Netcrook

Credential Theft

269 article(s)

Chrome Extension Scam: How Phantom Shuttle Stole Credentials from 170+ Sites

🗓 23 Dec 2025 · 👤 LOGICFALCON · 🌍 Asia

Two Chrome extensions posing as VPN speed test tools were exposed for stealing sensitive data from over 170 major sites. Learn how the Phantom Shuttle scam worked, who was targeted, and what security experts recommend.

Phantom Shuttle: Rogue Chrome VPN Extensions Hijack User Credentials

🗓 23 Dec 2025 · 👤 TRUSTBREAKER · 🌍 Asia

A criminal campaign leveraging fake VPN Chrome extensions has silently stolen credentials and sensitive data from over 2,000 users since 2017, exposing the risks of browser add-ons masquerading as security tools.

MacSync Stealer: Digitally Signed Malware Outsmarts Apple’s Defenses

🗓 23 Dec 2025 · 👤 LOGICFALCON · 🌍 North America

MacSync Stealer’s latest campaign exposes how digitally signed and notarized apps can be weaponized to bypass Apple’s security checks. Discover how this stealthy malware operates and what it means for the future of macOS security.

Federal Crackdown Halts $15M Bank Account Takeover Operation

🗓 23 Dec 2025 · 👤 TRUSTBREAKER · 🌍 North America

Federal agents have seized a domain used by cybercriminals to steal millions from bank accounts through a sophisticated phishing and credential theft operation, marking a significant win in the fight against online financial fraud.

Chrome VPN Extensions Caught Stealing Credentials via Proxy Hijack | Netcrook

🗓 23 Dec 2025 · 👤 LOGICFALCON · 🌍 Asia

Fake VPN Chrome extensions exploited browser permissions to intercept user traffic and steal credentials, exposing thousands to supply chain risks. Discover how Phantom Shuttle operated undetected for years.

Signed, Sealed, Delivered: MacSync Stealer Infiltrates macOS Through Apple’s Own Front Door

🗓 23 Dec 2025 · 👤 TRUSTBREAKER · 🌍 North America

A new MacSync Stealer variant is exploiting Apple’s own trusted app ecosystem, using signed and notarized applications to distribute infostealing malware and evade macOS defenses. Here’s how the attack works—and why code signing is no longer enough.

The Password Paradox: Psychology, Weakness, and the Security Trap

🗓 23 Dec 2025 · 👤 LOGICFALCON · 🌍 Europe

An investigative look at how our minds trick us into creating weak passwords, the role of the IKEA Effect, and why even complex policies can fail.

MacSync Malware Dropper Outsmarts Gatekeeper with Notarized Swift App

🗓 22 Dec 2025 · 👤 TRUSTBREAKER · 🌍 North America

A sophisticated MacSync dropper now leverages Apple’s own code-signing and notarization to bypass Gatekeeper, stealing credentials and sensitive data from unsuspecting macOS users.

Malware Masquerade: How Android SMS Stealers Are Targeting Uzbekistan

🗓 22 Dec 2025 · 👤 LOGICFALCON · 🌍 Asia

Uzbekistan is facing a surge of Android SMS stealer malware attacks, with cybercriminals leveraging Telegram and sophisticated dropper techniques to steal money and personal data. Learn how these campaigns operate and what you can do to stay safe.

Wonderland Android Malware: The Next-Level SMS Hijack Threat in Uzbekistan

🗓 22 Dec 2025 · 👤 TRUSTBREAKER · 🌍 Asia

Wonderland, a sophisticated Android malware, is targeting Uzbekistan with real-time SMS hijacking and advanced evasion tactics, signaling a major shift in mobile cybercrime operations.

« Prev 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 Next »