Each week, the PhishLabs team posts The Week in Cybercrime (TWIC) to recap noteworthy cybercrime articles and reports (open source).
The Anti-Phishing Working Group (APWG) reports in its new Phishing Activity Trends Report that the number of phishing sites in the first quarter of 2014 grew 10.7 percent over the previous quarter. The APWG detected an average of 41,738 new phishing attacks per month in the first quarter, resulting in the second-highest number of phishing attacks ever recorded in a first quarter.
- Bank-Targeting Brobot Is Back (Forbes)
Brobot, a powerful botnet specializing in attacks against American financial institutions, appears to be back in action after a year's hiatus. But this time, its operator appears to be unknown.
- Microsoft Darkens 4MM Sites in Malware Fight (Krebs on Security)
In its latest bid to harness the power of the U.S. legal system to combat malicious software and cybercrooks, Microsoft convinced a Nevada court to grant the software giant authority over nearly two dozen domains belonging to No-IP.com, a company that provides dynamic domain name services. Microsoft was supposed to filter out the traffic flowing to and from the affected 18,400+ hostnames and allow the remaining, harmless traffic to flow through to its rightful destination, but that did not appear to be occurring, leaving millions of Web sites down.
- POS Vendor Warns of Restaurant Data Breach (Bank Info Security)
Following on the heels of P.F. Chang's data breach, a remote-access attack on a point-of-sale vendor may have resulted in the exposure of payment card transactions conducted at Dairy Queen, Buffalo Wild Wings and other restaurants throughout the northwestern United States.
Spam e-mails making the rounds in Germany are delivering banking malware identified as EMOTET, a financial threat that is beginning to make its way over to the United States, according to researchers from Trend Micro. The spam e-mails delivering EMOTET mostly involve banking transfers and shipping invoices.