PayPal Scam Exploits New Address Feature to Send Out Phishing Emails
A sophisticated phishing scam has been discovered abusing PayPal and other services, using a recently added feature to trick victims into granting cybercriminals access to their devices. The attackers exploit this new "gift addresses" feature by adding a fake address to the victim's account, sending them an email claiming a purchase was made, and then attempting to install malware to gain control over their computer. If left unchecked, the scammers can steal data, make wire transfers, and other malicious activities.
This phishing scam highlights the ongoing cat-and-mouse battle between cybercriminals and online service providers, as attackers continue to exploit vulnerabilities in legitimate platforms.
What measures will PayPal take to prevent similar phishing scams in the future, and how can users protect themselves from falling victim to such attacks?
Security researchers spotted a new ClickFix campaign that has been abusing Microsoft SharePoint to distribute the Havoc post-exploitation framework. The attack chain starts with a phishing email, carrying a "restricted notice" as an .HTML attachment, which prompts the victim to update their DNS cache manually and then runs a script that downloads the Havoc framework as a DLL file. Cybercriminals are exploiting Microsoft tools to bypass email security and target victims with advanced red teaming and adversary simulation capabilities.
This devious two-step phishing campaign highlights the evolving threat landscape in cybersecurity, where attackers are leveraging legitimate tools and platforms to execute complex attacks.
What measures can organizations take to prevent similar ClickFix-like attacks from compromising their SharePoint servers and disrupting business operations?
A company's executives received an extortion letter in the mail claiming to be from BianLian ransomware group, demanding payment of $250,000 to $350,000 in Bitcoin within ten days. However, cybersecurity researchers have found that the attacks are likely fake and the letter's contents bear no resemblance to real ransom notes. Despite this, the scammers are using a new tactic by sending physical letters, potentially as part of an elaborate social engineering campaign.
This unexpected use of snail mail highlights the adaptability and creativity of cybercriminals, who will stop at nothing to extort money from their victims.
As cybersecurity threats continue to evolve, it's essential for organizations to remain vigilant and develop effective strategies to mitigate the impact of such campaigns.
Vishing attacks have skyrocketed, with CrowdStrike tracking at least six campaigns in which attackers pretended to be IT staffers to trick employees into sharing sensitive information. The security firm's 2025 Global Threat Report revealed a 442% increase in vishing attacks during the second half of 2024 compared to the first half. These attacks often use social engineering tactics, such as help desk social engineering and callback phishing, to gain remote access to computer systems.
As the number of vishing attacks continues to rise, it is essential for organizations to prioritize employee education and training on recognizing potential phishing attempts, as these attacks often rely on human psychology rather than technical vulnerabilities.
With the increasing sophistication of vishing tactics, what measures can individuals and organizations take to protect themselves from these types of attacks in the future, particularly as they become more prevalent in the digital landscape?
Almost half of people polled by McAfee say they or someone they know has received a text or phone call from a scammer pretending to be from the IRS or a state tax agency, highlighting the growing threat of tax-related scams. The scammers use various tactics, including social media posts, emails, text messages, and phone calls, to target potential victims, often with promising fake refunds. To protect themselves, individuals can take steps such as filing their taxes early, monitoring their credit reports, watching out for phishing attacks, and being cautious of spoofed websites.
The escalating nature of tax scams underscores the importance of staying vigilant and up-to-date on cybersecurity best practices to prevent falling prey to these sophisticated schemes.
As AI-generated phishing emails and deepfake audios become more prevalent, it is crucial to develop effective strategies to detect and mitigate these types of threats.
LinkedIn's InMail notification emails have been spoofed by cybercriminals to distribute malware. The emails are laced with phishing tactics, including fake companies, images, and notifications from legitimate platforms. Researchers at Cofense Intelligence warn that the attackers are using a ConnectWise Remote Access Trojan (RAT) to gain unauthorized control over systems.
The alarming fact is that malicious emails like these have found their way into people's inboxes, despite LinkedIn's robust security measures, raising concerns about the effectiveness of current email authentication protocols.
What measures can individuals and organizations take to better protect themselves against these types of phishing attacks, particularly those who rely heavily on professional networks like LinkedIn for business?
