Articles tagged "Phishing"

Found 177 articles

Actively Exploited

The Tycoon2FA phishing platform has resumed operations after a previous takedown, utilizing advanced techniques known as AITM (Advanced In-The-Middle) to circumvent multi-factor authentication (MFA) protections. This service primarily targets users who rely on MFA for securing their accounts, making them particularly vulnerable to credential theft. Attackers can now exploit this platform to gain unauthorized access to sensitive information across various services. This resurgence poses a significant risk to individuals and organizations that depend on MFA as a security measure, as it undermines the effectiveness of this commonly used defense. Users must remain vigilant and consider additional security practices to protect their accounts.

Impact: Users relying on multi-factor authentication (MFA) services
Remediation: Users should implement additional security measures beyond MFA, such as using password managers and enabling alerts for unusual account activity.
Read Original

A new phishing campaign is targeting sectors such as healthcare, government, hospitality, and education across multiple countries. Attackers are disguising malicious infostealer software within copyright infringement notices, making it harder for users to identify the threat. This tactic involves various evasion techniques designed to bypass security measures, posing significant risks to sensitive data in these critical industries. As these sectors often handle personal and confidential information, the implications of a successful breach could be severe, potentially leading to data theft or operational disruptions. Organizations within these fields need to be vigilant and educate their staff about recognizing phishing attempts to mitigate the risk of falling victim to such attacks.

Impact: Healthcare, Government, Hospitality, Education sectors
Remediation: Users should be trained to recognize phishing attempts, implement email filtering solutions, and maintain up-to-date security software.
Read Original

Russian hackers linked to intelligence operations are increasingly targeting users of commercial messaging platforms, particularly Signal. According to warnings from the FBI and CISA, the hackers are focusing on individuals deemed valuable, such as government employees and journalists, who may have access to sensitive information. This campaign has reportedly compromised thousands of accounts on these messaging apps, exposing users to potential phishing attacks. Many users mistakenly believe that these platforms are secure, making them prime targets for exploitation. The situation is a reminder that even encrypted messaging services can be vulnerable to sophisticated hacking attempts.

Impact: Signal messaging application, commercial messaging platforms
Remediation: Users should enable two-factor authentication, be cautious with unsolicited messages, and verify the identity of contacts before sharing sensitive information.
Read Original

Russian intelligence-linked actors are targeting officials and journalists through phishing campaigns aimed at hijacking accounts on messaging apps like WhatsApp and Signal. The FBI has issued a warning about these cyber actors, who are attempting to gain access to sensitive messages and contacts. This kind of targeted attack poses significant risks to individuals in sensitive roles, as compromised accounts can lead to the leaking of confidential information. Users of these messaging platforms must be vigilant about phishing attempts and employ security measures to protect their accounts. The situation underscores the ongoing threats from state-sponsored cyber activities.

Impact: WhatsApp, Signal
Remediation: Users should enable two-factor authentication, be cautious of suspicious links, and regularly update their security settings.
Read Original

Navia Benefit Solutions has reported a significant data breach that has affected approximately 2.7 million individuals. The breach occurred over a period from December 2025 to January 2026, with suspicious activity first detected on January 23, 2026. In response, Navia quickly initiated an investigation to understand the full scope of the incident. The company, which provides benefits solutions in the U.S., has not yet disclosed specific details about the types of data that were compromised. This breach raises serious concerns about the security of personal information in the benefits sector, especially given the large number of individuals impacted. Those affected may face risks such as identity theft or phishing attacks as a result of their information being exposed.

Impact: Navia Benefit Solutions customer data, personal information of individuals
Remediation: N/A
Read Original

A phishing-as-a-service platform known as Tycoon2FA continues to operate despite previous efforts to shut it down. This platform enables cybercriminals to create and distribute phishing attacks that bypass two-factor authentication protections. Users of online services who rely on 2FA are particularly at risk, as attackers can exploit these phishing tools to gain unauthorized access to sensitive accounts. The persistence of Tycoon2FA showcases the challenges law enforcement faces in combating cybercrime and highlights the need for individuals and organizations to remain vigilant against such phishing attempts. As the platform evolves, it poses an ongoing threat to digital security worldwide.

Impact: Users of online services relying on two-factor authentication, cybersecurity firms, and law enforcement agencies.
Remediation: Users should enable additional security measures, such as security keys or app-based authentication, and remain cautious of unsolicited communications asking for sensitive information.
Read Original

Aura, a digital security company, has reported a data breach linked to a voice phishing attack that compromised customer information. The exposed data originated from a marketing tool that Aura acquired in 2021. While specific details about the type of data exposed have not been disclosed, the incident raises concerns about the safety of customer data and the potential for further exploitation by cybercriminals. Users affected by this breach should be vigilant for phishing attempts and other suspicious activities. This incident highlights the ongoing risks associated with third-party tools and the importance of robust security measures for customer data protection.

Impact: Aura customer data, marketing tool data
Remediation: Customers should monitor accounts for unusual activity and be cautious of phishing attempts.
Read Original

Aura, a cybersecurity firm, has reported a data breach that affects approximately 900,000 records. The breach occurred after an employee was targeted in a phone phishing attack, which allowed attackers to steal information from a marketing tool used by the company. This incident raises concerns about the effectiveness of employee training in recognizing phishing attempts and the security measures in place for sensitive data. Users whose information may have been compromised should remain vigilant about potential follow-up phishing attempts or identity theft. The breach serves as a reminder for organizations to continuously update their security protocols and educate employees about the risks of social engineering attacks.

