Tag: scam
-
ThreatsDay Bulletin: Pixel Zero-Click, Redis RCE, China C2s, RAT Ads, Crypto Scams & 15+ Stories
Most of this week’s threats didn’t rely on new tricks. They relied on familiar systems behaving exactly as designed, just in the wrong hands. Ordinary files, routine services, and trusted workflows were enough to open doors without forcing them.What stands out is how little friction attackers now need. Some activity focused on quiet reach and…
-
NDSS 2025 Dissecting Payload-Based Transaction Phishing On Ethereum
Authors, Creators & Presenters: Zhuo Chen (Zhejiang University), Yufeng Hu (Zhejiang University), Bowen He (Zhejiang University), Dong Luo (Zhejiang University), Lei Wu (Zhejiang University), Yajin Zhou (Zhejiang University) PAPER Dissecting Payload-Based Transaction Phishing On Ethereum In recent years, a more advanced form of phishing has arisen on Ethereum, surpassing early-stage, simple transaction phishing. This new…
-
Don’t click on the LastPass ‘create backup’ link – it’s a scam
Phishing campaign tries to reel in master passwords First seen on theregister.com Jump to article: www.theregister.com/2026/01/21/lastpass_backup_phishing_campaign/
-
How to Get Scammed (by DPRK Hackers). Walking through a scam workflow
Tags: scamFirst seen on thesecurityblogger.com Jump to article: www.thesecurityblogger.com/how-to-get-scammed-by-dprk-hackers-walking-through-a-scam-workflow/
-
Peruvian Loan Scam Harvests Cards and PINs via Fake Applications
Loan phishing operation in Peru is stealing card info by impersonating financial institutions First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/loan-scam-harvests-cards-pins/
-
Greek police arrest scammers using fake cell tower hidden in car trunk
A vehicle search uncovered a mobile computing system hidden in the trunk and connected to a roof-mounted transmitter disguised as a shark-fin antenna. First seen on therecord.media Jump to article: therecord.media/greek-police-arrest-scammers-using-hidden-cell-towers
-
OpenAI für Scam-Mails missbraucht
Cyberkriminelle entwickeln ihre Methoden stetig weiter und nutzen dabei zunehmend Funktionen vertrauenswürdiger Plattformen aus. Aktuelle Analysen des Sicherheitsunternehmens Kaspersky zeigen, dass Einladungsfunktionen der OpenAI Plattform missbraucht werden, um betrügerische E Mails zu verbreiten. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/openai-scam-mails-missbraucht
-
Facebook tech support scams on the rise: How cybercriminals are turning your feed into a trap
<div cla Facebook may feel like a safe place to connect, but scammers are increasingly using its ads, posts, and messages to deceive users. Here’s how cybercriminals are turning your feed into a gateway for fraud and what you can do to stay protected. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/facebook-tech-support-scams-on-the-rise-how-cybercriminals-are-turning-your-feed-into-a-trap/
-
$12B Scam Market Tudou Guarantee Shuts Down
Telegram-Based Marketplace Closes After Prince Group Founder’s Arrest. Telegram marketplace Tudou Guarantee, which processed over $12 billion in fraud transactions, has ceased operations following the arrest of Prince Group chairman Chen Zhi, who was extradited to China in January. Elliptic said it was the third-largest illicit marketplace of all time. First seen on govinfosecurity.com Jump…
-
$12B Scam Market Tudou Guarantee Shuts Down
Telegram-Based Marketplace Closes After Prince Group Founder’s Arrest. Telegram marketplace Tudou Guarantee, which processed over $12 billion in fraud transactions, has ceased operations following the arrest of Prince Group chairman Chen Zhi, who was extradited to China in January. Elliptic said it was the third-largest illicit marketplace of all time. First seen on govinfosecurity.com Jump…
-
Scam Marketplace Tudou Guarantee Shutters Telegram Ops
A notorious marketplace for fraud, Tudou Guarantee, appears to have closed its public Telegram groups First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/scam-market-tudou-guarantee-shut/
-
Google Chrome now lets you turn off on-device AI model powering scam detection
Google Chrome now lets you delete the local AI models that power the “Enhanced Protection” feature, which was upgraded with AI capabilities last year. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/artificial-intelligence/google-chrome-now-lets-you-turn-off-on-device-ai-model-powering-scam-detection/
-
New PayPal Scam Sends Verified Invoices With Fake Support Numbers
Hackread.com exclusive: Scammers are using verified PayPal invoices to launch callback phishing attacks. Learn how the “Alexzander” invoice bypasses Google filters. First seen on hackread.com Jump to article: hackread.com/paypal-scam-verified-invoices-fake-support-numbers/
-
Microsoft disrupts RedVDS cybercrime platform behind $40 million in scam losses
Microsoft and law enforcement partners took down a popular cybercriminal subscription service called RedVDS that was used to enable more than $40 million in fraud losses in the United States alone. First seen on therecord.media Jump to article: therecord.media/microsoft-redvds-cybercrime-scam
-
Impersonation Fraud Drives Record $17bn in Crypto Losses
