Security Awareness Training Blog

Phishing Blog

Learn about current phishing techniques, notable campaigns and attacks, what to watch out for 'in the wild', and more.

“Europol Calling” (Not Necessarily)

Scammers are impersonating Europol with fraudulent phone calls in an attempt to steal personal and financial information, according to Kristina Ohr at Avast. The German Federal Criminal ...
Continue Reading

Info Stealer Malware Vidar Uses Microsoft Help Files to Launch Attacks

It appears that the use of Microsoft CHM files is gaining popularity, and from the way this latest attack works, it’s a rather ingenious and flexible method that could become more ...
Continue Reading

Simple Facebook Phishing Scam Takes an Unexpected Turn to Throw Potential Victims Off the Scent

Rather than take the usual path of sending an email and linking to a spoofed logon page, this attack takes a different set of actions that at first make no sense but may actually be ...
Continue Reading

Cisco: Web 3.0 Will be the Next Frontier for Social Engineering and Phishing Attacks

A look at what makes up Web 3.0 and how it may be used includes insight into what kinds of cyberattacks may plague it, as cybercriminals look for new profitable opportunities.
Continue Reading

Cost of Internet Crimes in 2021 Increase 64% Exceeding $6.9 Billion

New data from the FBI’s Internet Crime Complaint Center (IC3) shows a massive increase in the cost of internet crimes, with phishing and BEC topping the list.
Continue Reading

Obvious Phishbait, But Someone Will Bite

A widespread phishing scam is circulating in Facebook Messenger, according to Jeff Parsons at Metro. The phishing messages simply contain the words, “Look what I found,” along with a ...
Continue Reading

FBI Warns of Phishing Attacks Targeting Election Officials

The FBI has issued a Private Industry Notification warning of phishing emails designed to steal login credentials from election officials. The Bureau believes these attacks will increase ...
Continue Reading

Mobile Device Usage Have Led to Security Incidents in Nearly Half of Organizations

The shift in devices used by today’s workforce has resulted in increases in cybersecurity concerns and incidents, despite a majority of orgs with defined BYOD programs in place.
Continue Reading

Email Conversation Hacking to Distribute Malware

Researchers at Intezer warn that attackers are hijacking email conversations to distribute the IcedID banking Trojan. This technique makes the phishing emails appear more legitimate and ...
Continue Reading

Repertoire of Ukraine Charity Phishing Scams

Scammers continue to exploit the crisis in Ukraine, according to researchers at Bitdefender. Over the past week, the researchers believe the fraudsters have adjusted their tactics in ...
Continue Reading

Initial Access Broker Group Relies on Social Engineering

Google’s Threat Analysis Group (TAG) describes a cybercriminal group it calls “EXOTIC LILY” that acts as an initial access broker for numerous financially motivated threat actors, ...
Continue Reading

Number of Phishing Attacks Hits an All-Time High in 2021, Tripling That of Early 2020

New data from the Anti-Phishing Working Group shows cybercriminals are stepping on the gas, focusing phishing attacks on credential theft and response-based scams.
Continue Reading

Phishing Attack-Turned-Wire Fraud Case Sees a Win for the Policyholder

In an unusual turn of events, a recent court decision sided with the policyholder, despite specific policy language that probably should have favored the insurer.
Continue Reading

QakBot Banking Trojan Evolves and Now Takes Over Email Conversations to Spread Malware

As if stealing all your credentials, cookies, and email wasn’t bad enough, this new version of QakBot inserts itself into your emails, impersonating you to gain access to more victims.
Continue Reading

Phishing Scam with Fraudulent Invoice Costs City of Fresno Over $600,000

This simple invoice scam appears to be a part of a much broader campaign targeting municipalities, posing as existing subcontractors.
Continue Reading

Exploiting Trust in reCAPTCHA

Researchers at Avanan warn that attackers are using reCAPTCHAs on their phishing sites to avoid detection by security scanners.
Continue Reading

SMBs Are 350% More Likely to Experience Social Engineering Attacks Via Phishing

New data shows phishing, social engineering, and impersonation dominate as cybercriminals are becoming more frequent and successful with their attacks.
Continue Reading

Chameleons Phish, Too

One of the challenges cyber criminals face is that their scams often have a relatively short shelf-life. Once they’ve been used, the gaff is quickly blown, and the scammers hope to ...
Continue Reading

KnowBe4 Named a Leader in The Forrester Wave for Security Awareness and Training Solutions

We’re thrilled to announce that KnowBe4 has been named a Leader in The Forrester WaveTM : Security Awareness and Training Solutions, Q1 2022 report based on our current offering, strategy ...
Continue Reading

New Phishing Method Uses VNC to Bypass MFA Measures and Gives Cybercriminals Needed Access

Despite cloud vendors like Google detecting reverse proxies or man-in-the-middle (MiTM) attacks and halting logons to thwart malicious actions, a new method easily gains access.
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews