The Weekly Top 3 - ED #34.2015

By Jon Phish, Fri 21 August 2015, in category News

phishing, social engineering, weekly

The Weekly Top 3 are the three most relevant news stories for the week that are related to phishing scams and activities reported in the media, security blogs and security magazines on the Internet. This week, we look at phishing activities related to EZ Pass, Mumsnet and Ubiquiti Networks.

EZ Pass Owners Targeted in Phishing Campaign

Recently a mass phishing campaign targeting users of the EZ Pass toll booth system. Drivers in Maryland, Virginia and Washington DC, have been targeted by scammers who are using phishing e-mails to steal credit card information. The phishing e-mail used in the scam was titled "Notice to Appear" and contained a malicious link embedded in the body of the mail. The e-mail tricks the victim into believing that their accounts are in arrears.  When the victim clicked on the link, they are sent to a fake EZ Pass website, which the scammers used to steal their credit card information and charge bogus fees. Click the link below to read more.

Mumsnet Targeted By Phishing Scams and DDoS Attacks

The website that hosts blogs and forums devoted to parenting, have fallen victim to a hack earlier this week. Based on reports, users of Mumsnet were targeted in a phishing scam, which was used to steal their login credentials. The phishing e-mails were appeared to originate from Mumsnet and contained a link, which carried the victims to a fake Mumsnet login page. However, further investigations proved that hackers were exploiting a vulnerability in the website to capture user data. Click the link below to read more.

Ubiquiti Networks Defrauded $46M Cyberheist

Last week, Ubiquiti Networks divulged a cyberheist that cost the company about $46 million. These cyber thieves impersonated an employee and made fraudulent requests to the company's finance department. Even though these cyber thieves targeted the finance department from outside the company, they were able to trick the department into completing several transfers of funds that totaled $46 million. The company did not divulge the way in which the fraud occurred, but it is likely that the cyber thieves obtained a domain address similar in spelling to that of the company and used spear-phishing e-mails to trick their victims into initiating the international wire transfers. Click the link below to read more.