Cyber Security Today, April 7, 2021 – Hundreds of hundreds of stolen reward playing cards available on the market, and…

by akoloy

Hundreds of hundreds of stolen reward playing cards available on the market, and beware of those WeTransfer and LinkedIn scams.

Welcome to Cyber Security Today. It’s Wednesday, April seventh. I’m Howard Solomon, contributing reporter on cybersecurity for



Online retailers are being warned to watch out of reward playing cards getting used to pay for on-line purchases. The playing cards could also be stolen. This comes after the cybersecurity firm Gemini Advisory this week reported that in February a risk actor auctioned off 895,000 stolen reward card numbers. They allegedly had a complete stability of $38 million. They have been apparently stolen from a now-defunct on-line market that purchased and offered undesirable reward playing cards from huge companies like AirBnB, Amazon, Target, Walmart, Marriott, Nike and others. The identical individual was promoting 330,000 credit score and debit playing cards, additionally apparently from the identical defunct web site. The Gemini researchers assume the reward and cost card info was stolen throughout a 2019 hack of {the marketplace}.

What can crooks do with these stolen reward playing cards? Try to buy beneficial items and resell them, or promote the playing cards for money to a different reward card market. As for the bank cards, they went for a comparatively low worth, most likely as a result of they have been stolen two years in the past. By now banks would have been warned and cancelled the playing cards.

Subscribers to the big file switch service referred to as We Transfer needs to be cautious dealing with sudden messages. A security firm called Avanan reported this week that crooks are sending e-mail messages to potential victims pretending to be from We Transfer and claiming recordsdata are able to be despatched to them. All they need to do is click on on a hyperlink after which enter their We Transfer username and password. The purpose of the crooks is to repeat these credentials. One tip it is a rip-off is it’s addressed to “Dear Sir/Madam.” Another is if you happen to click on on the hyperlink to obtain the recordsdata the web deal with the location it goes to will not be We Transfer.

Another phishing rip-off going round takes benefit of the knowledge you placed on LinkedIn. This one may be very focused. According to Canadian managed security services firm eSentire, it really works like this: Victims get an e-mail message that appears like a tailored job supply. That’s as a result of the crooks have taken the wording of the present job place the sufferer holds as listed on LinkedIn. So if the sufferer’s job is “senior account executive international freight,” the job supply is for that place. To be much more convincing the file identify of the connected software type is similar because the job place. However, anybody who clicks on the file will get contaminated with malware that results in their pc being compromised. The attacker can then steal any knowledge, together with passwords. Note this rip-off may be very focused at people.

Sophisticated prison teams are adopting a brand new technique to hack into banks and retailers: They’re hiring individuals. You see, cyber crooks use lots of automated assaults. But these are more and more being detected by safety software program and defensive ways. One you’re acquainted with is what’s referred to as a Captcha. It’s a way for verifying an individual and never a machine is making an attempt to log in by asking them to click on on any of a bunch of images that has a automotive, or kind in a scrambled group of digits and numbers proven on display. According to a new report by the NuData division of Mastercard, it detected indicators final yr that cooks are more and more hiring extra individuals to finish these varieties to idiot defenders. Companies are suggested to search for options that may detect this sort of trickery.

That’s it for as we speak. Links to particulars about these tales are within the textual content model of this podcast at That’s the place you’ll additionally discover my information tales aimed toward cybersecurity professionals.

Follow Cyber Security Today on Apple Podcasts, Google Podcasts or add us to your Flash Briefing in your good speaker.

Source link

You may also like

Leave a Reply

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More

We are happy to introduce our Youtube Channel

Subscribe to get curated news from various unbias news channels
Share via
Copy link
Powered by Social Snap