Threat actors are exploiting misconfigured Amazon Web Services (AWS) environments to bypass email security and launch phishing campaigns that land in people's inboxes. Cybersecurity researchers have identified a group using this tactic, known as JavaGhost, which has been active since 2019 and has evolved its tactics to evade detection. The attackers use AWS access keys to gain initial access to the environment and set up temporary accounts to send phishing emails that bypass email protections.
This type of attack highlights the importance of proper AWS configuration and monitoring in preventing similar breaches, as misconfigured environments can provide an entry point for attackers.
As more organizations move their operations to the cloud, the risk of such attacks increases, making it essential for companies to prioritize security and incident response training.
The E-ZPass smishing scam is targeting people with urgent toll demands, sending fraudulent text messages that threaten fines and license revocation if payment is not made promptly. The scammers aim to capture personal information by directing victims to a fake link, which can result in identity theft. In reality, it's the scammers who are seeking financial gain.
This scam highlights the vulnerability of individuals to phishing attacks, particularly those that exploit emotional triggers like fear and urgency.
What role do social media platforms play in disseminating and perpetuating smishing scams, making them even more challenging to prevent?
Recently, news surfaced about stolen data containing billions of records, with 284 million unique email addresses affected. Infostealing software is behind a recent report about a massive data collection being sold on Telegram, with 23 billion entries containing 493 million unique pairs of email addresses and website domains. As summarized by Bleeping Computer, 284 million unique email addresses are affected overall.
A concerning trend in the digital age is the rise of data breaches, where hackers exploit vulnerabilities to steal sensitive information, raising questions about individual accountability and responsibility.
What measures can individuals take to protect themselves from infostealing malware, and how effective are current security protocols in preventing such incidents?
YouTube has issued a warning to its users about an ongoing phishing scam that uses an AI-generated video of its CEO, Neal Mohan, as bait. The scammers are using stolen accounts to broadcast cryptocurrency scams, and the company is urging users not to click on any suspicious links or share their credentials with unknown parties. YouTube has emphasized that it will never contact users privately or share information through a private video.
This phishing campaign highlights the vulnerability of social media platforms to deepfake technology, which can be used to create convincing but fake videos.
How will the rise of AI-generated content impact the responsibility of tech companies to protect their users from such scams?
A broad overview of the four stages shows that nearly 1 million Windows devices were targeted by a sophisticated "malvertising" campaign, where malware was embedded in ads on popular streaming platforms. The malicious payload was hosted on platforms like GitHub and used Discord and Dropbox to spread, with infected devices losing login credentials, cryptocurrency, and other sensitive data. The attackers exploited browser files and cloud services like OneDrive to steal valuable information.
This massive "malvertising" spree highlights the vulnerability of online systems to targeted attacks, where even seemingly innocuous ads can be turned into malicious vectors.
What measures will tech companies and governments take to prevent such widespread exploitation in the future, and how can users better protect themselves against these types of attacks?
The modern-day cyber threat landscape has become increasingly crowded, with Advanced Persistent Threats (APTs) becoming a major concern for cybersecurity teams worldwide. Group-IB's recent research points to 2024 as a 'year of cybercriminal escalation', with a 10% rise in ransomware compared to the previous year, and a 22% rise in phishing attacks. The "Game-changing" role of AI is being used by both security teams and cybercriminals, but its maturity level is still not there yet.
This move signifies a growing trend in the beauty industry where founder-led companies are reclaiming control from outside investors, potentially setting a precedent for similar brands.
How will the dynamics of founder ownership impact the strategic direction and innovation within the beauty sector in the coming years?
Google has introduced AI-powered features designed to enhance scam detection for both text messages and phone calls on Android devices. The new capabilities aim to identify suspicious conversations in real-time, providing users with warnings about potential scams while maintaining their privacy. As cybercriminals increasingly utilize AI to target victims, Google's proactive measures represent a significant advancement in user protection against sophisticated scams.
This development highlights the importance of leveraging technology to combat evolving cyber threats, potentially setting a standard for other tech companies to follow in safeguarding their users.
