, but are dupingAttack.Phishingpeople on the pretext of partnering with MNCs ( multinational companies ) , investing in herbal seed businesses and channelising foreign funds . According to security agencies , there is a complete shift in the modus operandi of these Nigerian web gangs . A senior Delhi Police Crime Branch officer said : 'The scamsters lureAttack.Phishinggullible targets via social networking sites such as Facebook . 'They then pose asAttack.Phishingdiplomats or MNC executives and enticeAttack.Phishingtheir targets to invest in a global venture , which actually does not exist . 'Interestingly , all dealings are done at high-secured areas such as airport and five-star hotels to give an impression of being high-flyers and avoid the risk of getting into trouble . ' 'There is no fixed narrative . Depending upon the profile of the target , the gang traps them . In the herbal seeds scam , the victim is approached online as a representative of an overseas pharmaceutical firm looking to source herbal seeds from local farmers through an agent . They promise the victim huge returns if they pay the agent upfront for the seeds . Then they disappear with the money , ' said Uttar Pradesh Special Task Force 's additional superintendent of police Triveni Singh . One of the latest victims is Meerut 's Varun Thapar , who lost Rs 3 lakh to a Nigerian gang . Thapar went to meet the gang members at a five star hotel in Mumbai and Delhi . He told Mail Today : 'The gang members contact through their international number or makes a WhatsApp call . The gang sounds so professional that it is difficult to make out that they are fraud . ' I was trapped after getting a friend request from a Manchester-based female executive . I was given seed sample in Mumbai and later duped at a five-star hotel in Delhi . The trap was so perfect that I could not sense any foul play . ' During investigation , it was found that all the numbers used for communication were taken on fake identities . Police claim the gangs have developed a new trickAttack.Phishing, where they pose asAttack.Phishingdiplomat or MNC executive and work in nexus with a local youth who helps them with logistics .
Nigerian scamsters have changed tactics as they target Indian people online , security experts have warned . The fraudsters are no longer relying on phishing emails about lotteries and charity as baitAttack.Phishing, but are dupingAttack.Phishingpeople on the pretext of partnering with MNCs ( multinational companies ) , investing in herbal seed businesses and channelising foreign funds . According to security agencies , there is a complete shift in the modus operandi of these Nigerian web gangs . A senior Delhi Police Crime Branch officer said : 'The scamsters lureAttack.Phishinggullible targets via social networking sites such as Facebook . 'They then pose asAttack.Phishingdiplomats or MNC executives and enticeAttack.Phishingtheir targets to invest in a global venture , which actually does not exist . 'Interestingly , all dealings are done at high-secured areas such as airport and five-star hotels to give an impression of being high-flyers and avoid the risk of getting into trouble . ' 'There is no fixed narrative . Depending upon the profile of the target , the gang traps them . In the herbal seeds scam , the victim is approached online as a representative of an overseas pharmaceutical firm looking to source herbal seeds from local farmers through an agent . They promise the victim huge returns if they pay the agent upfront for the seeds . Then they disappear with the money , ' said Uttar Pradesh Special Task Force 's additional superintendent of police Triveni Singh . One of the latest victims is Meerut 's Varun Thapar , who lost Rs 3 lakh to a Nigerian gang . Thapar went to meet the gang members at a five star hotel in Mumbai and Delhi . He told Mail Today : 'The gang members contact through their international number or makes a WhatsApp call . The gang sounds so professional that it is difficult to make out that they are fraud . ' I was trapped after getting a friend request from a Manchester-based female executive . I was given seed sample in Mumbai and later duped at a five-star hotel in Delhi . The trap was so perfect that I could not sense any foul play . ' During investigation , it was found that all the numbers used for communication were taken on fake identities . Police claim the gangs have developed a new trickAttack.Phishing, where they pose asAttack.Phishingdiplomat or MNC executive and work in nexus with a local youth who helps them with logistics .
