Threat actors are known to capitalize on geopolitical events to manipulate victims into sending money, and the recent events in Gaza and Israel are no exception.
In relation to this, Abnormal Security has published a recent attack detected in which cybercriminals attempted to solicit fraudulent charitable donations for children.
The attackers encourage recipients to donate funds to cryptocurrency wallet addresses, claiming the money will be used to provide basic needs: water, medical care, and Internet access.
According to the research, the campaign targeted 212 individuals at 88 organizations. Abnormal Security breaks down the cryptocurrency donation attack, what makes it notable, and why it is difficult to detect.
You can read the details here.
Like this:
Like Loading...
Related
This entry was posted on November 16, 2023 at 9:02 am and is filed under Commentary with tags Abnormal Security. You can follow any responses to this entry through the RSS 2.0 feed.
You can leave a response, or trackback from your own site.
New Attack Exploits Middle East Crisis To Solicit Donations For Kids Basic Needs In Charity Scam
Threat actors are known to capitalize on geopolitical events to manipulate victims into sending money, and the recent events in Gaza and Israel are no exception.
In relation to this, Abnormal Security has published a recent attack detected in which cybercriminals attempted to solicit fraudulent charitable donations for children.
The attackers encourage recipients to donate funds to cryptocurrency wallet addresses, claiming the money will be used to provide basic needs: water, medical care, and Internet access.
According to the research, the campaign targeted 212 individuals at 88 organizations. Abnormal Security breaks down the cryptocurrency donation attack, what makes it notable, and why it is difficult to detect.
You can read the details here.
Share this:
Like this:
Related
This entry was posted on November 16, 2023 at 9:02 am and is filed under Commentary with tags Abnormal Security. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.