How effective will these AI-driven tools be in addressing the ever-evolving tactics of scammers, and what additional measures might be necessary to further enhance user security?
If you avoid exposing your regular email address, you reduce the risk of being spammed. Temporary email services offer a solution to this problem by providing short-term addresses that can be used on untrustworthy websites without compromising your primary inbox. These services allow users to receive verification codes or messages within a limited time frame before expiring.
The use of temporary email services highlights the growing need for online security and anonymity in today's digital landscape, where users must balance convenience with data protection concerns.
Will the increasing popularity of temporary email services lead to more innovative solutions for protecting user privacy and safeguarding against malicious activities?
The average scam cost the victim £595, report claims. Deepfakes are claiming thousands of victims, with a new report from Hiya detailing the rising risk and deepfake voice scams in the UK and abroad, noting how the rise of generative AI means deepfakes are more convincing than ever, and attackers can leverage them more frequently too. AI lowers the barriers for criminals to commit fraud, and makes scamming victims easier, faster, and more effective.
The alarming rate at which these scams are spreading highlights the urgent need for robust security measures and education campaigns to protect vulnerable individuals from falling prey to sophisticated social engineering tactics.
What role should regulatory bodies play in establishing guidelines and standards for the use of AI-powered technologies, particularly those that can be exploited for malicious purposes?
Google has introduced two AI-driven features for Android devices aimed at detecting and mitigating scam activity in text messages and phone calls. The scam detection for messages analyzes ongoing conversations for suspicious behavior in real-time, while the phone call feature issues alerts during potential scam calls, enhancing user protection. Both features prioritize user privacy and are designed to combat increasingly sophisticated scams that utilize AI technologies.
This proactive approach by Google reflects a broader industry trend towards leveraging artificial intelligence for consumer protection, raising questions about the future of cybersecurity in an era dominated by digital threats.
How effective will these AI-powered detection methods be in keeping pace with the evolving tactics of scammers?
Vishing has become a prevalent tactic for cybercriminals, with 442% increase in attacks compared to the first half of 2024, according to CrowdStrike's latest report. The security firm tracked at least six campaigns involving attackers posing as IT staffers to convince employees to set up remote support sessions or share sensitive information. Help desk social engineering tactics are often used, where scammers create a sense of urgency to trick victims into divulging credentials.
The growing sophistication of vishing attacks highlights the need for employees and organizations to be vigilant in recognizing potential threats, particularly those that exploit human weakness rather than software vulnerabilities.
As vishing continues to surge, what steps can governments and regulatory bodies take to establish clear guidelines and enforcement mechanisms to protect consumers from these types of attacks?
YouTube creators have been targeted by scammers using AI-generated deepfake videos to trick them into giving up their login details. The fake videos, including one impersonating CEO Neal Mohan, claim there's a change in the site's monetization policy and urge recipients to click on links that lead to phishing pages designed to steal user credentials. YouTube has warned users about these scams, advising them not to click on unsolicited links or provide sensitive information.
The rise of deepfake technology is exposing a critical vulnerability in online security, where AI-generated content can be used to deceive even the most tech-savvy individuals.
As more platforms become vulnerable to deepfakes, how will governments and tech companies work together to develop robust countermeasures before these scams escalate further?
In the realm of cybersecurity, the emphasis on strong passwords often overshadows the critical importance of protecting one's email address, which serves as a digital identity. Data breaches and the activities of data brokers expose email addresses to threats, making them gateways to personal information and potential scams. Utilizing email aliases can offer a practical solution to mitigate these risks, allowing individuals to maintain privacy while engaging online.
This perspective highlights the necessity of re-evaluating our online behaviors, treating personal information with the same caution as physical identity documents to enhance overall security.
What innovative measures can individuals adopt to further safeguard their digital identities in an increasingly interconnected world?
The energy company EDF gave a man's mobile number to scammers, who stole over £40,000 from his savings account. The victim, Stephen, was targeted by fraudsters who obtained his name and email address, allowing them to access his accounts with multiple companies. Stephen reported the incident to Hertfordshire Police and Action Fraud, citing poor customer service as a contributing factor.
