Tag: social-engineering
-
That CISO job offer could be a ‘pig-butchering’ scam
Deepfaked interview shenanigans: What followed was three months of constant messaging, which moved from SMS messages, to conversations on WhatsApp, to a (likely) deepfaked video interview.”Other than the 15-minute interview, mostly my interaction with them was a minute here and there, and of course the necessary background research on Gemini itself as well as the…
-
Confucius Hacker Group Weaponizes Documents to Infect Windows Systems with AnonDoor Malware
The Confucius hacking group, a long-running cyber-espionage operation with suspected state-sponsored ties, has significantly evolved its attack methodologies over the past year, transitioning from document stealers like WooperStealer to sophisticated Python-based backdoors including AnonDoor malware. The December 2024 campaign demonstrated Confucius’ refined social engineering tactics, utilizing phishing emails with weaponized PowerPoint presentations (Document.ppsx) that displayed…
-
Subpoena tracking platform blames outage on AWS social engineering attack
Software maker Kodex said its domain registrar fell for a fraudulent legal order First seen on theregister.com Jump to article: www.theregister.com/2025/10/02/subpoena_tracking_platform_outage_blamed/
-
Your Service Desk is the New Attack Vector”, Here’s How to Defend It.
Service desks are prime targets. A practical, NIST-aligned workflow for help desk user verification that stops social engineering without slowing support. Learn how role- & points-based verification workflows stop attackers cold. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/your-service-desk-is-the-new-attack-vector-heres-how-to-defend-it/
-
Your Service Desk is the New Attack Vector”, Here’s How to Defend It.
Service desks are prime targets. A practical, NIST-aligned workflow for help desk user verification that stops social engineering without slowing support. Learn how role- & points-based verification workflows stop attackers cold. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/your-service-desk-is-the-new-attack-vector-heres-how-to-defend-it/
-
Warning: Beware of Android Spyware Disguised as Signal Encryption Plugin and ToTok Pro
Cybersecurity researchers have discovered two Android spyware campaigns dubbed ProSpy and ToSpy that impersonate apps like Signal and ToTok to target users in the United Arab Emirates (U.A.E.).Slovak cybersecurity company ESET said the malicious apps are distributed via fake websites and social engineering to trick unsuspecting users into downloading them. Once installed, both the spyware…
-
That innocent PDF is now a Trojan Horse for Gmail attacks
Tags: access, attack, awareness, cio, ciso, corporate, credentials, cybersecurity, defense, detection, email, endpoint, hacker, infrastructure, network, phishing, qr, ransomware, risk, social-engineering, spear-phishing, theft, threat, tool, training, zero-trustPersonal email use increases enterprise risk: Employees are increasingly accessing personal email accounts from corporate machines; it is commonplace in hybrid and remote work environments. But considering that hackers have access to easily-usable tools like MatrixPDF, experts advise enterprises to be more vigilant.CISOs and CIOs should consider opportunities to either restrict access to personal webmail…
-
Google Sheds Light on ShinyHunters’ Salesforce Tactics
Mandiant provided proactive defenses against UNC6040’s social engineering attacks that have led to several Salesforce breaches. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/google-sheds-light-shinyhunters-salesforce-tactics
-
Inside North Korea’s DeceptiveDevelopment Job Fraud, Malware Scheme
DeceptiveDevelopment blends job fraud and malware, using social engineering and insider tactics to compromise developers and crypto firms. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/news/deceptive-development-north-korea/
-
Phishing Campaign Lobs Malicious SVG Attachments at Ukraine
Government Agencies Targeted With Infostealers and Cryptomining Malware. A fake police alert is the social engineering cornerstone of an ongoing phishing campaign targeting Ukrainian government agencies, warn security researchers. They’re tracking a surge in malicious SVG file attachments, in this case leading to information-stealing and cryptocurrency-mining malware. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/phishing-campaign-lobs-malicious-svg-attachments-at-ukraine-a-29575
-
GenAI-Infrastruktur anfällig für Cyberattacken
Chatbot-Assistenten in Unternehmen sind besonders verwundbar, da sie durch Prompt-Injection-Angriffe manipuliert werden können.In einer Umfrage der Marktanalysten von Gartner berichten 29 Prozent der Cybersicherheitsverantwortlichen, dass die in ihrer Organisation verwendeten generativen KI-Anwendungen in den vergangenen zwölf Monaten Ziel eines Cyberangriffs war.Bei 32 Prozent der Unternehmen wurden gezielt Schwachstellen in der Prompt-Struktur ausgenutzt. ‘Insbesondere Chatbot-Assistenten gelten…
-
GenAI-Infrastruktur anfällig für Cyberattacken
