Recent Posts

Recent Blog Posts

The PhishLabs Blog

Health Insurance Hack, Firefox Bugs, Internet Satellite Hijacking, and more | TWIC - September 11, 2015

Posted by Lindsey Havens on Sep 11, '15

Each week, the PhishLabs team posts The Week in Cybercrime (TWIC) to recap noteworthy cybercrime articles and reports (open source).

Read More

Topics: Phishing, PhishLabs, Hacker Tools, The Week in Cybercrime, ATO, Account Takeover, Data Breach, Hacked, Spear Phishing

Did FFIEC guidelines curb account takeover? Survey says…

Posted by Lindsey Havens on Sep 9, '15

In a recent study conducted by Info Security Media Group (ISMG), respondents indicated that, despite efforts to comply with updated authentication guidance set forth by the Federal Financial Institutions Examination Council (FFIEC), account takeover (ATO) has not decreased. In fact, 71 percent of respondents said that account takeover incidents either stayed the same or increased over the past year.

Read More

Topics: Fraud, ATO, Account Takeover

Going Beyond FFIEC Guidance, Lizard Squad DDoS, Big Hack Blackmail, and more | TWIC - September 4, 2015

Posted by Lindsey Havens on Sep 4, '15

Each week, the PhishLabs team posts The Week in Cybercrime (TWIC) to recap noteworthy cybercrime articles and reports (open source).

Read More

Topics: Phishing, Malware, PhishLabs, Hacker Tools, The Week in Cybercrime, Account Takeover, Ransomware, Hacked, Spear Phishing, Spear Phishing Protection

DDoS Bank Attacks, Ashley Madison BEC Targeting, Dark Web Vulnerability, and more | TWIC - August 28, 2015

Posted by Lindsey Havens on Aug 28, '15

Each week, the PhishLabs team posts The Week in Cybercrime (TWIC) to recap noteworthy cybercrime articles and reports (open source).

Read More

Topics: Phishing, PhishLabs, DDoS, Hacker Tools, The Week in Cybercrime, Account Takeover, Hacked, Spear Phishing, Spear Phishing Protection, BEC

Financially-Motivated Targeting, White Hat Ethics, 15,000 Chinese Arrests, and more | TWIC - August 21, 2015

Posted by Lindsey Havens on Aug 21, '15

Each week, the PhishLabs team posts The Week in Cybercrime (TWIC) to recap noteworthy cybercrime articles and reports (open source).

Read More

Topics: Phishing, Malware, PhishLabs, DDoS, Hacker Tools, The Week in Cybercrime, Account Takeover, Hacked, Spear Phishing, Spear Phishing Protection, Arrests

Employee Targeting, Malicious ROM images, Darkhotel goes Global, and more | TWIC - August 7, 2015

Posted by Lindsey Havens on Aug 14, '15

Each week, the PhishLabs team posts The Week in Cybercrime (TWIC) to recap noteworthy cybercrime articles and reports (open source).

Read More

Topics: Phishing, Malware, PhishLabs, Phish Kit, Hacker Tools, The Week in Cybercrime, Account Takeover, Hacked, Spear Phishing, Spear Phishing Protection, Breach

Cloud Security, Malvertising on the Rise, Pentagon Hack, and more | TWIC - August 7, 2015

Posted by Lindsey Havens on Aug 7, '15

Each week, the PhishLabs team posts The Week in Cybercrime (TWIC) to recap noteworthy cybercrime articles and reports (open source).

Read More

Topics: Phishing, Malware, Hacker Tools, The Week in Cybercrime, Account Takeover, Brand Abuse Lure, Hacked

JP Morgan Arrests, Android Malware, Healthcare Threats, and more | TWIC - July 24, 2015

Posted by Lindsey Havens on Jul 24, '15

Each week, the PhishLabs team posts The Week in Cybercrime (TWIC) to recap noteworthy cybercrime articles and reports (open source).

Read More

Topics: Phishing, Malware, Hacker Tools, The Week in Cybercrime, Phone Fraud, Account Takeover, Android, Hacked, Patch, Arrests

Flash Player Patches, Darkode Takedown, Disguised CryptoWalls, and more | TWIC - July 17, 2015

Posted by Lindsey Havens on Jul 17, '15

Each week, the PhishLabs team posts The Week in Cybercrime (TWIC) to recap noteworthy cybercrime articles and reports (open source).

Read More

Topics: Phishing, DDoS, Exploit, Adobe, The Week in Cybercrime, Account Takeover, Android, Hacked, Patch, Arrests

Big data, big [illicit] business

Posted by Lindsey Havens on Jan 9, '15

True to form, cybercriminals not only stole funds, personally identifiable information, credentials, bank account information , health records and more in 2014 but they also poached legitimate business tactics and strategies to bolster illicit operations. In a recent interview with Dell SecureWorks’ David Shear, BankInfoSecurity’s, Tracy Kitten uncovers trends in the underground cybercrime market. Most notable is the growing trend of “Cybercrime-as-a-Service” or (CaaS).

In 2015, we can expect to see a continued increase in the number of underground operations offering full-service cybercrime. Just as in any marketplace, competition continues to rise in the underground resulting in the constant evolution of services and new features. Some key attributes of leading suppliers of CaaS closely resemble those of a valid business, including:

  • Superior customer service
  • Tutorials and training
  • Satisfaction guaranteed
  • Value-added data (personally identifiable information documentation such as a driver’s license or a utility bill to enable authentication)
  • Reputation for delivering quality services

Data reigns in the underground

Read More

Topics: Fraud, Account Takeover, Cybercrime-as-a-Service

   

What's this all about?

The PhishLabs Blog is where we share our insights and thoughts on cybercrime and online fraud.

Recent Posts

Upcoming Events

Calendar_Mock_

Posts by Topic

see all