The incident highlights the need for better cybersecurity measures, particularly among energy companies and financial institutions, to prevent similar scams from happening in the future.
How can regulators ensure that companies are taking adequate steps to protect their customers' personal data and prevent such devastating losses?
Researchers have uncovered a network of fake identities created by North Korean cybercriminals, all looking for software development work in Asia and the West. The goal is to earn money to fund Pyongyang's ballistic missile and nuclear weapons development programs. By creating these fake personas, hackers are able to gain access to companies' back ends, steal sensitive data, or even get paid.
This latest tactic highlights the evolving nature of cybercrime, where attackers are becoming increasingly sophisticated in their methods of deception and social engineering.
Can companies and recruiters effectively identify and prevent such scams, especially in the face of rapidly growing online job boards and freelance platforms?
Google's security measures have been breached by fake spyware apps, which are hidden in plain sight on the Google Play Store. These malicious apps can cause immense damage to users' devices and personal data, including data theft, financial fraud, malware infections, ransomware attacks, and rootkit vulnerabilities. As a result, it is crucial for smartphone users to take precautions to spot these fake spyware apps and protect themselves from potential harm.
The lack of awareness about fake spyware apps among smartphone users underscores the need for better cybersecurity education, particularly among older generations who may be more susceptible to social engineering tactics.
Can Google's Play Store policies be improved to prevent similar breaches in the future, or will these types of malicious apps continue to evade detection?
Google is working on a new feature called Shielded Email, which aims to protect users from unwanted emails by creating an alias address when signing up for new accounts. This feature uses Google's autofill features to automatically forward emails sent to the alias address to the user's main email address, allowing them to easily block or unsubscribe from unwanted emails. By using a separate alias address, Shielded Email provides a buffer between users and service providers, making it harder for bad actors to track their online activity.
The introduction of Shielded Email highlights the growing concern over digital privacy and security, as more people become aware of the potential risks associated with sharing personal information across multiple platforms.
How will this new feature impact the overall trend of users taking steps to protect their digital footprints, particularly in light of increasing concerns about data collection and online surveillance?
The recent arrest of two cybercriminals, Tyrone Rose and Shamara Simmons, has shed light on a sophisticated scheme to steal hundreds of concert tickets through a loophole in StubHub's back end. The pair, who have been charged with grand larceny, computer tampering, and conspiracy, managed to resell about 900 tickets for shows including Taylor Swift, Adele, and Ed Sheeran for around $600,000 between June 2022 and July 2023. This brazen exploit highlights the ongoing threat of ticket scams and the importance of vigilance in protecting consumers.
The fact that these cybercriminals were able to succeed with such a simple exploit underscores the need for greater cybersecurity measures across online platforms, particularly those used for buying and selling tickets.
What additional steps can be taken by StubHub and other ticketing websites to prevent similar exploits in the future, and how can consumers better protect themselves from falling victim to these types of scams?
Two cybercriminals have been arrested and charged with stealing over $635,000 worth of concert tickets by exploiting a backdoor in StubHub's systems. The majority of the stolen tickets were for Taylor Swift's Eras Tour, as well as other high-profile events like NBA games and the US Open. This case highlights the vulnerability of online ticketing systems to exploitation by sophisticated cybercriminals.
The use of legitimate platforms like StubHub to exploit vulnerabilities in ticketing systems underscores the importance of robust security measures to prevent such incidents.
How will this incident serve as a warning for other online marketplaces and entertainment industries, and what steps can be taken to enhance security protocols against similar exploitation?
Amnesty International has uncovered evidence that a zero-day exploit sold by Cellebrite was used to compromise the phone of a Serbian student who had been critical of the government, highlighting a campaign of surveillance and repression. The organization's report sheds light on the pervasive use of spyware by authorities in Serbia, which has sparked international condemnation. The incident demonstrates how governments are exploiting vulnerabilities in devices to silence critics and undermine human rights.
The widespread sale of zero-day exploits like this one raises questions about corporate accountability and regulatory oversight in the tech industry.
How will governments balance their need for security with the risks posed by unchecked exploitation of vulnerabilities, potentially putting innocent lives at risk?