Articles tagged "Phishing"

Found 177 articles

A new ransomware strain called JanaWare is targeting users in Turkey, focusing on home users and small to medium-sized businesses. The attackers are primarily spreading the malware through phishing emails that contain malicious Java archive files. This method of infection allows them to infiltrate systems quietly, posing a significant risk to individuals and organizations that may not have robust cybersecurity measures in place. The low-value, high-volume nature of these attacks suggests that the perpetrators are likely looking to maximize their reach rather than targeting high-profile victims. As more users fall prey to these phishing attempts, it raises concerns about the overall security posture of smaller businesses that may lack the resources to defend against such threats.

Impact: Home users and small to medium-sized businesses in Turkey
Remediation: Users should be cautious of unsolicited emails and refrain from opening attachments from unknown sources. Regularly updating security software and backing up important data can also help mitigate the risk.
Read Original
Booking.com Confirms Data Breach as Hackers Access Customer Details

Hackread – Cybersecurity News, Data Breaches, AI and More

Booking.com has confirmed that a data breach has occurred, compromising customer details. Although no payment information was accessed, the breach raises concerns about potential phishing scams targeting affected users. This incident puts customers at risk of receiving fraudulent communications that could lead to further data theft or financial loss. Booking.com has not specified how many users are impacted or the exact nature of the compromised data. Customers should remain vigilant and be cautious with any unsolicited emails or messages they receive following this breach.

Impact: Booking.com customer data
Remediation: Users are advised to be cautious of phishing attempts and to monitor their accounts for any suspicious activity.
Read Original

A recent study has revealed that over one-third of the official partners of the FIFA World Cup 2026 are exposing the public to the risk of email fraud. This vulnerability arises mainly from the use of unsecured email practices, which can make them easy targets for phishing attacks. The findings suggest that these partners, which include various companies and organizations involved with the event, need to enhance their email security measures to protect their communications and sensitive information. The implications are significant, as successful email fraud can lead to financial losses and damage to reputations, especially for high-profile events like the World Cup. Stakeholders are urged to adopt stronger security protocols to mitigate these risks and safeguard their users.

Impact: Official partners of FIFA World Cup 2026
Remediation: Enhance email security measures, implement two-factor authentication, provide phishing awareness training
Read Original

The FBI has successfully dismantled a phishing operation known as W3LL, which was linked to fraudulent activities totaling around $20 million. This operation utilized a specialized phishing kit that enabled attackers to trick individuals into providing sensitive information. The takedown is a significant step in combating online fraud, as phishing remains a common tactic used by cybercriminals to exploit unsuspecting users. The operation's disruption not only affects the criminals behind it but also aims to protect potential victims from falling prey to similar scams. Authorities are urging individuals and businesses to remain vigilant against phishing attempts, which can lead to financial loss and data breaches.

Impact: N/A
Remediation: Users are advised to be cautious of unsolicited communications and verify the authenticity of requests for personal information.
Read Original
FBI Atlanta and Indonesian National Police Take Down W3LLSTORE Phishing Marketplace

Hackread – Cybersecurity News, Data Breaches, AI and More

The FBI Atlanta office, in collaboration with the Indonesian National Police, has successfully shut down W3LLSTORE, a phishing marketplace linked to a significant $20 million fraud scheme. Authorities seized multiple domains associated with the site and detained its developer, marking a notable victory in the fight against online fraud. W3LLSTORE facilitated the distribution of phishing kits and other malicious tools, which allowed cybercriminals to target unsuspecting victims. This operation not only disrupts the marketplace but also sends a strong message to those involved in cybercrime. The crackdown is crucial as it helps protect individuals and organizations from falling victim to similar scams in the future.

Impact: W3LLSTORE phishing marketplace
Remediation: N/A
Read Original

Hims, a telehealth company, has suffered a data breach that exposes sensitive personal health information (PHI) of its users. The breach could reveal details about users' conditions, such as baldness, obesity, or erectile dysfunction. The attackers may misuse this data for identity theft, targeted phishing scams, or other malicious activities. This incident raises serious concerns about the protection of personal health data in the telehealth sector, highlighting the ongoing challenges companies face in safeguarding sensitive information. Users of Hims should be vigilant about potential phishing attempts and monitor their accounts for unusual activity.

Impact: Hims telehealth services and user accounts
Remediation: Users should change their passwords and enable two-factor authentication where possible. Companies should review their security measures and consider additional training for staff on data protection.
Read Original

In March, three ransomware groups—Qilin, Akira, and Dragonforce—were responsible for a significant portion of cyberattacks, accounting for 40% of the 672 ransomware incidents reported, according to research from Check Point. This spike emphasizes the ongoing challenge organizations face from these malicious actors. The rise in activity from these specific gangs suggests a concentrated threat that could impact various sectors, as ransomware continues to be a lucrative avenue for cybercriminals. Companies and users need to stay vigilant and enhance their cybersecurity measures to protect against potential attacks. This situation serves as a reminder of the importance of regular system updates and employee training on recognizing phishing attempts, which are often the gateway for these types of attacks.

Impact: N/A
Remediation: Organizations should implement regular system updates, employee training on phishing recognition, and robust backup solutions to mitigate the risk of ransomware attacks.
Read Original

Researchers have discovered a new malware known as LucidRook, which is written in Lua and is being deployed in targeted spear-phishing campaigns aimed at non-governmental organizations (NGOs) and universities in Taiwan. This malware is particularly concerning because it represents a shift in tactics, focusing on sectors often involved in sensitive and impactful work. Attackers are leveraging deceptive emails to compromise their targets, potentially leading to data breaches or other security incidents. The targeting of educational and humanitarian organizations indicates that attackers are seeking valuable information that could be exploited for various malicious purposes. Organizations in these sectors need to be vigilant and enhance their security measures to defend against such threats.