Chatbot-Assistenten in Unternehmen sind besonders verwundbar, da sie durch Prompt-Injection-Angriffe manipuliert werden können.In einer Umfrage der Marktanalysten von Gartner berichten 29 Prozent der Cybersicherheitsverantwortlichen, dass die in ihrer Organisation verwendeten generativen KI-Anwendungen in den vergangenen zwölf Monaten Ziel eines Cyberangriffs war.Bei 32 Prozent der Unternehmen wurden gezielt Schwachstellen in der Prompt-Struktur ausgenutzt. ‘Insbesondere Chatbot-Assistenten gelten…
-
GenAI-Infrastruktur anfällig für Cyberattacken
Chatbot-Assistenten in Unternehmen sind besonders verwundbar, da sie durch Prompt-Injection-Angriffe manipuliert werden können.In einer Umfrage der Marktanalysten von Gartner berichten 29 Prozent der Cybersicherheitsverantwortlichen, dass die in ihrer Organisation verwendeten generativen KI-Anwendungen in den vergangenen zwölf Monaten Ziel eines Cyberangriffs war.Bei 32 Prozent der Unternehmen wurden gezielt Schwachstellen in der Prompt-Struktur ausgenutzt. ‘Insbesondere Chatbot-Assistenten gelten…
-
Researchers Map Links Between Major Hacker Groups: LAPSUS$, Scattered Spider, ShinyHunters
A loosely connected cybercrime supergroup is exploiting social engineering to compromise Fortune 100 organizations and government agencies. LAPSUS$, Scattered Spider, and ShinyHunters”, three of the most notorious English-speaking cybercrime groups”, have increasingly blurred their lines through shared tactics, overlapping membership, and joint public channels. From 2023 through 2025, evidence has emerged of direct collaboration on…
-
Researchers Map Links Between Major Hacker Groups: LAPSUS$, Scattered Spider, ShinyHunters
A loosely connected cybercrime supergroup is exploiting social engineering to compromise Fortune 100 organizations and government agencies. LAPSUS$, Scattered Spider, and ShinyHunters”, three of the most notorious English-speaking cybercrime groups”, have increasingly blurred their lines through shared tactics, overlapping membership, and joint public channels. From 2023 through 2025, evidence has emerged of direct collaboration on…
-
COLDRIVER APT Group Uses ClickFix to Deliver New PowerShell-Based Backdoor BAITSWITCH
Tags: apt, backdoor, blizzard, credentials, cyber, group, malware, phishing, powershell, russia, social-engineering, threat, toolRussia-linked threat actors continue targeting civil society with sophisticated social engineering campaigns and lightweight malware tools in September 2025. The campaign delivers two previously undocumented malware families: a downloader dubbed BAITSWITCH and a PowerShell-based backdoor named SIMPLEFIX. COLDRIVER, also tracked as Star Blizzard, Callisto, and UNC4057, has historically focused on credential phishing campaigns against NGOs, think tanks, journalists,…
-
COLDRIVER APT Group Uses ClickFix to Deliver New PowerShell-Based Backdoor BAITSWITCH
Tags: apt, backdoor, blizzard, credentials, cyber, group, malware, phishing, powershell, russia, social-engineering, threat, toolRussia-linked threat actors continue targeting civil society with sophisticated social engineering campaigns and lightweight malware tools in September 2025. The campaign delivers two previously undocumented malware families: a downloader dubbed BAITSWITCH and a PowerShell-based backdoor named SIMPLEFIX. COLDRIVER, also tracked as Star Blizzard, Callisto, and UNC4057, has historically focused on credential phishing campaigns against NGOs, think tanks, journalists,…
-
Hackers Using SVG Files to Deliver Malicious Payloads
A recent malware campaign making the rounds in Latin America offers a stark example of how cybercriminals are evolving and finetuning their playbooks. Victims receive emails dressed up to look as though they come from trusted institutions, warning of lawsuits or court summons. This tried-and-tested social-engineering tactic exploits urgency to trick recipients into clicking links…
-
Hackers Exploit GitHub Notifications to Launch Phishing Attacks
Tags: attack, credentials, cyber, cybercrime, cybersecurity, email, exploit, github, hacker, malicious, open-source, phishing, social-engineeringCybersecurity researchers have uncovered a new phishing campaign that exploits GitHub’s official notification system to deliver malicious links and credential-stealing payloads. By capitalizing on the trust that open-source contributors place in GitHub’s communication channels, cybercriminals are able to bypass traditional email filters and social engineering defenses. The campaign begins with an email that closely mimics…
-
Social engineering campaigns highlight the ability to exploit human behavior
A report by S&P says organizations should consider changes to strengthen cyber governance, training and awareness.; First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/social-engineering-campaigns-highlight-the-ability-to-exploit-human-behavio/760747/
-
FileFix Campaign Uses Facebook Suspension as Bait
Users Download Malware in Bid to Placate Meta. A newly surfaced FileFix social engineering campaign puts a new spin on ClickFix attacks by goading users into loading malware under the guise of reporting a wrongful account suspension to social media giant Facebook. Victims likely get sucked into the scam by following a link from a…
-
Human Factor Keeps Supply Chains Exposed to Cyberattacks
Kinly CISO Don Gibson on Overlooked Social Engineering Threats and Human Error. Supply chain attacks have evolved into a major entry point for adversaries, but their success still hinges on human error. Kinly CISO Don Gibson says organizations must strengthen processes to reduce risks from overlooked social engineering and human factors in supplier relationships. First…
-
New FileFix Steganography Campaign Spreads StealC Malware
A sophisticated new campaign that represents the first documented real-world deployment of FileFix attacks beyond proof-of-concept demonstrations. This campaign marks a significant evolution in social engineering tactics, combining advanced steganographic techniques with multilayered obfuscation to deliver the StealC information stealer through an innovative attack vector that builds upon the notorious ClickFix methodology. Researchers from Acronis’…
-
Jaguar Land Rover extends production delay following cyberattack
A hacker group linked to multiple social-engineering attacks has claimed credit for the intrusion. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/jaguar-land-rover-production-delay-cyberattack/760254/
-
New FileFix attack uses steganography to drop StealC malware
A newly discovered FileFix social engineering attack impersonates Meta account suspension warnings to trick users into unknowingly installing the StealC infostealer malware. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/new-filefix-attack-uses-steganography-to-drop-stealc-malware/
-
New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site
Cybersecurity researchers have warned of a new campaign that’s leveraging a variant of the FileFix social engineering tactic to deliver the StealC information stealer malware.”The observed campaign uses a highly convincing, multilingual phishing site (e.g., fake Facebook Security page), with anti-analysis techniques and advanced obfuscation to evade detection,” Acronis security researcher Eliad First seen on…
-
New Maranhão Stealer Targets Users Through Pirated Software and Cloud Services
A sophisticated new information-stealing malware campaign dubbed Maranhão Stealer has emerged, targeting gaming enthusiasts through malicious pirated software distributed via cloud-hosted platforms. The campaign, first identified by security researchers in May 2025, represents a concerning evolution in credential theft operations, combining social engineering tactics with advanced evasion techniques to compromise user accounts and cryptocurrency wallets. The Maranhão…
-
Neues Phishing-Framework stiehlt Login-Daten von Microsoft und Google
Tags: access, authentication, business, captcha, computing, credentials, cyberattack, email, endpoint, framework, google, infrastructure, intelligence, login, mail, mfa, microsoft, okta, passkey, password, phishing, risk, sans, service, social-engineering, spam, threat, toolDer Phishing-Dienst VoidProxy nutzt fortschrittliche Techniken wie Adversary-in-the-Middle, um Anmeldedaten zu stehlen.Das Threat-Intelligence-Team des Security-Anbieters Okta hat kürzlich eine Phishing-Kampagne namens VoidProxy entdeckt, die die Multi-Faktor-Authentifizierung (MFA) aushebelt. ‘Der Phishing-Dienst kann den Schutz mehrerer gängiger Verifizierungsmethoden, wie zum Beispiel SMS-Codes und Einmalpasswörter (OTP) aus Authentifizierungs-Apps umgehen”, mahnen die Sicherheitsspezialisten.Die Angreifer haben es demnach auf Unternehmen…
-
5 trends reshaping IT security strategies today
Tags: advisory, ai, application-security, attack, authentication, business, ciso, cloud, cyberattack, cybersecurity, data, detection, finance, identity, infrastructure, intelligence, monitoring, resilience, risk, service, social-engineering, software, strategy, supply-chain, technology, threat, tool2. AI-enabled attacks emerging to amplify business risks: CISOs now rank AI-powered cyberattacks as their top concern, cited by 80% of CISOs in a survey by Boston Consulting Group. That’s in contrast to a year ago when CISOs put AI-powered attacks at No. 4 on their list of top concerns.Adversaries are using generative AI for…
-
VoidProxy phishing-as-a-service operation steals Microsoft, Google login credentials
Tags: 2fa, access, ai, attack, authentication, awareness, breach, credentials, cybersecurity, data, defense, email, endpoint, finance, google, Hardware, infrastructure, login, mfa, microsoft, monitoring, okta, passkey, password, phishing, risk, sans, service, social-engineering, theft, tool, trainingCredentials go to adversary-in-the-middle server: If a victim is unwise enough to enter their primary Microsoft or Google credentials on the phishing page, the data is sent to VoidProxy’s core AitM proxy server. It’s here that the sophisticated, multi-layered nature of VoidProxy comes into play, says Okta.Federated users are redirected to additional second-stage landing pages…

