When Low-Tech Hacks Cause High-Impact Breaches

Credit to Author: BrianKrebs| Date: Mon, 27 Feb 2023 04:15:15 +0000

Web hosting giant GoDaddy made headlines this month when it disclosed that a multi-year breach allowed intruders to steal company source code, siphon customer and employee login credentials, and foist malware on customer websites. Media coverage understandably focused on GoDaddy’s admission that it suffered three different cyberattacks over as many years at the hands of the same hacking group.  But it’s worth revisiting how this group typically got in to targeted companies: By calling employees and tricking them into navigating to a phishing website.

Read more

Interpol’s First Light operation smashes crime on a global scale

Credit to Author: Christopher Boyd| Date: Thu, 16 Jun 2022 13:24:46 +0000

Interpol’s annual First Light project has gone global for the second time. We take a look at the results, findings, and trends.

The post Interpol’s First Light operation smashes crime on a global scale appeared first on Malwarebytes Labs.

Read more

The Original APT: Advanced Persistent Teenagers

Credit to Author: BrianKrebs| Date: Wed, 06 Apr 2022 17:55:38 +0000

Many organizations are already struggling to combat cybersecurity threats from ransomware purveyors and state-sponsored hacking groups, both of which tend to take days or weeks to pivot from an opportunistic malware infection to a full blown data breach. But few organizations have a playbook for responding to the kinds of virtual “smash and grab” attacks we’ve seen recently from LAPSUS$, a juvenile data extortion group whose short-lived, low-tech and remarkably effective tactics are putting some of the world’s biggest corporations on edge.

Read more

Alexa and Google Home phishing apps demonstrated by researchers

Credit to Author: Lisa Vaas| Date: Wed, 23 Oct 2019 12:43:57 +0000

The researchers’ “Smart Spies” apps showed how Amazon Alexa and Google Home users could be exposed to vishing and eavesdropping.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/2-76soYbixo” height=”1″ width=”1″ alt=””/>

Read more

Robocalls now flooding US phones with 200m calls per day

Credit to Author: Lisa Vaas| Date: Tue, 17 Sep 2019 11:24:15 +0000

According to a new report, nearly 30% of all US calls placed in the first half of 2019 were garbage, as in, nuisance, scam or fraud calls.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/UDmV3nOCTag” height=”1″ width=”1″ alt=””/>

Read more

Scammers deepfake CEO’s voice to talk underling into $243,000 transfer

Credit to Author: Lisa Vaas| Date: Thu, 05 Sep 2019 14:38:02 +0000

The voice had the hint of a German accent and the same “melody” that an employee recognized in his boss’s voice.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/_coDs7IxGNM” height=”1″ width=”1″ alt=””/>

Read more