A NEW DVLA car tax scamAttack.Phishingis doing the rounds online which could see motorists dupedAttack.Phishinginto entering sensitive information and being ripped off by criminals . Here ’ s what to do if you receive this message . DVLA car tax scam are not a new thing and every couple of months a new one does the rounds . Criminals pose asAttack.Phishingthe Driver and Vehicle Licensing Agency in a bid to extort motorists of their cash by requesting this bank details . These crooks usually try to achieve this by threatening a monetary punishment of some sort or in other cases by stating that the driver is entitled to a refund . The problem for some motorists could fallAttack.Phishingfor the fraudulent messages especially as they often look fairly professional and can even contain the logo of the DVLA Motorists Jason Price , however , was not fooledAttack.Phishingby the latest attempt by fraudsters trying to get him to hand over his details . Mr Price tweeted a link to the email that he receivedAttack.Phishingfrom the criminal pretending to beAttack.Phishingthe DVLA . The subject of the email is “ You are not up-to-date with your vehicle tax ” followed by a bogus item reference number , which presumably is to , in some way , make the email seem more legitimate . The contents of the email claim that the driver is not up to date with their vehicle tax and states that this is their ‘ last chance ’ to pay the remainder of the fee . It reads : “ Our records show that you are not up-to-date with your vehicle tax . “ This is a reminder ( V11 ) and a ‘ last chance ’ warning letter from us . “ Tax your car , motorcycle or other vehicle today to avoid unpleasant consequences . “ You must tax your vehicle even if you don ’ t have to pay anything , for example if you ’ re exempt because you ’ re disabled . “ You ’ ll need to meet all the legal obligations for drivers before you can drive. ” It also states that “ You can be fined up to £1,000 if you do not renew your car tax ” The DVLA has issued numerous warnings to customers in the past about how it will never contact the motorist in this way . “ # SCAM WARNING : We 're reminding customers that the only official place to find our services and information is on http : //GOV.UK “ Cyber scams are common so we want to help our customers to spot fraudulent activity. ” If you receive an email or message like this you should either report it or instantly delete it and not click the link in the message . If you ’ re unsure on the validity of a message then you can ring the licensing agency .
PhishingAttack.Phishingtakes place when a fraudster tricksAttack.Phishingan individual into sharing sensitive information ( account numbers , Social Security numbers , login credentials , etc . ) by way of fraudulent emails , texts , or counterfeit websites . PhishingAttack.Phishingcan also enable a scammer to gain access to a computer or network so that they can install malware , such as ransomware , on a victim 's computer . Phishers are able to achieve this by spoofingAttack.Phishingthe familiar , trusted logos of established , legitimate companies . Or , they may pose asAttack.Phishinga friend or family member and are often successful in completely deludingAttack.Phishingtheir targets . In carrying out attacks , Dark Caracal uses trojanized WhatsApp and Facebook apps to try to lureAttack.Phishingusers into clicking malicious links and downloading Android malware , called Pallas , which can collect vast amounts of data . Dark Caracal targets include governments , military organizations , utilities , financial institutions , manufacturing companies and defense contractors . Stealth Mango ( Android ) and Tangelo ( iOS ) , discovered by Lookout Security Intelligence , are surveillanceware tools that target government officials , diplomats , activists and military personnel , specifically in Pakistan , Afghanistan , Iraq , India and the UAE . According to Lookout Security , “ data from U.S. , Australian , and German officials and military have been swept up in the campaign we believe is being run by members in the Pakistani military. ” Fake eFax email deceivesAttack.Phishingemail recipients by telling them they have received ‘ a new eFax ’ and that they need to click on a link button in the email to retrieve the document . The link goes to a phishing page . This is not a new attack , but has recently been spotted in emails again . Email filtering company , Mailguard , has picked upAttack.Phishinga fake E-Toll notification containing an infected .doc file . According to Mailguard , the file contains a malicious macro that will download malware to the victim ’ s computer . The notification also includes the logos of Microsoft Office and Mailguard in order to appearAttack.Phishingauthentic . It even goes as far as to claim that , “ this document is protected by MailGuard '' . DHL branding was mimickedAttack.Phishingand fake shipping notifications were sent outAttack.Phishing, asking recipients to download an attached file that contained highly destructive trojan malware . “ MEWKitAttack.Phishing” is a phishing attackAttack.Phishingthat directly steals Ethereum from users of MyEtherWallet . Using MyEtherWallet as baitAttack.Phishing, it attempts to trickAttack.PhishingEthereum investors into logging in to the bogus , cloned version of the website in order to steal their credentials . Gmail ’ s new Confidential Mode may invite link-baiting phishing attacksAttack.Phishing. According to analysis by ComputerWorld , “ Confidential Mode works by storing your email in a secure space on Google servers in the cloud . When both sender and recipient use Gmail , the email appears normal . But recipients who do not use Gmail get a link for viewing the email in a browser . The messages you send or receive via Confidential Mode are not actually email . The link is an email , but the message is an email-looking page on the internet that ’ s password-protected . Emails containing the link can , in fact , be forwarded , but only the intended recipient can successfully open the link . When someone gets one of these forwarded mails , they ’ re prompted for their Google login username and password to determine whether or not they ’ re the intended recipient . This is problematic , because it invites link-baiting phishing attacksAttack.Phishing, which could con people into revealing their login information . ” A phishing campaignAttack.Phishingtargeting Apple users seeks to dupeAttack.Phishingvictims into updating their profiles in preparation for the EU ’ s General Data Protection Regulation ( GDPR ) policies , which go into effect on May 25 . This is just one of many scams exploiting the coming implementation of GDPR policies .
Researchers from Positive Technologies have unearthedVulnerability-related.DiscoverVulnerabilitya critical vulnerability ( CVE-2017-6968 ) in Checker ATM Security by Spanish corporate group GMV Innovating Solutions . Checker ATM Security is a specialized security solution aimed at keeping ATMs safe from logical attacks . It does so by enforcing application whitelisting , full hard disk encryption , providing ACL-based control of process execution and resource access , enforcing security policies , restricting attempts to connect peripheral devices , and so on . The found flaw can be exploitedVulnerability-related.DiscoverVulnerabilityto remotely run code on a targeted ATM , increase the attacker ’ s privileges in the system , and compromise the machine completely . “ To exploit the vulnerability , a criminal would need to pose asAttack.Phishingthe control server , which is possible via ARP spoofingAttack.Phishing, or by simply connecting the ATM to a criminal-controlled network connection , ” researcher Georgy Zaytsev explained . “ During the process of generating the public key for traffic encryption , the rogue server can cause a buffer overflow on the ATM due to failure on the client side to limit the length of response parameters and send a command for remote code execution . This can give an attacker full control over the ATM and allow a variety of manipulations , including unauthorized money withdrawal ” . ” When informedVulnerability-related.DiscoverVulnerabilityof the vulnerability and provided with test exploits , GMV confirmedVulnerability-related.DiscoverVulnerabilityits existence and that it affectsVulnerability-related.DiscoverVulnerabilityversions 4.x and 5.x of the software , and ultimately pushedVulnerability-related.PatchVulnerabilityout a patch , which users are urged to installVulnerability-related.PatchVulnerabilityas soon as possible . Exploitation not detected in the wild A company spokesperson has made sure to point out that there is no indication that the vulnerability has been exploitedVulnerability-related.DiscoverVulnerabilityin attacks in the wild . Also , that exploitation is not that easy , as the attacker must first gain access to the ATM network and log into the target system . “ Secondly , the attack is difficult to be systematically exploited in an ATM network . In order to exploit it , the attacker needs some memory address that are strongly dependent on Windows kernel version , while in Windows XP systems could be theoretically possible to take advantage of the vulnerability , in Windows 7 is almost impossible because those memory address are different in every windows installation , ” the spokesperson told The Register . Like any software , security software is not immune to vulnerabilities and can open systems to exploitation . While antivirus and other security solutions for personal computers are often scrutinized and tested for flaws by third-party researchers , specialized security software has not , so far , received that amount of attention . So , it ’ s good to hear that some researchers have decided to focus on them , and that vendors are positively responding to vulnerability disclosuresVulnerability-related.DiscoverVulnerability.