HackDig : Dig high-quality web security articles for hackers

“Instant bank fraud” warning spread on WhatsApp is a hoax

byPaul DucklinLast week we wrote about a WhatsApp hoax that was spreading widely, warning people to look out for a cybersecurity catastrophe that simply wasn’t going to happen.That was known as the Martinelli/Dance of the Pope hoax, and it claimed that two dangerous videos are about to come out that will hack or wipe out your phone so it can’t b
Publish At:2020-03-31 05:28 | Read:348 | Comments:0 | Tags:Fake news phishing smishing SMS WhatsApp

Emotet SMiShing Uses Fake Bank Domains in Targeted Attacks, Payloads Hint at TrickBot Connection

Before a short lull in mid-February, Emotet was in the midst of a rise in activity that has been apparent since late 2019 — in terms of both spam and infecting potential victims via SMiShing attacks. In cases observed by IBM X-Force researchers, SMS messages sent from what would appear to be local U.S. numbers are being delivered to mobile phones impersonati
Publish At:2020-02-19 08:17 | Read:420 | Comments:0 | Tags:Malware Threat Intelligence Antivirus Banking Security Phish

Spear phishing 101: what you need to know

Phishing, a cyberattack method as old as viruses and Nigerian Princes, continues to be one of the most popular means of initiating a breach against individuals and organizations, even in 2020. The tactic is so effective, it has spawned a multitude of sub-methods, including smishing (phishing via SMS), pharming, and the technique du jour for this blog: spear
Publish At:2020-01-29 16:50 | Read:684 | Comments:0 | Tags:Social engineering 101 business malspam organisation organiz

Romanian Vishing/SMiShing Threat Actors Plead Guilty

<p><img src="https://info.phishlabs.com/hs-fs/hubfs/bigstock-handcuffs-and-judge-gavel-on-c-45589036.jpg?width=300&amp;name=bigstock-handcuffs-and-judge-gavel-on-c-45589036.jpg" alt="bigstock-handcuffs-and-judge-gavel-on-c-45589036" width="300" style="width: 300px; float: right; margin: 0px 10px 10px 0px;">In May of 2018, we reported on three
Publish At:2019-09-19 22:40 | Read:617 | Comments:0 | Tags:Vishing SMiShing

Romanian Cybercriminals Sentenced for Phishing Campaign

<p><img src="https://info.phishlabs.com/hs-fs/hubfs/bigstock-handcuffs-and-judge-gavel-on-c-45589036.jpg?width=300&amp;name=bigstock-handcuffs-and-judge-gavel-on-c-45589036.jpg" alt="bigstock-handcuffs-and-judge-gavel-on-c-45589036" width="300" style="width: 300px; float: right; margin: 0px 10px 10px 0px;">This week, the Department of Justice
Publish At:2019-09-19 22:40 | Read:619 | Comments:0 | Tags:Vishing SMiShing Phishing Incident Response

New SMiShing Campaign Targets T-Mobile Subscribers

We advise our blog readers and T-Mobile subscribers to be wary of this latest SMiShing (or SMS phishing) attempt in the wild. In case you have encountered the below URL online or on your mobile device via SMS, do note that the information you might be imparting to avail of the so-called discount is far more valuable than the $20 savings this campaign promise
Publish At:2015-08-13 03:20 | Read:5100 | Comments:0 | Tags:Fraud/Scam Alert phish phishing smishing sms

Mobile Malware Threats in 2015: Fraudsters Are Still Two Steps Ahead

Fraudsters have all the tools they need to effectively turn mobile malware threats into one of the biggest security problems we’ve ever seen. As security measures lag and infection rates rise, cybercriminals use an increasingly wide array of schemes to monetize mobile malware. The Malware Is Out There Mobile malware remains a significant cybersecurity
Publish At:2015-07-13 20:15 | Read:3871 | Comments:0 | Tags:Malware Mobile Security Android Application Security iOS Mob

The History of XXShenqi and the Future of SMS Phishing

On Aug 3rd, Chinese social media websites reported on the latest and largest SMS phishing (smishing for short) attack in China. The public security authorities of multiple cities in Guangdong, Jiangxi, and Jiangsu provinces have posted on their blogs warning Android users of this latest phishing attempt. As shown in Fig. 1, by the time the exploitation attem
Publish At:2014-08-13 09:40 | Read:4455 | Comments:0 | Tags:Mobile Threats Threat Research Android Malware cybercrime mo

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud