Skip to main content

Posts

SPF 50 Won’t Even Protect You: Email Spoofing Surge Fuels Malspam Attacks!

Cybercriminals are ramping up email spoofing attacks , faking sender addresses to bypass security filters and trick victims into engaging with malicious content . While protocols like DKIM, DMARC, and SPF were designed to prevent spoofing, attackers are now exploiting neglected domains to slip past modern defenses. Old Tricks, New Domains   Hackers are leveraging abandoned or misconfigured domains to send fraudulent emails. These domains, unused for years, lack proper DNS records, allowing them to bypass email security systems undetected . Tactics in Play   Cybercriminals are using a mix of techniques to deceive users: Phishing with QR Codes : Fake tax-related emails (mainly in Mandarin) contain QR codes linking to phishing sites designed to steal IDs and card details . Brand Spoofs : Attackers impersonate trusted companies like Amazon, Mastercard, and SMBC , tricking users into entering credentials on fraudulent login pages. Extortion Scams : Fake emails claim hackers reco...
Recent posts

DeepSeek and Destroy: AI Startup Exposes Sensitive Data in Major Security Breach!

DeepSeek , one of AI’s rising stars, just made a major security blunder—accidentally leaving a database wide open on the internet , exposing chat histories, secret keys, backend access, and more! This AI data leak raises serious concerns about security in the fast-growing AI industry. What Was Exposed?   Security researcher Gal Nagli (Wiz) discovered that DeepSeek’s ClickHouse database was completely accessible without any login , exposing: 1M+ log entries   Chat history & secret keys   Backend & API secrets   Full database control   This means hackers could have taken over DeepSeek’s systems with a simple web browser request!   Fixed… But Was It Too Late?   DeepSeek closed the security hole after Wiz reached out, but no one knows if cybercriminals got in first . The exposed database could have been a goldmine for espionage, AI manipulation, or unauthorized access to DeepSeek’s systems. AI’s Growing Pains  DeepSeek’s R1 reasoning mo...

Korea Criminals Nab a Bit of Coin: $308M Stolen by North Korean Hackers!

In a shocking revelation, Japanese and U.S. authorities have officially linked the $308 million cryptocurrency heist from DMM Bitcoin in May 2024 to North Korean cyber actors. These attackers, part of the TraderTraitor group (also known as Jade Sleet , UNC4899 , or Slow Pisces ), used sophisticated tactics to pull off this massive theft. Who’s Behind It?   TraderTraitor is notorious for: Social Engineering : Targeting multiple employees simultaneously to breach systems. Malware-Laced Apps : Disguising malicious tools as cryptocurrency-related software. Sophisticated Scams : Pretending to be recruiters or collaborators, even on platforms like GitHub . How They Did It   Targeting Employees In March 2024 , a Ginco employee (a Japanese crypto wallet company) was duped by a fake recruiter into running a malicious Python script , setting the stage for the attack. Compromising Systems With the script, attackers gained access to Ginco’s communication systems using session cookies...

Honeypot, Kettle, Hack .. INTERPOL Renames "Pig Butchering" to "Romance Baiting"

In an effort to humanize victims and hold scammers accountable,  INTERPOL  is pushing to replace the term  "pig butchering"  with  "romance baiting"  for scams involving fake cryptocurrency investments under the guise of romantic relationships. Why the Change? The term  "pig butchering" , derived from the Chinese phrase "杀猪盘" ("shā zhū pán"), has been criticized for dehumanizing victims and discouraging them from reporting these scams. "Romance baiting" , on the other hand, shifts focus to the scammers’ manipulative tactics and prioritizes respect for victims. How It Works   Originating in  China in 2016 , romance baiting scams typically follow a pattern: Building Trust : Scammers target victims via social media or dating apps, developing a fake relationship over time. Investment Push : Victims are coerced into investing in fake cryptocurrency platforms. Financial Loss : Once the money is sent, victims are left empty-handed as...

Are You Taking the Phish? Why Phishing-Resistant MFA is Critical

Cyber threats are evolving faster than ever, with ransomware and AI-driven phishing attacks reaching unprecedented levels. Traditional security methods like SMS-based One-Time Passwords (OTP) are no longer enough to protect against sophisticated tactics like Generative AI phishing and Ransomware-as-a-Service (RaaS) . According to the latest advisory from CISA and the FBI (AA24-242A) , implementing phishing-resistant multi-factor authentication (MFA) is now a critical defense. Ransomware is at Record Levels   The numbers tell the story: Ransomware payments have surged by 500% in 2024 , with incidents averaging $2 million per attack, according to Sophos’ "State of Ransomware 2024" report. Median payments skyrocketed to $20 million in 2023 , compared to $1.4 million in 2022. This explosion in ransomware success is fueled by Generative AI , enabling cybercriminals to craft phishing attacks that are nearly impossible to detect. How Generative AI is Changing Phishing   Cybercri...

FBI Creates Fake Cryptocurrency to Bust Crypto Market Scams

In an unprecedented sting operation, the FBI has taken down a massive cryptocurrency fraud network by launching its own fake crypto token, NexFundAI . This cleverly disguised operation, part of Operation Token Mirrors , exposed illegal trading schemes like wash trading and pump-and-dump scams —and scammers are paying the price. How It Worked   The FBI created NexFundAI , a fake cryptocurrency marketed as a revolutionary bridge between finance and artificial intelligence . Behind the scenes, however, it was a trap designed to attract scammers engaged in market manipulation . Wash Trading : Scammers used fake trades with their own tokens to inflate the token's price, luring unsuspecting investors into buying. Once prices peaked, the fraudsters sold off their tokens for profit, leaving regular investors with worthless assets. Who Got Caught?   The operation led to the arrest of 18 individuals and entities involved in market manipulation schemes. Among those charged were major ...

Memories, Manipulated: ChatGPT Vulnerability Exposes Long-Term Memory Risks

  A security researcher, Johann Rehberger , has uncovered a critical vulnerability in ChatGPT's long-term memory feature , potentially allowing attackers to store false information or inject harmful instructions into the system. OpenAI, which introduced this feature in February 2024 , has partially addressed the issue, but significant risks remain. What Happened?   ChatGPT’s long-term memory is designed to store user preferences, beliefs, or personal details for future interactions, enhancing personalized conversations. However, this feature also opened doors to prompt injection attacks , enabling malicious actors to: Inject false information (e.g., claiming the user is 102 years old or lives in the Matrix). Manipulate ChatGPT to guide future conversations based on these fake memories. Rehberger demonstrated this vulnerability with a proof-of-concept (PoC) exploit, revealing the potential for significant damage. Advanced Exploitation: Data Exfiltration   In a more sophi...