Tag: social-engineering
-
Russian Hackers Using ClickFix Fake CAPTCHA to Deploy New LOSTKEYS Malware
The Russia-linked threat actor known as COLDRIVER has been observed distributing a new malware called LOSTKEYS as part of an espionage-focused campaign using ClickFix-like social engineering lures.”LOSTKEYS is capable of stealing files from a hard-coded list of extensions and directories, along with sending system information and running processes to the attacker,” the Google Threat First…
-
‘Eine Krisensituation erfordert klare Entscheidungen”
Tags: ai, awareness, ciso, cyersecurity, group, incident response, nis-2, phishing, risk, risk-management, social-engineering, training, vulnerabilityVolker Buß, CISO bei der Merck Group: “Das Wichtigste bei einem Cybervorfall ist, Ruhe zu bewahren.” Merck GroupDie Merck Gruppe beschäftigt weltweit rund 63.000 Mitarbeiter. Wie behalten Sie den Überblick in Sachen Cybersicherheit?Buß: Zum Glück haben wir ein sehr engagiertes Team, das in alle Richtungen den Überblick behält. Unser Security Operations Center bildet dabei das…
-
Retail Sector in Scattered Spider Crosshairs
Don’t Fall for Easy Social Engineering Traps, Advises Mandiant. The teenage hackers behind Scattered Spider tend to launch attacks in waves against specific sectors – and it may be the retail sector’s turn. High street British mainstays Marks & Spencer, Co-op and Harrods have all felt a wave of incidents. First seen on govinfosecurity.com Jump…
-
Over 2,800 Hacked Websites Targeting MacOS Users with AMOS Stealer Malware
Tags: apple, blockchain, crypto, cyber, cybersecurity, macOS, malware, password, social-engineering, technologyCybersecurity researcher has uncovered a massive malware campaign targeting MacOS users through approximately 2,800 compromised websites. The operation, dubbed >>MacReaper,
-
Hackers Exploit Fake Chrome Error Pages to Deploy Malicious Scripts on Windows Users
Hackers are leveraging a sophisticated social engineering technique dubbed >>ClickFix>fix
-
How cybercriminals exploit psychological triggers in social engineering attacks
Most attacks don’t start with malware; they begin with a message that seems completely normal, whether it comes through email, a phone call, or a chat, and that is exactly … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/05/06/social-engineering-human-behavior/
-
Fake resumes targeting HR managers now come with updated backdoor
Tags: attack, awareness, backdoor, best-practice, ciso, control, cybersecurity, data, defense, detection, email, endpoint, espionage, exploit, government, infection, infrastructure, intelligence, jobs, linkedin, malicious, microsoft, mitigation, network, password, phishing, radius, scam, soc, social-engineering, spear-phishing, theft, threat, windows%temp%\ieuinit.inf and writes obfuscated commands to it, including a Windows batch file.When this code is executed, Microsoft WordPad is automatically launched in a ploy to distract the user, who is meant to believe the promised resumé is being opened. The batch script will then covertly launch the legitimate Windows utility %windir%\system32\ie4uinit.exe, which in turn executes the commands from…
-
LUMMAC.V2 Stealer Uses ClickFix Technique to Deceive Users into Executing Malicious Commands
The LUMMAC.V2 infostealer malware, also known as Lumma or Lummastealer, has emerged as a significant threat, employing the cunning >>ClickFix
-
12 most innovative launches at RSA 2025
Tags: ai, attack, awareness, ciso, cloud, communications, compliance, control, cyber, cybersecurity, data, deep-fake, detection, email, endpoint, finance, framework, governance, healthcare, identity, insurance, intelligence, login, malicious, network, nist, open-source, openai, phishing, privacy, RedTeam, resilience, risk, risk-analysis, risk-management, saas, service, siem, social-engineering, tactics, threat, tool, training, update, zero-day, zero-trustAuditBoard: AI governance solution: AuditBoard announced its AI governance solution, designed to help organizations accelerate AI risk management and promote responsible AI adoption. The solution is designed to streamline AI use case intake, review, and approval processes, establish a centralized repository for approved AI models, and dynamically link AI risks to vendors, assets, and controls…
-
Threat Actors Attacking U.S. Citizens Via Social Engineering Attack
Tags: attack, cyber, cybercrime, cybersecurity, email, exploit, malicious, phishing, social-engineering, tactics, threatAs Tax Day on April 15 approaches, a alarming cybersecurity threat has emerged targeting U.S. citizens, according to a detailed report from Seqrite Labs. Security researchers have uncovered a malicious campaign exploiting the tax season through sophisticated social engineering tactics, primarily phishing attacks. These cybercriminals are deploying deceptive emails and malicious attachments to steal sensitive…
-
Was ist Vishing?
Tags: social-engineeringVishing ist eine Form des Social-Engineerings, bei der Angreifer versuchen, sensible Informationen telefonisch zu erlangen. Der Begriff setzt sich aus ‘Voice” (Stimme) und ‘Phishing” zusammen. Beim Vishing nutzen Betrüger das Telefon als Angriffsvektor. Sie geben sich beispielsweise als Bankmitarbeiter, IT-Support oder Behördensprecher aus und täuschen Dringlichkeit oder Autorität vor, um ihr Ziel zur Herausgabe vertraulicher Daten…
-
Doppel Secures $35M Series B to Expand AI-Powered Social Engineering Defense Platform
First seen on scworld.com Jump to article: www.scworld.com/news/doppel-secures-35m-series-b-to-expand-ai-powered-social-engineering-defense-platform
-
Strategien für eine sichere digitale Zukunft von der RSA
Tags: ai, ciso, conference, cyberattack, cyersecurity, google, governance, government, malware, openai, phishing, resilience, risk, social-engineering, threat, tool, vulnerabilityAuf der RSA Conference wurden zentrale Strategien diskutiert, wie Unternehmen KI sicher und wirkungsvoll einsetzen können.Künstliche Intelligenz (KI) wird künftig eine noch größere Rolle für CISOs spielen. Angesichts Herausforderungen wie dem Fachkräftemangel nutzen viele Unternehmen bereits KI in der Cybersicherheit. Deren sicherer und strategischer Einsatz ist jedoch komplex. Die RSA Conference in San Francisco bot…
-
Microsoft sets all new accounts passwordless by default
Microsoft announced that all new accounts will be >>passwordless by default>passwordless by default,>As part of this simplified UX, we’re changing the default behavior for new accounts. Brand new Microsoft […] First seen on securityaffairs.com Jump to article: securityaffairs.com/177339/security/microsoft-sets-all-new-accounts-passwordless-by-default.html
-
10 insights on the state of AI security from RSA Conference
Tags: access, ai, attack, automation, awareness, chatgpt, ciso, conference, cyber, cyberattack, cybersecurity, data, defense, detection, endpoint, exploit, framework, google, government, intelligence, malicious, malware, penetration-testing, phishing, resilience, risk, skills, social-engineering, strategy, threat, tool, vulnerability -
Cyberkriminelle und staatliche Akteure Engineering-Kampagne ClickFix findet immer mehr Opfer
Tags: social-engineeringFirst seen on security-insider.de Jump to article: www.security-insider.de/social-engineering-angriffswelle-clickfix-a-0f1d35d5c67d7e064b5bc9f74f6de5de/
-
The state of intrusions: Stolen credentials and perimeter exploits on the rise, as phishing wanes
Tags: access, apt, attack, authentication, awareness, backdoor, breach, business, china, cloud, control, corporate, credentials, crypto, cyber, cyberespionage, cybersecurity, data, email, espionage, exploit, extortion, finance, fraud, group, Hardware, incident response, infection, ivanti, jobs, law, lockbit, malicious, malware, mandiant, mfa, middle-east, mobile, network, north-korea, oracle, password, phishing, ransom, ransomware, RedTeam, russia, social-engineering, software, theft, threat, tool, trainingFinancial gains, data theft, dwell time: Of the intrusions Mandiant investigated in 2024, 35% were financially motivated, with ransomware alone representing 21% of all intrusions, according to the company’s data.Financial gains were realized via data theft for the purpose of extortion, cryptomining, cryptocurrency theft, business email compromise, and cases in which attackers monetized their access…
-
Cybercriminals switch up their top initial access vectors of choice
Tags: access, ai, attack, awareness, breach, ciso, credentials, cyberattack, cybercrime, cyberespionage, cybersecurity, data, defense, email, espionage, healthcare, leak, login, malicious, malware, password, phishing, ransom, ransomware, risk, social-engineering, supply-chain, switch, tactics, training, update, vulnerabilityRansomware fiends target smaller businesses: The percentage of breaches involving third parties doubled to 30%, highlighting the risks associated with supply chain and partner ecosystems.The prevalence of ransomware attacks also increased, turning up as a factor in 44% of analyzed breaches (compared to 37% in 2024). Ransomware had a disproportionate impact of on small and…
-
North Korean Hackers Use Russian IP Infrastructure
Tags: breach, crypto, hacker, infrastructure, Internet, jobs, north-korea, russia, scam, social-engineeringVoid Dokkaebi Campaigns Using Russia for Cryptocurrency Theft. North Korean hackers look north toward Russia for the internet infrastructure behind the many online scams that Pyongyang has built to funnel stolen cash into the rouge nation. Void Dokkaebi hackers participate in the North Korean scam of social engineering IT job seekers. First seen on govinfosecurity.com…
-
Attackers Capitalize on Mistakes to Target Schools
Verizon’s 2025 Data Breach Investigations Report highlighted dire, but not new, trends in the education sector. Without more help, faculty and staff continue to fall for social engineering campaigns and make simple security errors. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/attackers-capitalize-mistakes-target-schools
-
State Sponsored Hackers now Widely Using ClickFix Attack Technique in Espionage Campaigns
Tags: attack, cyber, cybercrime, espionage, hacker, iran, korea, north-korea, russia, social-engineeringThe state-sponsored hackers from North Korea, Iran, and Russia have begunp deploying the ClickFix social engineering technique, traditionally associated with cybercriminal activities, into their espionage operations. This shift was first documented by Proofpoint researchers over a three-month period from late 2024 into early 2025 where these actors employed ClickFix in routine activities. The Emergence of…
-
Staats-Hacker machen sich ClickFix-Technik zunutze
Staatlich unterstützte Hackergruppen übernehmen zunehmend neue Social-Engineering-Techniken, die ursprünglich von kommerziell motovierten Cyberkriminellen entwickelt wurden. So wird ClickFix inzwischen verstärkt auch von nordkoreanischen, iranischen und russischen Gruppen in Spionagekampagnen eingesetzt. Diese Methode nutzt gefälschte Fehlermeldungen oder vermeintliche Sicherheitswarnungen, um ahnungslose Nutzer dazu zu bringen, bösartige PowerShell-Befehle manuell in ihr System einzugeben. Diese direkte Interaktion der……
-
State-Sponsored Hackers Weaponize ClickFix Tactic in Targeted Malware Campaigns
Multiple state-sponsored hacking groups from Iran, North Korea, and Russia have been found leveraging the increasingly popular ClickFix social engineering tactic to deploy malware over a three-month period from late 2024 through the beginning of 2025.The phishing campaigns adopting the strategy have been attributed to clusters tracked as TA427 (aka Kimsuky), TA450 (aka MuddyWater, First…
-
Exploiting SMS: Threat Actors Use Social Engineering to Target Companies
Exploiting SMS: Threat Actors Use Social Engineering to Target Companies First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/04/exploiting-sms-threat-actors-use-social-engineering-to-target-companies/
-
Hackers Target Investors Through Fraud Networks to Steal Financial Data
Hackers have launched sophisticated schemes designed to defraud investors and steal their financial data. Utilizing digital platforms, encrypted messaging apps, and crypto transactions, these criminals exploit the rise of online investment platforms to conduct their fraudulent activities. Fraudulent networks employ social engineering techniques to deceive investors, promising high returns with minimal risk. These schemes typically…
-
In a Social Engineering Showdown: AI Takes Red Teams to the Mat
That AI has gotten much more proficient in social engineering is a revelation that’s not surprising, but still sets alarm bells ringing. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/04/in-a-social-engineering-showdown-ai-takes-red-teams-to-the-mat/
-
KI-gestützte Cyberabwehr: Wie Sophos die KI zur Stärkung der IT-Sicherheit einsetzt
Gerade im Zeitalter von Ransomware-as-a-Service, Social Engineering und hochspezialisierten Angriffen auf kritische Infrastrukturen kann der strategische Einsatz von KI den entscheidenden Unterschied machen First seen on infopoint-security.de Jump to article: www.infopoint-security.de/ki-gestuetzte-cyberabwehr-wie-sophos-die-ki-zur-staerkung-der-it-sicherheit-einsetzt/a40497/
-
New Malware ResolverRAT Targets Healthcare and Pharma Sectors
ResolverRAT targets healthcare organizations using advanced evasion techniques and social engineering First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/malware-resolverrat-targets/
-
You’re always a target, so it pays to review your cybersecurity insurance
Tags: access, ai, attack, authentication, best-practice, cisa, cloud, control, cyber, cybersecurity, data, detection, edr, email, endpoint, google, Hardware, insurance, intelligence, Internet, login, malicious, malware, mfa, monitoring, network, password, phishing, phone, risk, scam, service, smishing, social-engineering, software, training, update, vpn, zero-trustMFA is a requirement most insurers insist upon: For example, they mandated that all remote access, including VPN access and all remote monitoring and management (RMM) solutions, such as remote desktop protocol (RDP), be protected by multifactor authentication (MFA), mandating that it should also be enforced on email access and any remote access to critical…
-
Threat Actors Use ‘Spam Bombing’ Technique to Hide Malicious Motives
Darktrace researchers detailed spam bombing, a technique in which threat actors bombard targets with spam emails as a pretense for activity like social engineering campaigns. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/threat-actors-spam-bombing-malicious-motives

