Hacked: Hacking Finance

Hacked: Hacking Finance


Navigation
CategoryPhishing
Featured

Bitcoin

Alleged Bitcoin Thief in Dark Web Phishing Scheme Arrested

Posted on October 6th, 2016.

A man accused of stealing bitcoin from darknet marketplace accounts after tricking users to reveal their credentials via a phishing scheme has been arrested and sees multiple marches. Michael Richo, a 34-year-old from Wallingford, Connecticut was arrested yesterday by the FBI following a criminal complaint against him. The complaint...

Featured

Breaches

How Cybercriminals Target Victims: Report Cites Top Information Resources

Posted on September 19th, 2016.

Cybercriminals, whose attacks cost organizations millions of dollars a year, do extensive research on their targets. They gather organizational and personal information before deciding which vulnerabilities to exploit. SurfWatch Labs, a security consultancy, has released a report on research resources cybercriminals use. The purpose of...

Featured

Cybersecurity

Phishing Malware Strikes One of the Largest Private Banks in India

Posted on February 24th, 2016.

Comodo Threat Research Labs, a provider of computer software and SSL digital certificates, based in Clifton, N.J., has discovered a malware attack targeting ICICI Bank, a multinational bank based in Mumbai, Maharashtra, India. The bank has more than 4,000 branches and 13,000 ATMs in India. Fake email disguised as official bank notices...

Featured

Breaches

Netflix Phishing And Malware Campaigns Build Growing Black Market

Posted on February 12th, 2016.

Netflix’s expansion to 130 new regions has boosted the market for stolen Netflix passwords, according to Symantec, a Mountain View, Calif.-based technology security company. Netflix’s streaming service is currently available in 190 regions. Symantec noted that phishing campaigns and malware are targeting Netflix users’ information. The...

Featured

Cybersecurity

The Great Cyber Bank Robbery

Posted on February 9th, 2016.

The great cyber bank robbery of 2015 reached into twenty-nine top Russian banks and is now infamously known as the “Carbanak” criminal gang. The use of long standing APT tools, and the sophisticated computer entry with spear phishing emails into bank browsers allowed invasion of malicious malware. Once the victims made a request,...

Featured

Cybersecurity

Former Nuclear Scientist Pleads Guilty To Attempting Spear Phishing U.S. Government Employees

Posted on February 5th, 2016.

Charles Harvey Eccleston, 62, a former U.S. government scientist, has pleaded guilty to a federal offense for an attempted e-mail “spear-phishing” attack in January 2015 targeting Department of Energy (DOE) employee email accounts. He pled guilty to attempted unauthorized access and intentional damage to a government computer. He also...

Featured

Breaches

Hackers Target U.S., U.K. And India Finance Employees With Trojans

Posted on January 20th, 2016.

Two families of remote-access Trojans (RATs) have infiltrated small companies in the U.S., the U.K. and India since early 2015 and have stolen money, according to Symantec, a Mountain View, Calif.-based technology security company. The attackers are using Trojan.Nancrat and Backdoor.Breut, which are publicly-available., and have stolen...

Featured

Cybersecurity

Phishing Attack Strikes LastPass; Here’s How you Avoid it

Posted on January 17th, 2016.

Users of LastPass are vulnerable to a phishing attack that requires preventive measures. Sean Cassidy, CTO at Praesidio, a cloud cyber security startup, detected that attackers can steal a user’s password, email and two-factor authentication code, which make all the user’s documents and passwords vulnerable. He described the...

Featured

Cybersecurity

WhatsApp Users Targeted By Phishing Scam

Posted on January 10th, 2016.

Emails disguised as official WhatsApp messages have been targeting users of the mobile messaging service, according to Comodo Antispam Labs (CASL), which has identified a new malware in the emails. Attackers are sending emails to distribute malware when the user clicks the message, according to CASL’s blog. Rogue email addresses are...

Featured

Business

Banks Spend Big To Fight Cybercrime, Heighten Efforts To Supervise Employee Behavior

Posted on December 22nd, 2015.