Chainalysis estimates $17bn will be lost to crypto scams in 2025 as AI takes hold First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/impersonation-fraud-record-17bn/
-
Cyber Fraud Takes the Lead: What the Shift Away From Ransomware Signals for Enterprises
A new global assessment shows that cyber fraud has overtaken ransomware as the top cybersecurity concern for business leaders, driven by a sharp rise in phishing, business email compromise, and identity-based scams, according to the World Economic Forum. While ransomware continues to pose a serious risk, this shift highlights a critical change in attacker behavior.…
-
Service Providers Help Pig Butcher Scammers Scale Operations: Infoblox
Service providers are delivering infrastructure, tools, and expertise and giving rise to pig-butchering-as-a-service models that are enabling the Asian crime syndicates running massive investment and romance scams to through industrial-scale compounds around the world at a larger scale and for a lower cost. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/service-providers-help-pig-butcher-scammers-scale-operations-infoblox/
-
More than 40 countries impacted by North Korea IT worker scams, crypto thefts
Eleven countries led a session at the UN headquarters in New York centered around a 140-page report released last fall that covered North Korea’s extensive cyber-focused efforts to fund its nuclear and ballistic weapons program. First seen on therecord.media Jump to article: therecord.media/40-countries-impacted-nk-it-thefts-united-nations
-
Betterment confirms data breach after wave of crypto scam emails
U.S. digital investment advisor Betterment confirmed that hackers breached its systems and sent fake crypto-related messages to some customers. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/betterment-confirms-data-breach-after-wave-of-crypto-scam-emails/
-
Betterment confirms data breach after wave of crypto scam emails
U.S. digital investment advisor Betterment confirmed that hackers breached its systems and sent fake crypto-related messages to some customers. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/betterment-confirms-data-breach-after-wave-of-crypto-scam-emails/
-
Convincing LinkedIn comment-reply tactic used in new phishing
Scammers are flooding LinkedIn posts with fake “reply” comments that appear to come from the platform, warning of bogus policy violations and urging users to click external links. Some even abuse LinkedIn’s official lnkd.in shortener, making the phishing attempts harder to spot. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/convincing-linkedin-comment-reply-tactic-used-in-new-phishing/
-
AI-Powered Crypto Scams Drive Record $17B Losses in 2025
Research by Chainalysis reveals that AI-powered impersonation tactics have exploded by an unprecedented 1,400% year-over-year. The post AI-Powered Crypto Scams Drive Record $17B Losses in 2025 appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-2025-crypto-scam-losses/
-
Phishing Scams Exploit Browserthe-Browser Attacks to Steal Facebook Passwords
Cybersecurity researchers issue warning over a surge in attacks designed to trick Facebook users into handing over login credentials First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/phishing-scams-exploit-browser/
-
Betterment Customer Data Exposed in Crypto Scam Hack
The breach occurred through a compromised third-party marketing platform, allowing attackers to impersonate the trusted financial service. The post Betterment Customer Data Exposed in Crypto Scam Hack appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-betterment-crypto-scam-hack/
-
Spanish police disrupt Black Axe, arrest alleged leaders in action spanning four cities
The criminal organization specialized in business email compromise scams and generated billions of dollars in criminal proceeds annually from many small-scale operations, officials said. First seen on cyberscoop.com Jump to article: cyberscoop.com/black-axe-disruption-arrests-spain/
-
Fake Employee Reports Spread Guloader and Remcos RAT Malware
Scammers are using fake October 2025 performance reviews to trick staff into installing Guloader and Remcos RAT malware. Learn how to identify this threat and protect your personal data from remote hackers. First seen on hackread.com Jump to article: hackread.com/fake-employee-reports-guloader-remcos-rat-malware/
-
Web3 Dev Environments Hit by Fake Interview Software Scam
Web3 and cryptocurrency developers are facing a new wave of targeted attacks driven not by cold outreach, but by carefully engineered “inbound” traps. Instead of chasing victims through phishing emails or unsolicited Telegram messages, threat actors are now building fake companies, posting appealing job openings, and waiting for high-value targets to walk into their infrastructure.…
-
Criminal Networks Get a Boost from New Pig-Butchering-asService Toolkits
The scam industry has undergone massive transformations over the past decade. The cliché image of the once-iconic Nigerian prince duping Westerners from a local cybercafé is now obsolete. One of the key drivers fueling the ongoing sha zhu pan (pig butchering) epidemic is the emergence of service providers supplying criminal networks with the tools, infrastructure,…

