Welcome to our blog, where we share the latest phishing and scam news that caught our attention. From new threats to evolving tactics, we highlight the most relevant stories and insights to help you stay informed and protect yourself online.
‘Venom Spider’ Targets Hiring Managers in Phishing Scheme
A recent spear-phishing campaign orchestrated by the cybercriminal group “Venom Spider” has been targeting hiring managers and recruiters by masquerading as job applicants. These deceptive emails contain malicious attachments, such as fake résumés, which, when opened, deploy a backdoor malware known as “More_eggs.” This malware grants attackers remote access to the victim’s system, enabling data theft and further infiltration. The campaign exploits the routine responsibilities of HR professionals, who frequently open attachments from unknown sources, making them particularly vulnerable. This incident underscores the critical need for organizations to implement robust cybersecurity training and protocols, especially for departments like HR that are susceptible to such targeted attacks.
E-ZPass toll payment texts return in massive phishing wave
A recent phishing campaign has resurfaced, targeting individuals with fraudulent text messages that impersonate E-ZPass and other toll agencies. These messages claim recipients have unpaid tolls and direct them to malicious websites designed to steal personal and financial information. The FBI has reported over 2,000 complaints related to such scams since March 2024, indicating a widespread issue affecting multiple states. Authorities advise the public to avoid clicking on links in unsolicited texts, verify any outstanding tolls through official channels, and report suspicious messages to the Internet Crime Complaint Center (IC3).
Users Face New Phishing Threats From Sophisticated Scam Kit
In a recent Forbes article, cybersecurity expert Alex Vakulov highlights the emergence of a sophisticated phishing scam kit that poses significant threats to users. This kit enables cybercriminals to create nearly identical replicas of legitimate single sign-on (SSO) pages, facilitating the theft of sensitive information such as usernames, passwords, and even photo IDs. The attackers employ a combination of email, SMS, and voice phishing techniques, often impersonating customer support representatives to deceive victims into divulging their credentials. Notably, the phishing pages incorporate CAPTCHA tests to evade automated detection tools, enhancing their deceptive effectiveness. Vakulov emphasizes the importance of heightened vigilance and the adoption of robust security measures to combat these evolving phishing tactics.How to spot this new PayPal email scam
A recent phishing scam involves emails appearing to come from service@paypal.com, falsely notifying recipients of a new mailing address added to their account and unauthorized purchases, such as expensive items like MacBooks. The email urges recipients to call a provided toll-free number, where scammers instruct them to download software that installs malware, compromising personal and financial information. Notably, scammers exploit PayPal’s feature allowing multiple addresses by inserting fraudulent messages in the “Address 2” field, making the emails seem legitimate. Users are advised to avoid calling unsolicited numbers or downloading unknown software, and to verify account changes directly through PayPal’s official website.Why you should never, ever delete spam email
According to a recent PCWorld article, instead of simply deleting spam emails, it’s more effective to mark them as spam or junk. This action helps train your email client’s spam filter to better recognize and filter out unwanted messages in the future. By doing so, you contribute to the improvement of spam detection systems, reducing the likelihood of similar emails reaching your inbox.Urgent warning issued to all Netflix users over new email scam which allows hackers to steal your money
Netflix users are being alerted to a sophisticated phishing scam where AI-generated emails, mimicking official Netflix communications, falsely claim issues with billing information and prompt users to update their payment details. These emails, with subjects like “let’s tackle your payment details,” direct recipients to fake websites designed to steal personal and financial information. Users are advised to verify such requests by logging into their official Netflix account directly and to avoid clicking on unsolicited links or providing sensitive information through email.How Phished Data Turns into Apple & Google Wallets
A recent investigation by KrebsOnSecurity reveals that cybercriminals, particularly from China, are revitalizing the carding industry by converting phished payment card data into mobile wallets compatible with Apple Pay and Google Pay. These criminals deploy sophisticated phishing kits that send deceptive messages via Apple iMessage and RCS, impersonating entities like the U.S. Postal Service or toll road operators. Victims who enter their card details on these fraudulent sites inadvertently provide one-time passcodes, allowing attackers to link the stolen card information to mobile wallets on devices they control. These compromised devices, each loaded with multiple digital wallets, are then sold in bulk or used for fraudulent transactions through fake e-commerce setups. Additionally, some groups offer advanced tools, such as the “ZNFC” Android app, enabling the relay of NFC transactions globally, further facilitating unauthorized tap-to-pay purchases.