Security Awareness Training Blog

Phishing Blog

Learn about current phishing techniques, notable campaigns and attacks, what to watch out for 'in the wild', and more.

A Banking Trojan Goes Phishing

Roaming Mantis has drawn notoriety as a banking Trojan. Its criminal controllers, however, have recently given it some new functionality: phishing and cryptomining. The criminals have ...
Continue Reading

Scam Of The Week: GDPR Phishing Attack With Apple Flavor / Royal Wedding

Social engineering follows seasonal patterns. It's also connected to major events. We see this every year with holiday-themed phishing attacks between Thanksgiving and New Year's Day.
Continue Reading

Phishing and pretexting represent 93% of social attack-based breaches

A good article in Forbes that takes another dive into the new 2018 Verizon Data Breach Investigations Report.
Continue Reading

[Heads-up] New Attack Blindsides Microsoft Office 365 Anti-Phishing Filter And Blacklists

Phishers have found a way of moving the malicious URLs in their emails past Office 365's protections. The security company Avanan says they've observed criminals using a tag in the HTML ...
Continue Reading

Police Dept Loses 10 Months of Work to Ransomware. Gets Infected a Second Time!

Bleepingcomputer reported: "Ransomware has infected the servers of the Riverside Fire and Police department for the second time in a month. The first ransomware infection took place on ...
Continue Reading

Does Gmail's New 'Confidential Mode' Make Phishing Easier?

Gmail's new confidential mode lets its users create "expiration dates" for emails, or require recipients to provide an SMS passcode. (And Google also claims they've removed the option to ...
Continue Reading

HMRC warns of new wave of UK phishing scams

Rosie Murray West at the Financial Times reported: "Taxpayers are being targeted by a new wave of phishing scams linked to the financial calendar, HM Revenue & Customs has warned. ...
Continue Reading

The history and derivation of the word phishing...

The word "phishing" can't be found in Chaucer or Shakespeare. It is a homophone of "fishing". But why "ph" instead of "f"? Many English words of Greek origin transliterate "φ" (phi) as ...
Continue Reading

[Heads-up] New Exploit Hacks LinkedIn 2-factor Auth. See This Kevin Mitnick VIDEO

OK, here is something really scary. KnowBe4's Chief Hacking Officer Kevin Mitnick now and then calls me with some chilling news. This time, Kuba Gretzky, a white hat hacker friend of ...
Continue Reading

Scam Of The Week: Phishing Attack Uses GDPR As Bait

Attackers know that companies are sending a lot of emails to customers about GDPR—and that makes them prime opportunity for phishing attacks. With the looming GDPR May 25 deadline almost ...
Continue Reading

Q1 2018 Top Clicked Phishing Email Subjects [INFOGRAPHIC]

This is the second year we've published quarterly results of the most-clicked phishing email subjects across a few categories. We separate the data into subjects related to social media ...
Continue Reading

Chinese Cyber Spies Focus On Spear Phishing... YOU!

Catalin Cimpanu at Bleepingcomputer reported: "Chinese cyber spies are evolving their tactics, focusing on IT staffers, relying more and more on spear phishing instead of malware, and ...
Continue Reading

Cylance: "Phishing and drive-by downloads lead infection methods."

The most common infection vectors are still email phishing and drive-by downloads according to the latest threat report from AI security specialist Cylance. The report provides a ...
Continue Reading

Gone Phishing: Travelers Claims Plan Doesn’t Cover Cyber Losses

Daniel R. Stoller at Bloomberg Law had an excellent observation about the risks of phishing related to general crime policies. Here is a short excerpt and the whole article is warmly ...
Continue Reading

"It can't hurt to open one little attachment, can it?"

Brad Haan sent me this riot cartoon:
Continue Reading

PhishLabs Reports That Credential Phishing Has Shifted To The Enterprise

Why is credentials phishing moving from consumers to the enterprise, just like ransomware has done in the last 2 years? The answer might surprise you. Elliot Volkman at the PhishLabs ...
Continue Reading

Phishing threats still dwarf vulnerabilities and zero-days

Rob Wright at SearchSecurity wrote: "Proofpoint research shows that while phishing attacks now require victims to take more steps, the success rate for such attacks hasn't declined and ...
Continue Reading

Gone Phishing: Employer Faces Liability for Mistakenly Disclosing W-2 Forms to Scammer

Attorneys Zuckerman Spaeder noted on JDSUPRA: "When employers are caught off guard, they can face not only the loss of their own assets, but also liability to their employees. For ...
Continue Reading

Scam Of The Week: World's Largest Phishing Botnet Grows Evasive

The notorious Necurs botnet is one of the oldest and largest spam and phishing delivery systems in existence. It controls millions of machines that the criminal botmasters use to send ...
Continue Reading

Researchers discover next generation phishing kit

Researchers at Check Point and CyberInt, have discovered a new generation of phishing kit that is readily available on the Dark Web. The new kit, compiled and offered by a criminal whose ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews