Scams targeting elderly, what to watch out for.

Jul 26 2023

Gone Phishing Banner

Welcome to Gone Phishing, your daily cybersecurity newsletter thatโ€™s the #Israel to cybercrimeโ€™s #Palestine. Or vice versa ๐Ÿค”๐Ÿ˜‚

Todayโ€™s hottest cyber security stories:

  • โ€๐Ÿ‘ฎ FBI: Tech support scams collect cash in SHIPPING CONTAINERS

  • ๐Ÿ’ป Hackers go toe to toe with police as they swap extortion tactics

  • ๐Ÿ“œ Years old secret code reveals its fatal flaw: a backdoor ๐Ÿšช

FBI see what you did there ๐Ÿ‘€

๐Ÿ“ฐย ๐Ÿšจ FBI Warns of Surge in Tech Support Scams Targeting Elderly ๐Ÿšจย ๐Ÿ“ฐ

The FBI has issued a warning about a recent rise in tech support scams targeting older adults across the United States. Scammers are now adopting a new tactic, instructing victims to send cash hidden within magazines or similar items through shipping firms. ๐Ÿ˜ฑ

In the past, tech support scammers typically asked for money via bank transfers, cryptocurrencies, or gift cards. However, they've now changed their approach, making it even more crucial for the elderly to stay alert. ๐Ÿ˜”

These scammers use various methods like phone calls, texts, emails, and pop-up windows to pose as legitimate company representatives. They trick victims by claiming there are fraudulent activities linked to their accounts or by promising subscription refunds. ๐Ÿ˜ž

Once they've gained the victim's trust, scammers ask them to download remote access software, which gives them control over the victim's computer. They then log into the victim's bank account and deliberately deposit a larger sum of money, asking the victim to return the extra cash to avoid losing their job. ๐ŸŽฃ๐Ÿ’ป๐Ÿ’ฐ

๐Ÿ›ก๏ธ Top Tips:

  • ๐Ÿšซ Never download software at the request of an unknown individual who contacted you.

  • ๐Ÿšซ Never give control of your computer to someone you don't know.

  • ๐Ÿšซ Avoid clicking on unsolicited pop-ups, links in text messages, or email attachments. Don't call the phone number in suspicious pop-ups, texts, or emails.

  • ๐Ÿšซ Never send cash through mail or shipping companies, especially if requested by someone you don't know.

Stay vigilant and spread the word to protect our elderly loved ones from falling prey to these heartless scammers! โค๏ธ๐Ÿง“๐Ÿ‘ต

I came across ZZZ money club during the crypto market bull run when everyoneโ€™s a winner, even during the bear market this discord group has been amazing at giving information on projects and ways to make passive income in various ways.

The group is very active and everyone in this private discord group is very chatty and helpful.

Its run by Yourfriendandy and Decadeinvestor, you can find them here on YouTube, both top guys with great content.

If you are interested in joining the group you can through the link below.

HACK the Police coming straight from the underground ๐Ÿ˜Ž

๐Ÿ“ฐ๐Ÿ•ต๏ธโ€โ™‚๏ธ New Strategy Alert: Criminal Hacker Groups Favour Data Theft Over Ransomware ๐Ÿ•ต๏ธโ€โ™‚๏ธ๐Ÿ“ฐ

Ransomware gangs are shifting their tactics to target innocent companies for cryptocurrency theft. Instead of using traditional ransomware that encrypts computer files, they now opt for data theft. The strategy involves stealing sensitive data and threatening to publish it unless a payment is made. ๐Ÿ˜ฑ๐Ÿ’ป๐Ÿ’ฐ

This change in approach follows years of relentless ransomware attacks on schools, hospitals, businesses, and government organisations. Notable incidents, like the Colonial Pipeline attack in 2021 and the attack on Ireland's public health system, brought operations to a standstill. ๐Ÿ˜ž๐Ÿšซโ›ฝ

Lizzie Cookson, from the cyber extortion incident response firm Coveware, highlights that the cyber extortion landscape has been gradually shifting towards data theft for the last two years, and it's now gaining momentum. ๐Ÿ“ˆ๐Ÿ’ป๐Ÿ”’

This shift also coincides with law enforcement's increased efforts to crack down on ransomware, prompting some hacking groups to adjust their tactics. For example, the LockBit gang forbids affiliates from encrypting files for critical infrastructure and medical facilities but allows them to steal data. ๐Ÿšซ๐Ÿฅ๐Ÿ’ฝ

This new approach allows targeted entities to continue their operations, but the fallout from leaked data can still be detrimental to the company, customers, or patients. ๐Ÿข๐Ÿค๐Ÿ’”

According to cybersecurity experts, incidents relying solely on data theft without encryption have surged by over 50% since last year. A report from Coveware revealed that 70% of attacks against companies with over 10,000 employees were limited to data theft only. ๐Ÿ“ˆ๐Ÿ”๐Ÿ’ป

The Clop extortion gang has been actively using this strategy in recent months, exploiting software flaws to compromise data from various organisations, including British Airways, the British Broadcasting Corp., and Minnesota's Department of Education. ๐Ÿ”๐Ÿ›ก๏ธ๐Ÿ’ผ

Businesses and organisations must stay vigilant and implement robust cybersecurity measures to protect themselves from these evolving threats. ๐Ÿ”’๐Ÿ’ช๐ŸŒ

๐Ÿ—ž๏ธ Extra, Extra! Read all about itย ๐Ÿ—ž๏ธ

Each fortnite, we carefully select three hot newsletters to show you. Reputation is everything, so any links we share come from personal recommendation or carefully researched businesses at the time of posting. Enjoy!

  • ๐Ÿ’ธย The MoneyFitt Morning: A daily heads-up on what's important in investing & business. Loved by investors of all levels.

  • ๐Ÿ“ˆย Trends.vc: Discover new markets and ideas. Join 55,248 founders using this free newsletter to stay ahead.

  • ๐Ÿ˜ˆย The API Hacker Inner Circle: Join a community of developers, testers, and hackers who are upskilling their API hacking tradecraft

    Let us know what you think!

Kick in the (back-)door, waving the 44 ๐ŸŽถ๐Ÿ”ซ

๐Ÿ“ฐ๐Ÿ”’ Critical Radio Communication Technology Reveals Alarming Vulnerabilities ๐Ÿ”’๐Ÿ“ฐ

For over 25 years, a secretive technology used worldwide for data and voice radio communications has finally been exposed by Dutch researchers, revealing serious flaws, including a deliberate backdoor. ๐Ÿ˜ฑ๐Ÿ“ป

The encryption algorithm embedded in radios sold for commercial use in critical infrastructure contains a backdoor, allowing potential attackers to snoop on communications and manipulate systems.

This technology is widely used in pipelines, railways, electric grids, mass transit, and freight trains. A breach could trigger blackouts, halt gas pipeline flows, or redirect trains, posing significant risks to public safety and security. ๐Ÿš‚๐Ÿ”Œ๐Ÿ›ข๏ธ

Moreover, the same radio technology, found in systems used exclusively by police forces, military, intelligence agencies, and emergency services, was discovered to have a separate vulnerability. This flaw allows decryption of encrypted voice and data communications, enabling attackers to spread misinformation or divert personnel and forces during critical moments. ๐Ÿ’ฌ๐Ÿš“๐Ÿš‘๐Ÿ”“

The vulnerabilities were found in the European radio standard called TETRA, used by companies like Motorola, Damm, and Hytera since the '90s. The flaws remained hidden because the encryption algorithms were kept secret until now. ๐Ÿ•ต๏ธโ€โ™‚๏ธ๐Ÿ”

Although TETRA is less common in the US, it is still used in at least two dozen critical infrastructures, including electric utilities, state border control agencies, oil refineries, chemical plants, major East Coast mass transit systems, international airports, and a US Army training base. Identifying users is difficult as TETRA is embedded in radios supplied through resellers and integrators. ๐Ÿ‡บ๐Ÿ‡ธ๐Ÿ“ป๐Ÿ›ก๏ธ

This revelation underscores the importance of thorough security evaluations for critical communication technologies to protect against potential threats. ๐Ÿ’ช๐Ÿ”๐Ÿ‘จโ€๐Ÿ’ป

Stay safe out there cyber-squad!!

So long and thanks for reading all the phish!

Recent articles