Articles tagged "Phishing"

Found 118 articles

New ‘DroidLock’ Android Malware Locks Users Out, Spies via Front Camera

Hackread – Cybersecurity News, Data Breaches, AI, and More

Actively Exploited

Researchers at Zimperium zLabs have discovered a new Android malware called DroidLock, which behaves like ransomware. This malicious software can lock users out of their devices and steal sensitive information by tricking them into providing their credentials through phishing tactics. Additionally, DroidLock has the capability to stream users' screens and activate their front cameras through VNC, raising serious privacy concerns. This malware primarily targets Android users, making it essential for them to remain vigilant about their device security and be cautious of suspicious links or applications. The emergence of DroidLock emphasizes the ongoing risks associated with mobile malware and the need for users to adopt strong security practices.

Impact: Android devices
Remediation: Users should avoid clicking on unknown links, regularly update their devices, and consider using security applications that can detect and mitigate malware.
Read Original
Scammers Sent 40,000 E-Signature Phishing Emails to 6,000 Firms in Just 2 Weeks

Hackread – Cybersecurity News, Data Breaches, AI, and More

Actively Exploited

A recent phishing campaign has targeted around 6,000 companies, sending over 40,000 fraudulent emails that appeared to come from trusted services like SharePoint and DocuSign. These emails contained malicious links disguised by reputable redirect services, making it easier for scammers to trick recipients into clicking. The scale and speed of this attack raise concerns about the vulnerability of businesses to such tactics, which exploit the trust users place in well-known platforms. Companies need to be vigilant, as these phishing attempts can lead to data breaches or financial loss if employees fall for the scams. Ensuring proper training and awareness around phishing tactics is crucial for organizations to protect themselves.

Impact: SharePoint, DocuSign, e-signature services
Remediation: Employees should be trained to recognize phishing attempts and verify the authenticity of emails before clicking on links.
Read Original

A new phishing kit named Spiderman is targeting customers of various European banks and cryptocurrency users by creating nearly identical fake websites that impersonate legitimate brands and organizations. This sophisticated kit allows attackers to mimic the look and feel of real banking sites, making it difficult for users to identify them as fraudulent. Affected users may enter sensitive information, such as login credentials or financial details, which could lead to identity theft or financial loss. The rise of such phishing attacks is concerning as they exploit the trust users have in established financial institutions. Awareness and caution are crucial for users to protect themselves from these deceptive schemes.

Impact: European banks and cryptocurrency platforms
Remediation: Users should verify website URLs carefully, enable two-factor authentication where possible, and report any suspicious emails or messages to their bank.
Read Original
Spiderman Phishing Kit Targets European Banks with Real-Time Credential Theft

Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

Actively Exploited

Varonis threat analysts have identified a new phishing kit named Spiderman that specifically targets European banks and cryptocurrency customers. This kit automates the process of stealing users' credentials and personal information, creating a complete identity profile of the victim. The implications of this attack are significant, as it not only compromises individual accounts but can also lead to broader financial fraud and identity theft. Banks and crypto platforms should be on high alert and enhance their security measures to protect against this sophisticated threat. Users must also remain vigilant and be cautious about sharing their information online.

Impact: European banks, cryptocurrency platforms
Remediation: Banks and crypto platforms should enhance security protocols, implement two-factor authentication, and educate users on recognizing phishing attempts.
Read Original
Over 70 Domains Used in Months-Long Phishing Spree Against US Universities

Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

Actively Exploited

A phishing campaign utilizing the Evilginx kit has targeted 18 US universities, successfully bypassing Multi-Factor Authentication (MFA) to steal credentials over a period from April to November 2025. The severity of the threat highlights the vulnerabilities in MFA systems and the need for enhanced security measures in educational institutions.

Impact: 18 US universities
Remediation: Educational institutions should enhance their MFA systems, implement user training on recognizing phishing attempts, and consider additional layers of security such as anomaly detection and threat intelligence.
Read Original

The article highlights various cybersecurity threats, including a significant exploit in the DeFi space that resulted in the theft of $9 million. It emphasizes the ongoing battle between hackers and security measures across multiple platforms, including Wi-Fi and coding tools.

