from his work computer at the US embassy in London for two...
View ArticleSecurity-conscious darkweb crime marketplaces institute world-leading...
If you are a seller on Alphabay -- a darkweb site that sells "drugs, stolen data and hacking tools," you'll have to use two-factor authentication (based on PGP/GPG) for all your logins. (more…)
View ArticlePhishers trick Mattel into transferring $3M to a Chinese bank
Last spring, in the chaos following the firing of Mattel's CEO (who presided over a disastrous slide in Barbie sales), a Mattel finance executive got an email from his new boss, replacement CEO...
View ArticlePhishing for Bitcoin with fake 0-days
Arriving in my inbox at a steady clip this morning: a series of phishing emails aimed at Bitcoiners, promising that the sender has found a bug in "the Bitcoin client" and promising "Pay 0.07 BTC...
View ArticleIranians connected to phishing attempt on tortured Syrian activist
Former Syrian National Council vice-president Nour Al-Ameer fled to Turkey after being arrested and tortured by the Assad regime -- that's when someone attempted to phish her and steal her identity...
View ArticleEFF and partners reveal Kazakh government phished journalists, opposition...
At Defcon, researchers from the Electronic Frontier Foundation, First Look Media and Amnesty International, revealed their findings on a major phishing attack through which the government of...
View ArticleResearchers learn about wire-fraud scam after Nigerian scammers infect...
In Wire Wire: A West African Cyber Threat, researchers from Secureworks reveal their findings from monitoring a Nigerian bank-fraud ring whose members had unwittingly infected themselves with their...
View ArticleWhaling: phishing for executives and celebrities
A fraudster's term of art, "whaling" refers to phishing attempts targeted at "C-level corporate executives, politicians and celebrities" -- it's a play on "phishing" (attacks that trick users into...
View Article12 days of two-factor authentication: this Xmas, give yourself the gift of opsec
The Electronic Frontier Foundation has launched a new series, 12 Days of 2FA, in which every installment explains how to turn on two-factor authentication for a range of online services and platforms....
View ArticleIt turns out that halfway clever phishing attacks really, really work
A new phishing attack hops from one Gmail account to the next by searching through compromised users' previous emails for messages with attachments, then replies them from the compromised account,...
View ArticleAmnesty: hackers spent months building personas used to phish Qatari labor...
In a new report, Amnesty International summarizes the security research they did on the victims of a sophisticated phishing attack aimed at Qatari labor activists, dubbed "Operation Kingphish." (more…)
View ArticleHow a fishing guide's WordPress site became home to half a million fraudulent...
Ned Desmond shares the scary story of how a small site he managed that advertised fishing expeditions ended up with 565,192 scam pages. He also suggests five ways to avoid the same fate. (more…)
View ArticleUnknown hackers have gained near-total control over some US power generation...
Hacker takeovers of power infrastructure have been seen in Ukraine (where they are reliably attributed to Russian state actors), but now the US power-grid has been compromised by hackers of unknown...
View ArticleSpam was nearly dead, then it became an essential tool for crime and came...
In the early 2000s, a mix of legislative action, vigorous prosecution and advanced countermeasures looked set to kill spam: the terrible economics of mass-scale marketing could easily be disrupted by...
View Article