Impact: Non-governmental organizations, universities
Remediation: Organizations should enhance email filtering and employee training on recognizing phishing attempts. Regular software updates and security audits are also recommended.
Read Original

Researchers from Cisco Talos have found that attackers are exploiting the email notification systems of popular SaaS platforms like GitHub and Jira to distribute phishing and spam emails. By sending these malicious emails from the platforms' own servers, the attackers bypass standard email security measures such as SPF, DKIM, and DMARC. This tactic allows them to deliver phishing messages that appear legitimate, effectively tricking users into engaging with the content. This incident raises serious concerns for organizations using these platforms, as it highlights a potential vulnerability in their email communication processes. Users of GitHub and Jira should be particularly vigilant about unexpected emails, even if they seem to come from trusted sources.

Impact: GitHub, Jira
Remediation: Users should verify the authenticity of emails from GitHub and Jira, especially if they contain links or requests for sensitive information. Implementing additional email filtering and user education on recognizing phishing attempts are also recommended.
Read Original

Cybercrime is becoming an increasingly costly issue, with losses from online crime surpassing $20 billion in 2025, according to the FBI’s Internet Crime Complaint Center (IC3). This marks a significant 26% increase from the previous year, driven largely by fraud, which accounted for about 85% of the total losses. The report indicates that over one million complaints were filed, with cyber-enabled fraud alone resulting in nearly $17.7 billion in damages. The rise in these financial losses points to a growing vulnerability among individuals and businesses, emphasizing the urgent need for improved cybersecurity measures. As online crime continues to evolve, both users and organizations must remain vigilant to protect themselves from these threats.

Impact: N/A
Remediation: Users and organizations should implement stronger cybersecurity practices, including regular training on recognizing phishing attempts and investing in security software.
Read Original

Hackers linked to North Korea are targeting South Korean organizations through a new cyberattack method that uses GitHub as a command and control (C2) server. The attacks begin with phishing emails that contain obfuscated LNK files. When opened, these files drop a decoy PDF and a PowerShell script onto the victim's system. This tactic allows the attackers to bypass traditional security measures by using a widely trusted platform like GitHub. The implications are significant as this method not only demonstrates the evolving strategies of DPRK hackers but also poses serious risks to organizations in South Korea, which must now be wary of both phishing attempts and the potential for data breaches.

Impact: South Korean organizations, GitHub
Remediation: Organizations should implement email filtering to detect and block phishing attempts, educate employees about the dangers of opening unknown attachments, and monitor for unusual activity on their networks.
Read Original
Missile Alert Phishing Exploits Iran-US-Israel Conflict for Microsoft Logins

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

A new phishing scam is exploiting the ongoing conflict between Iran, the US, and Israel by sending out fake missile alerts to trick users into revealing their Microsoft login credentials. Attackers are using QR codes and counterfeit government emails to lure victims. This tactic is particularly concerning as it preys on the heightened anxiety surrounding geopolitical tensions, making users more susceptible to clicking on malicious links. The scam underscores the importance of vigilance regarding unsolicited communications, especially during times of crisis. Users are advised to verify the authenticity of any alerts before taking action, particularly those requesting sensitive information.

Impact: Microsoft accounts
Remediation: Users should be cautious with unsolicited emails and alerts, verify sources before clicking on links or scanning QR codes, and enable two-factor authentication on their accounts.
Read Original

Recent research has identified several email-based threats that are evolving with the rise of AI and sophisticated attack methods. Key threats include OAuth consent attacks, where attackers exploit legitimate app permissions to gain unauthorized access to accounts. Lateral phishing is also on the rise, where compromised accounts are used to target other users within the same organization. Additionally, AI is being misused in payroll fraud schemes, tricking companies into making mistaken payments. These threats impact a wide range of organizations, as they rely heavily on email for communication and transactions. As these tactics become more common, businesses must remain vigilant and enhance their email security measures to protect against these evolving risks.

Impact: OAuth consent attacks, lateral phishing, AI payroll fraud
Remediation: Companies should implement multi-factor authentication, conduct regular security training for employees, and monitor for unusual email activity.
Read Original

Hims & Hers Health, a telehealth service provider, has reported a data breach due to stolen support tickets from Zendesk, a third-party customer service platform. This incident raises concerns as it potentially exposes sensitive information from users who sought medical advice or treatment through the service. The company is urging affected users to stay vigilant about their personal information and to monitor their accounts for any suspicious activity. This breach underscores the risks associated with relying on third-party vendors for customer support and handling sensitive data. Users should be aware of possible phishing attempts or unauthorized access to their accounts following this incident.

Impact: Hims & Hers Health user data, Zendesk support tickets
Remediation: Monitor accounts for suspicious activity; users should be cautious of phishing attempts.
Read Original

A Chinese cyber group known as TA416 has been targeting European government and diplomatic entities since mid-2025, resuming its activities after a two-year lull. This campaign employs malware like PlugX and uses OAuth-based phishing techniques to compromise systems. TA416 is linked to various other hacking groups, including DarkPeony and RedDelta, indicating a broader network of cyber threats. The resurgence of these attacks raises concerns about the vulnerability of government institutions in Europe, especially given the increasing geopolitical tensions. Authorities and organizations need to bolster their cybersecurity measures to protect sensitive information from these state-sponsored actors.

Impact: European government and diplomatic organizations
Remediation: Organizations should enhance their cybersecurity protocols, including implementing multi-factor authentication and regular training for employees on recognizing phishing attempts.
Read Original
Page 1 of 12Next