Impact: 900,000 records from Aura's marketing tool
Remediation: Companies should enhance employee training on recognizing phishing attempts and review security measures for data protection.
Read Original

Intuitive has reported a data breach resulting from a phishing attack that compromised sensitive information. The stolen data includes customer business and contact details, as well as employee and corporate data. This breach could potentially expose affected individuals and businesses to identity theft and fraud. Phishing attacks are a common tactic used by cybercriminals to gain unauthorized access to systems, making this incident a reminder of the constant need for vigilance in cybersecurity practices. Organizations are encouraged to review their security protocols and educate employees about recognizing phishing attempts to mitigate future risks.

Impact: Customer business and contact information, employee data, corporate data
Remediation: Organizations should implement phishing awareness training for employees and review security protocols to prevent similar attacks.
Read Original

A phishing attempt targeting a C-suite executive at cybersecurity firm Outpost24 recently came to light. The attackers used trusted brands and domains to trick the executive into revealing their login credentials. Although the attack was ultimately unsuccessful, it raises concerns about the vulnerabilities even experienced professionals face when dealing with sophisticated phishing schemes. This incident serves as a reminder for organizations to remain vigilant and reinforce security training, particularly for high-level staff who are often prime targets for attackers. The tactics employed in this case reflect the evolving strategies of cybercriminals, making it crucial for companies to continually update their defenses against such threats.

Impact: Outpost24, C-suite executive credentials
Remediation: Companies should enhance security awareness training for employees, particularly executives, and implement multi-factor authentication to protect against phishing attacks.
Read Original

Intuitive Surgical, known for its robotic surgical systems, has disclosed a cyberattack that compromised some of its internal business applications. The breach occurred after an employee was targeted by a phishing attack, allowing unauthorized access to the company's systems. While the specific data accessed has not been detailed, this incident raises concerns about the security of sensitive information within the healthcare sector. As a leading provider of robotic surgery solutions, any disruption or potential data compromise could impact patient care and trust in their technologies. The company is likely reviewing its security protocols to prevent future incidents.

Impact: Internal business applications of Intuitive Surgical
Remediation: Strengthening employee training on phishing awareness and reviewing security protocols
Read Original
New Phishing Scam Uses LiveChat to Pose as Amazon and PayPal in Real Time

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

Cofense researchers have identified a new phishing scam where attackers use LiveChat to impersonate customer service agents from Amazon and PayPal. This tactic enables them to interact with victims in real-time, making the scam appear more convincing. The goal is to extract sensitive information such as credit card details and multi-factor authentication (MFA) codes. This type of scam poses a significant risk to users who may inadvertently share their financial information with these impersonators. As online shopping and payment services continue to grow, consumers need to be more vigilant about verifying the identity of customer service representatives to avoid falling victim to such schemes.

Impact: Amazon, PayPal
Remediation: Users should verify the authenticity of customer service communications and avoid sharing sensitive information through chat platforms without confirming the identity of the representative.
Read Original

Researchers have noticed a significant increase in fake shipment tracking scams, which are primarily being facilitated by a Chinese-language phishing-as-a-service platform known as Darcula. These scams trick users into believing they are tracking legitimate shipments, leading them to malicious websites where personal and financial information can be stolen. The increase in these scams is concerning as they exploit the growing reliance on online shopping and tracking services. Users, especially those expecting deliveries, are particularly vulnerable to these tactics. This surge not only puts individuals at risk but also raises alarms for businesses that could face reputational damage if their customers fall victim to such scams.

Impact: N/A
Remediation: Users should verify shipment tracking URLs directly with the retailer and remain cautious of unsolicited messages regarding deliveries. Implementing email filters and using security software can also help mitigate risks.
Read Original

A security firm executive was targeted in a sophisticated phishing attack that utilized advanced techniques to deceive the victim. The attackers sent a DKIM-signed email that appeared legitimate, employing trusted redirect infrastructure and compromised servers to facilitate the attack. They also created phishing pages protected by Cloudflare, making them harder to detect. This incident raises concerns about the security measures in place for executives and highlights the need for increased vigilance against such tactics. Companies must ensure their employees are trained to recognize phishing attempts, especially those involving seemingly legitimate communications.

Impact: DKIM-signed emails, Cloudflare-protected phishing pages
Remediation: Companies should implement employee training on phishing recognition and consider enhancing email filtering and security measures.
Read Original

A recent social engineering campaign is targeting individuals by impersonating well-known companies like PayPal and Amazon. Attackers are using customer support interactions through LiveChat to trick users into revealing sensitive information, including credit card details and personal data. This type of phishing attack takes advantage of the trust that users place in these popular services, making it easier for the criminals to manipulate their victims. It's crucial for users to stay vigilant and verify the authenticity of any communication claiming to be from these companies, especially when asked for personal information. As these tactics become more sophisticated, both consumers and companies must be cautious about sharing sensitive data online.

Impact: PayPal, Amazon, LiveChat users
Remediation: Users should verify the authenticity of communications from PayPal and Amazon, avoid sharing sensitive information through chat, and report suspicious interactions to the companies.
Read Original
PreviousPage 3 of 12Next