article thumbnail

Catches of the Month: Phishing Scams for September 2023

IT Governance

Welcome to our September 2023 catches of the month feature, which examines recent phishing scams and the tactics criminals use to trick people into compromising their data. Storm-0324’s phishing lures “typically reference invoices and payments, mimicking services such as DocuSign, Quickbooks, and others”.

Phishing 110
article thumbnail

GoDaddy Employees Used in Attacks on Multiple Cryptocurrency Services

Krebs on Security

In March, a voice phishing scam targeting GoDaddy support employees allowed attackers to assume control over at least a half-dozen domain names, including transaction brokering site escrow.com. In due course, the malicious actor was able to partially compromise our infrastructure, and gain access to document storage.”

Phishing 363
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Weekly podcast: Browsealoud cryptojacking, Bee Token phishing and Olympic attacks

IT Governance

This week, we discuss the use of cryptocurrency mining software on numerous government websites, a phishing scam that robbed Bee Token investors of $1 million and cyber attacks on the Pyeongchang Winter Olympics. Here are this week’s stories. and NHS sites in the UK. We have not identified any malicious activity in our database”.

article thumbnail

New Linux Malware Shikitega Can Take Full Control of Devices

eSecurity Planet

The infamous XMRig mines Monero cryptocurrency that is known to be anonymity-focused, as it’s particularly hard to trace back. Employees should be trained against various social engineering and phishing attacks, as it’s a classic vector used by cybercriminals to deploy malware. Cybercriminals Use C2 Servers to Deploy Cryptominer.

Cloud 117
article thumbnail

VASCO rebrands as OneSpan, makes acquisition, to support emerging mobile banking services

The Last Watchdog

This, of course, is a tall task. What we’re seeing is they’re going in and taking a bank’s good application and wrapping a crypto currency mining app around it. LW: It’s the actual banking app, wrapped up with a crypto mining functionality on it? But right now, crypto mining is where the money is.

Mining 173
article thumbnail

MY TAKE: 3 privacy and security habits each individual has a responsibility to embrace

The Last Watchdog

Why we’re in the ‘Golden Age’ of cyber espionageThe fact is cyber criminals are expert at refining and carrying out phishing, malvertising and other tried-and-true ruses that gain them access to a targeted victim’s Internet-connected computing device. Related: Long run damage of 35-day government shutdown.

Privacy 196
article thumbnail

Acuity Who? Attempts and Failures to Attribute 437GB of Breached Data

Troy Hunt

Slightly different column count to mine (and similar but different to the hacker forum post), and slightly different email count, but the similarities remain striking. So how many "Acuity" companies are out there in total?! It's a legitimate , honest , legal business model. And the column names line up!

Insurance 121