Security Awareness Training Blog

Cybercrime Blog

We report on the latest trends in cybercrime to help you stay informed and aware of what the current threat landscape looks like.

NSA's Monstermind Aims To Detect And Stop Cyber Attacks Instantly

WIRED magazine had the scoop, by directly talking to Edward Snowden recently. An NSA program known as MonsterMind, currently under development, is being designed to detect and stop cyber ...
Continue Reading

Tenn. Firm Sues Bank Over $327K Cyberheist

Continue Reading

Ransomware: The next 12 months

Since September 2013, ransomware has become vicious and has inspired several copycats. At the time of this writing, summer 2014, the very first strains of second-generation ransomware ...
Continue Reading

Security Companies Help Users Recover Files Locked by CryptoLocker

Researchers at FireEye and Fox-IT have managed to obtain the private encryption keys that the malware uses to lock files.
Continue Reading

Scam Of The Week: "For Sale: CyberVor False Sense Of Security"

Are the credentials of one of your users among the stash of the 1.2 billion stolen passwords? A small Internet security company will tell you for just a 120 bucks per year. Their ...
Continue Reading

Heads-Up: Second Generation Ransomware In The Wild

Last week, Fedor Sinitisyn, blogger and security researcher for Kaspersky posted something worrisome. He reported that the Angler Exploit Kit was delivering a new second-generation type ...
Continue Reading

DELL Warns Against Social Engineering

Dell has its own news site called Tech Page One. A few days ago they had a new article that started with: "Human errors that aid social engineers. The weakest links in computer networks ...
Continue Reading

Phishing Scam Of The Week: "Transportation Manager"

Unscrupulous eastern European cyber mafias are preying on U.S. workers that try to make ends meet and look for a second (or third) job. This is not a new scam, but it is sticking up its ...
Continue Reading

New Cellphone Phishing Hack Pulls Data Out Of Computer Over Air

This is from a few weeks ago, and I only just got to it. Hackers can exfiltrate data via a cellphone and no longer need the Internet to invade and control a system, Ben Gurion University ...
Continue Reading

$440,000 Cyberheist Victim Now Needs To Pay Bank's Legal Fees

Talk about adding insult to injury. Brian Krebs has the update, he's been reporting on the legal gray area when cyber mafia steals hundreds of thousands out of a company's bank account. ...
Continue Reading

Scam Of The Week: eBay Password Reset Phishing Emails

Ok, unless you were on an Internet-free vacation (fat chance); you have heard that eBay managed to lose all its 145 million credentials.
Continue Reading

CyberheistNews Vol 4, # 20 CryptoLocker Goes Spear-Phishing

CyberheistNews Vol 4, # 20
Continue Reading

Elite Hackers Develop Cybercrime Attack Kits As Market Matures

Today, in the Wall Street Journal, an article told the story of a software product called blackshades that experts call a "rat" (Remote Access Trojan) which was commercially sold to cyber ...
Continue Reading

Scam Of The Week: Fake Purchase Orders

This could be a very expensive scam to fall for, so keep on reading.
Continue Reading

NISTs New Approach to Cybersecurity Standards

Applying Engineering Values to IT Security. The National Institute of Standards and Technology is developing new cybersecurity standards based on the same principles engineers use to ...
Continue Reading

Are You Being Targeted By Hot Foreign Spies?

Ready to be hit upon by the likes of Anna Chapman? MI5 in the UK warned that foreign spy agencies are targeting IT workers within big organizations as a means of gaining privileged access ...
Continue Reading

Malware Only Lives For A Few Hours

Rob Rachwald and Zheng Bu at FireEye came up with some interesting observations: "At FireEye, we look at hundreds of malware samples daily, and, in a recent talk at RSA Conference, Zheng ...
Continue Reading

Shocker Symantec Admits That Antivirus Is Dead

An article in the Wall Street Journal of May 5, 2014 summarized what I have been talking about these last few years. 25 years ago, Symantec was one of the first IT security companies to ...
Continue Reading

Phishing campaign uses VoIP to steal card data

An Eastern European Cyber Mafia has been found to run a multi-year campaign that targets small U.S. banks and credit unions with a sophisticated VoIP phishing scheme (aka vishing) to ...
Continue Reading

Verizon's New 2014 Data Breach Report: Summary

In IT, we are subject to help desk tickets and putting out fires. The problem with this is that most of these are short-term fixes. It is usually about last week's downtime, today's ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews