The PhishLabs Blog

The Top 9 Reasons Healthcare Organizations are a Hacker’s Best Friend

Posted by Lindsey Havens on Jan 10, '17

In recent years, healthcare organizations have been attacked with more frequency, velocity, and fervor than any other industry. IBM dubbed 2015 “the year of the healthcare breach” in their 2016 Cyber Security Intelligence Index, and if recent headlines are anything to go by 2016 wasn’t much better.

But why are healthcare organizations targeted so consistently? On the surface, gambling sites and financial institutions would seem like better targets, so what is it about healthcare organizations that threat actors find so tempting?

In the end, it all comes down to one factor: Money.

Read More

Topics: Data Breach, Ransomware, Security, Healthcare

The Growing Business of Cybercrime as a Service

Posted by Lindsey Havens on Oct 14, '16

As part of our Cyber Security Awareness Month series, we have so far explored data breaches and Business Email Compromise (BEC). These topics and tactics roll up into a more global discussion about the growing economy of cybercrime. We reported in 2015 that, as competition continues to rise in the underground marketplace, illicit operations are evolving and expanding services to offer “Cybercrime-as-a-Service” (CaaS). Let's take this opportunity to look into this business model, which continues to strengthen and grow in scope as threat vectors evolve. 

Read More

Topics: Data Breach, Cybercrime-as-a-Service, BEC, Cyber Security Awareness Month

Rewinding the Headline: Where Do Data Breaches Begin?

Posted by Lindsey Havens on Oct 12, '16

Modern threat actors devote huge amounts of time to identifying and exploring new exploits, tactics, and techniques
for circumventing security and compromising corporate networks. 
The majority of headline breaches are initiated by spear phishing attacks, and not only are they sophisticated enough to make it past most spam filters, some are able to fool even seasoned security personnel. 

Read More

Topics: Phishing, Data Breach, Spear Phishing

Does the Yahoo Breach Have You Worried About Your Online Security?


The recent news of the Yahoo breach and leak of hundreds of millions of passwords, names, dates of birth, and other
 personal information has led to headlines across the country. Understandably, given Yahoo’s popularity, people are worried. Especially as a summer dominated by news of leaks, hacks, and foreign intelligence agencies with nefarious agendas comes to an end. 

Given that reports suggest that the initial breach of this data occurred in 2014, one of the primary concerns about this type of data dump are password reuse attacks, where cybercriminals take previously compromised credentials and use them to break into accounts on other platforms where the victim used the same username/password combination.  It’s only a matter of time before criminals use the credentials leaked in the Yahoo breach to attempt to compromise other accounts, such as financial accounts or social media profiles. 

Read More

Topics: Phishing, Data Breach

New Ransonware Techniques, Prison Phone Breach, Christmas Fraud Predictions, and more | TWIC - November 13, 2015

Posted by Lindsey Havens on Nov 13, '15

Each week, the PhishLabs team posts The Week in Cybercrime (TWIC) to recap noteworthy cybercrime articles and reports (open source).

Read More

Topics: Phishing, PhishLabs, Exploit, Strategy, The Week in Cybercrime, Data Breach, Ransomware, Hacked, Breach

New Phish Kit Techniques, E-Commerce Scam Potential, Financial Extortion Increase, and more | TWIC - November 6, 2015

Posted by Lindsey Havens on Nov 6, '15

Each week, the PhishLabs team posts The Week in Cybercrime (TWIC) to recap noteworthy cybercrime articles and reports (open source).

Read More

Topics: Phishing, PhishLabs, Exploit, Strategy, Phish Kit, The Week in Cybercrime, Data Breach, Botnet, Hacked, BEC, Breach

Camera DDoS Attacks, New BEC Strategies, TalkTalk Hack Arrests, and more | TWIC - October 30, 2015

Posted by Lindsey Havens on Oct 30, '15

Each week, the PhishLabs team posts The Week in Cybercrime (TWIC) to recap noteworthy cybercrime articles and reports (open source).

Read More

Topics: Phishing, PhishLabs, DDoS, Fraud, Exploit, Strategy, The Week in Cybercrime, Data Breach, Botnet, Hacked, Spear Phishing Protection, Breach

Multiple Credit Card Breaches, Smartphone DDoS Attack, Developer Applications Targeted, and more | TWIC - October 2, 2015

Posted by Lindsey Havens on Oct 2, '15

Each week, the PhishLabs team posts The Week in Cybercrime (TWIC) to recap noteworthy cybercrime articles and reports (open source).

Read More

Topics: Phishing, Malware, DDoS, Fraud, Hacker Tools, The Week in Cybercrime, Phone Fraud, Data Breach, Hacked, Breach

Stolen Fingerprints, Cloud Security Tools, Target Breach Revealed, and more | TWIC - September 25, 2015

Posted by Lindsey Havens on Sep 25, '15

Each week, the PhishLabs team posts The Week in Cybercrime (TWIC) to recap noteworthy cybercrime articles and reports (open source).

Read More

Topics: Phishing, PhishLabs, Backdoors, Hacker Tools, The Week in Cybercrime, Data Breach, Hacked, Spear Phishing, Breach

Malware Free Hackers, Bluetooth Skimming, Charity Website Targeting, and more | TWIC - September 18, 2015

Posted by Lindsey Havens on Sep 18, '15

Each week, the PhishLabs team posts The Week in Cybercrime (TWIC) to recap noteworthy cybercrime articles and reports (open source).

Read More

Topics: Phishing, PhishLabs, Backdoors, Strategy, Hacker Tools, The Week in Cybercrime, ATO, Data Breach, Hacked

   

What's this all about?

The PhishLabs Blog is where we share our insights and thoughts on cybercrime and online fraud.

Upcoming Events

Calendar_Mock_

Posts by Topic

see all