Banks are spending billions to battle cyber attacks, according to the Wall Street Journal. Much of the efforts focus on employees who unintentionally expose information to hackers. Many banks are now banning workers from using USB drives, warning them to be careful about what they post on social media, and telling them not to put “out of...

Featured

Activism

South American Hacker Group Targets Journalists And Dissidents

Posted on December 9th, 2015.

A group of hackers believed to have sent malware to an Argentine prosecutor who died mysteriously this year has been targeting South American journalists and dissidents, according to the Citizen Lab, an Internet watchdog, the Associated Press reported. The Argentine prosecutor, Alberto Nisman, made international headlines when he died...

Featured

Business

DHS Offers Free Cyber-Attack Drills For Private Companies

Posted on December 3rd, 2015.

The U.S. Department of Homeland Security (DHS) has been offering a free service to test companies’ abilities to withstand cyber attacks, according to KrebsOnSecurity. The little-known program involves penetration testing of companies’ infrastructure and has drawn both support and criticism from private security experts. Under the...

Featured

Bugs

Researcher: Even LastPass Will Be Hacked

Posted on November 19th, 2015.

It seems we live in an era where all the things will, indeed, be compromised. Creativity in hacking is at an all-time high, and for perhaps the first time, a generation exists which does not immediately associate hacking with ill-conceived films from the end of the 20th century. As further proof of this observation, Hacked offers the...

Featured

Communication

Facebook Sides With Identity Thieves

Posted on November 13th, 2015.

Open teaching is the idea that people have the right to learn regardless of their ability or circumstance. The diversity of the people they interact with makes for a much larger attack surface, with a huge range of connections on Facebook and elsewhere. But here we’ll focus on Facebook and some recent incidences. Readers may not be...

Featured

Breaches

Hackers’ Advantage Over Security Professionals: A Willingness To Share

Posted on November 9th, 2015.

One advantage hackers have over security professionals is they share information, something security professionals need to get better at, according to Matthew Rosenquist, an Intel security strategist. Rosenquist offered his assessment about the need to share information at Comptel’s Nexterday North Conference in Helsinki, according to...

Featured

Cybersecurity

XcodeGhost Malware Threatens iOS users, FireEye Warns

Posted on November 4th, 2015.

XcodeGhost malware remains a threat to iOS users, according to FireEye, the Milpitas, Calif.-based cyber security firm. In a Tuesday blog posting, FireEye noted that the threat remains despite the fact that Apple removed apps from the App Store and released more security features. The malware, despite Apple’s quick response, has been...

Featured

Cybersecurity

Dridex Malware Targets Users with a Fake IKEA Receipt

Posted on October 28th, 2015.

The developers of the infamous Dridex malware have stepped up a gear in their creative means to get around law enforcement by tailoring a new spam campaign using IKEA’s brand name. Dridex malware developers have launched a new spam campaign today by sending emails purporting to be one from IKEA, to targeted users, reports Heimdal...

Featured

Breaches

Email Spam Blackmails Ashley Madison Customers In South Australia

Posted on October 13th, 2015.

Scammers are taking advantage of the Ashley Madison hack earlier this year and are now threatening to “expose” people as cheaters if they don’t make bitcoin payments, according to South Australia police, ABC News reported. South Australia police have fielded more than a dozen reports of spam email targeting both customers and...

Featured

Cybersecurity

Cyber Warfare: The New Arms Race

Posted on October 13th, 2015.

After spending billions to build nuclear weapons, a different arms race has emerged in cyber warfare. Where the nuclear arms race pits the larger countries against each other, the cyber arms race includes a much larger number of combatants since it is open to almost anyone with cash and a computer, according to a front-page article in...

Featured

Breaches

Report: Publicly Disclosed Data Breaches are Increasing, Dramatically

Posted on October 3rd, 2015.

The 2015 Internet Organized Crime Threat Assessment (IOCTA) has revealed that the number of “publically disclosed” data breaches this year has increased significantly, leading to secondary crimes wherein the breached data is used for extortion, identity theft, fraud and other similar offences. The 2015 law enforcement-centric IOCTA...