Recent Posts

Recent Blog Posts

The PhishLabs Blog

Social Media Platforms Latest Channels used to Leak Sensitive Data

Posted by Jessica Ellis on Jun 2, '20

Threat actors are using social media accounts to expose and sell data that has been compromised. While information found on many of these platforms has traditionally been disclosed by enterprises and individuals with intent, cyber criminals are taking information acquired by means of scams and data breaches and promoting their sale on various social platforms not always monitored by security teams.  
Read More

Topics: Social Media Threats

Threat Actors Impersonate Brands on Social Media for Malicious Purposes

Posted by Jessica Ellis on May 28, '20

With more than 2.95 billion people now estimated to use social media, an organization’s online presence directly relates to the satisfaction of its customers, as well as its profits. False or misleading images or comments connected with a brand on online platforms can swiftly impact the reputation or even financials of an otherwise successful company. 
Read More

Topics: Social Media Threats

Reporting Cyber Threats: Executives at Risk

Posted by Elliot Volkman on May 21, '20

Across the cybersecurity industry, white papers and reports typically highlight high-level trends related to cyber threats. However, what is often overlooked is a more granular analysis that focuses on individuals within an organization. More specifically, the high-value targets that threat actors focus much of their attention on.

Read More

Topics: Executive Monitoring, Email Intelligence & Response

COVID-19 Phishing Update: File Sharing Services Abused to Steal Credentials

Posted by Jessica Ellis on May 19, '20

As enterprise workforces continue to transition to remote environments, online file sharing and cloud storage tools are becoming a frequent, if not necessary means of collaboration. While abusing these types of platforms is nothing new to threat actors, the lures they use are now taking advantage of the novel coronavirus. The two examples below demonstrate how. 
Read More

Topics: COVID-19

COVID-19 Phishing Update: Threat Actors on Twitter Want You to Pay for Your Stolen Passwords

Posted by Jessica Ellis on May 14, '20

Cyber criminals are using COVID-19 to manipulate users on Twitter and steal funds through payment applications. Our latest example demonstrates how victims are being targeted with fake credential dumps.
Read More

Topics: COVID-19

COVID-19 Phishing Update: BEC Lures use Pandemic to Enhance Attacks

Posted by Jessica Ellis on May 8, '20

Threat actors are using the novel coronavirus to add credibility in recent Business Email Compromise (BEC) attacks. Below are three examples of how they are doing it. 
Read More

Topics: COVID-19

COVID-19 Phishing Update: Money Mule Scams Use Remote Opportunities to Entice Victims

Posted by Jessica Ellis on May 5, '20

As job losses grow due to the coronavirus pandemic, cybercriminals are taking advantage of the situation to recruit individuals into money mule scams. Below are two examples that reference work-from-home opportunities. 
Read More

Topics: COVID-19

COVID-19 Phishing Update: Scammers Impersonating Financial Institutions on Instagram

Posted by Jessica Ellis on May 1, '20

Threat actors are using the novel coronavirus to impersonate accounts on social media. The example below targets members of a credit union. 
Read More

Topics: COVID-19

COVID-19 Phishing Update: Money-Flipping Schemes Promise Coronavirus Cash

Posted by Jessica Ellis on Apr 28, '20

Threat actors are using social media to engage in money-flipping scams abusing the novel coronavirus. The two examples below demonstrate how they are doing it.

Read More

Topics: COVID-19

COVID-19 Phishing Update: Threat Actors Abusing Utility Concerns

Posted by Jessica Ellis on Apr 24, '20

In response to the financial difficulties resulting from COVID-19, many utilities have announced policy changes to suspend disconnects and provide relief to customers. As a result, many people are uncertain about what will happen should they be unable to pay their utility bills during the pandemic. As our latest example shows, this uncertainty is being exploited by threat actors. 

Read More

Topics: COVID-19

What's this all about?

The PhishLabs Blog is where we share our insights and thoughts on cybercrime and online fraud.

Recent Posts

Subscribe to Email Updates

Posts by Topic

see all