Impact: DeFi applications, Wi-Fi networks, npm package ecosystem
Remediation: Implement security best practices for Wi-Fi networks, regularly update coding tools, and monitor DeFi applications for unauthorized access.
Read Original

A new wave of spear-phishing attacks has been identified, attributed to the Russia-based hacking group Star Blizzard. This threat poses significant risks to organizations, particularly targeting the French NGO Reporters Without Borders, highlighting the ongoing cybersecurity challenges faced by non-profits and media organizations.

Impact: French NGO Reporters Without Borders
Remediation: Organizations should enhance their phishing detection capabilities, conduct employee training on recognizing phishing attempts, and implement multi-factor authentication to mitigate risks.
Read Original

BitSight research highlights a significant cybersecurity threat where threat actors exploit calendar subscriptions to deliver phishing links and malware via hijacked domains. This method poses a serious risk as it can lead to social engineering attacks, potentially compromising sensitive information and systems.

Impact: Calendar applications, email clients, and users of hijacked domains.
Remediation: Users should be cautious about accepting calendar subscriptions from unknown sources and regularly review their calendar settings for any unauthorized subscriptions. Implementing email filtering and security awareness training can also mitigate risks.
Read Original
Actively Exploited

The article discusses a new phishing campaign targeting Zendesk users, attributed to the Scattered Lapsus$ Hunters collective. This campaign involves the use of newly registered phishing domains, indicating a serious threat to users of the Zendesk platform.

Impact: Zendesk users
Remediation: Users should be vigilant about phishing attempts and ensure they verify the authenticity of communications claiming to be from Zendesk. Implementing multi-factor authentication and educating users on recognizing phishing attempts are recommended.
Read Original

The FBI has reported a significant increase in account takeover (ATO) fraud, with cybercriminals impersonating financial institutions to steal money and sensitive information. This issue poses a serious threat to individuals and organizations across various sectors, leading to losses exceeding $262 million.

Impact: Financial institutions, individuals, businesses, organizations
Remediation: Individuals and organizations should implement strong authentication measures, monitor accounts for unusual activity, and educate employees about phishing tactics.
Read Original

Recent research indicates that advanced phishing attacks are effectively circumventing traditional security measures employed by enterprises. This highlights a significant concern for organizations, as these tactics remain effective despite the implementation of sophisticated security systems.

Impact: N/A
Remediation: N/A
Read Original

A new cybersecurity campaign is utilizing fake Windows update pop-ups on adult websites to trick users into executing malicious commands. This method combines ClickFix lures with phishing tactics, posing a significant risk to users who visit these sites.

Impact: N/A
Remediation: Users should avoid clicking on suspicious pop-ups and ensure their antivirus software is up to date. Regularly updating the operating system and using ad blockers may also help mitigate the risk.
Read Original

A phone phishing attack has compromised a system at Harvard University, leading to the theft of sensitive information related to alumni, donors, students, and staff. This incident highlights the severity of social engineering attacks and their potential to affect a wide range of individuals associated with the institution.

Impact: Harvard University alumni, donors, students, staff, and other individuals' information
Remediation: Implement stronger phishing awareness training for staff and students; enhance security measures for sensitive information systems.
Read Original

Palo Alto Networks has identified new malicious language models, WormGPT 4 and KawaiiGPT, that are being utilized by cybercriminals to enhance their phishing, malware development, and reconnaissance efforts. The rise of these dark LLMs represents a significant threat to cybersecurity, automating and streamlining various cybercrime activities.

Impact: N/A
Remediation: N/A
Read Original
SiRcom SMART Alert (SiSA)

All CISA Advisories

The SiRcom SMART Alert (SiSA) system has a critical vulnerability due to missing authentication for critical functions, allowing unauthorized remote access to backend APIs. This could enable attackers to manipulate emergency sirens, posing a significant risk to public safety and critical infrastructure.

Impact: SiRcom SMART Alert (SiSA): Version 3.0.48
Remediation: Minimize network exposure for control system devices, ensure they are not accessible from the Internet, locate control system networks behind firewalls, use secure remote access methods like VPNs, and perform proper impact analysis and risk assessment before deploying defensive measures.
Read Original
PreviousPage 7 of 8Next