International law enforcement agencies arrested hundreds in what authorities say is the largest crack-down on against illicit drugs over dark web, also revealing
International law enforcement agencies arrested hundreds in what authorities say is the largest crack-down on against illicit drugs over dark web, also revealing
GovInfoSecurity
Compliance Twitter
Cybercriminals are using fake online Amazon gift cards to distribute the Dridex banking Trojan.
Cybercriminals are targeting online shoppers in the U.S. and Western Europe with fake Amazon gift cards that deliver the the Dridex banking Trojan, the security firm Cybereason reports.
Since the campaign began earlier this month, the attackers have targeted thousands of victims in the U.S. and Western European countries, where Amazon is a popular shopping destination and has local websites, according to Cybereason researchers. 2020, for obvious reasons, is a year where consumers changed their shopping habits towards doing most of their shopping online, the researchers note. The campaign uses legitimate-looking emails, icons, and naming conventions to lure victims into downloading malicious attachments.
BankInfoSecurity Twitter
Cybercriminals are using fake online Amazon gift cards to distribute the Dridex banking Trojan.
Cybercriminals are targeting online shoppers in the U.S. and Western Europe with fake Amazon gift cards that deliver the the Dridex banking Trojan, the security firm Cybereason reports.
Since the campaign began earlier this month, the attackers have targeted thousands of victims in the U.S. and Western European countries, where Amazon is a popular shopping destination and has local websites, according to Cybereason researchers. 2020, for obvious reasons, is a year where consumers changed their shopping habits towards doing most of their shopping online, the researchers note. The campaign uses legitimate-looking emails, icons, and naming conventions to lure victims into downloading malicious attachments.
Get Permission
IBM Trusteer reports that a hacking group is using mobile emulators to spoof banking customers mobile devices and steal millions of dollars from banks in the U.S. and Europe.
Although the first wave of attacks using these mobile emulators has been stopped and the banks affected by the hacking have been notified, a second wave of attempts is likely already underway, says Limor Kessem, executive security adviser with IBM Security.
Mobile emulators, which can mimic the activities of mobile devices, typically are used by developers to test applications and features on a wide array of device types.