- Gone Phishing
- Posts
- Scams targeting elderly, what to watch out for.
Scams targeting elderly, what to watch out for.

Welcome to Gone Phishing, your daily cybersecurity newsletter thatโs the #Israel to cybercrimeโs #Palestine. Or vice versa ๐ค๐
Todayโs hottest cyber security stories:
โ๐ฎ FBI: Tech support scams collect cash in SHIPPING CONTAINERS
๐ป Hackers go toe to toe with police as they swap extortion tactics
๐ Years old secret code reveals its fatal flaw: a backdoor ๐ช

FBI see what you did there ๐
๐ฐ ๐จ FBI Warns of Surge in Tech Support Scams Targeting Elderly ๐จ ๐ฐ
The FBI has issued a warning about a recent rise in tech support scams targeting older adults across the United States. Scammers are now adopting a new tactic, instructing victims to send cash hidden within magazines or similar items through shipping firms. ๐ฑ
In the past, tech support scammers typically asked for money via bank transfers, cryptocurrencies, or gift cards. However, they've now changed their approach, making it even more crucial for the elderly to stay alert. ๐
These scammers use various methods like phone calls, texts, emails, and pop-up windows to pose as legitimate company representatives. They trick victims by claiming there are fraudulent activities linked to their accounts or by promising subscription refunds. ๐
Once they've gained the victim's trust, scammers ask them to download remote access software, which gives them control over the victim's computer. They then log into the victim's bank account and deliberately deposit a larger sum of money, asking the victim to return the extra cash to avoid losing their job. ๐ฃ๐ป๐ฐ
๐ก๏ธ Top Tips:
๐ซ Never download software at the request of an unknown individual who contacted you.
๐ซ Never give control of your computer to someone you don't know.
๐ซ Avoid clicking on unsolicited pop-ups, links in text messages, or email attachments. Don't call the phone number in suspicious pop-ups, texts, or emails.
๐ซ Never send cash through mail or shipping companies, especially if requested by someone you don't know.
Stay vigilant and spread the word to protect our elderly loved ones from falling prey to these heartless scammers! โค๏ธ๐ง๐ต
I came across ZZZ money club during the crypto market bull run when everyoneโs a winner, even during the bear market this discord group has been amazing at giving information on projects and ways to make passive income in various ways.
The group is very active and everyone in this private discord group is very chatty and helpful.
Its run by Yourfriendandy and Decadeinvestor, you can find them here on YouTube, both top guys with great content.
If you are interested in joining the group you can through the link below.

HACK the Police coming straight from the underground ๐
๐ฐ๐ต๏ธโโ๏ธ New Strategy Alert: Criminal Hacker Groups Favour Data Theft Over Ransomware ๐ต๏ธโโ๏ธ๐ฐ
Ransomware gangs are shifting their tactics to target innocent companies for cryptocurrency theft. Instead of using traditional ransomware that encrypts computer files, they now opt for data theft. The strategy involves stealing sensitive data and threatening to publish it unless a payment is made. ๐ฑ๐ป๐ฐ
This change in approach follows years of relentless ransomware attacks on schools, hospitals, businesses, and government organisations. Notable incidents, like the Colonial Pipeline attack in 2021 and the attack on Ireland's public health system, brought operations to a standstill. ๐๐ซโฝ
Lizzie Cookson, from the cyber extortion incident response firm Coveware, highlights that the cyber extortion landscape has been gradually shifting towards data theft for the last two years, and it's now gaining momentum. ๐๐ป๐
This shift also coincides with law enforcement's increased efforts to crack down on ransomware, prompting some hacking groups to adjust their tactics. For example, the LockBit gang forbids affiliates from encrypting files for critical infrastructure and medical facilities but allows them to steal data. ๐ซ๐ฅ๐ฝ
This new approach allows targeted entities to continue their operations, but the fallout from leaked data can still be detrimental to the company, customers, or patients. ๐ข๐ค๐
According to cybersecurity experts, incidents relying solely on data theft without encryption have surged by over 50% since last year. A report from Coveware revealed that 70% of attacks against companies with over 10,000 employees were limited to data theft only. ๐๐๐ป
The Clop extortion gang has been actively using this strategy in recent months, exploiting software flaws to compromise data from various organisations, including British Airways, the British Broadcasting Corp., and Minnesota's Department of Education. ๐๐ก๏ธ๐ผ
Businesses and organisations must stay vigilant and implement robust cybersecurity measures to protect themselves from these evolving threats. ๐๐ช๐

๐๏ธ Extra, Extra! Read all about it ๐๏ธ
Each fortnite, we carefully select three hot newsletters to show you. Reputation is everything, so any links we share come from personal recommendation or carefully researched businesses at the time of posting. Enjoy!
๐ธ The MoneyFitt Morning: A daily heads-up on what's important in investing & business. Loved by investors of all levels.
๐ Trends.vc: Discover new markets and ideas. Join 55,248 founders using this free newsletter to stay ahead.
๐ The API Hacker Inner Circle: Join a community of developers, testers, and hackers who are upskilling their API hacking tradecraft
Let us know what you think!

Kick in the (back-)door, waving the 44 ๐ถ๐ซ
๐ฐ๐ Critical Radio Communication Technology Reveals Alarming Vulnerabilities ๐๐ฐ
For over 25 years, a secretive technology used worldwide for data and voice radio communications has finally been exposed by Dutch researchers, revealing serious flaws, including a deliberate backdoor. ๐ฑ๐ป
The encryption algorithm embedded in radios sold for commercial use in critical infrastructure contains a backdoor, allowing potential attackers to snoop on communications and manipulate systems.
This technology is widely used in pipelines, railways, electric grids, mass transit, and freight trains. A breach could trigger blackouts, halt gas pipeline flows, or redirect trains, posing significant risks to public safety and security. ๐๐๐ข๏ธ
Moreover, the same radio technology, found in systems used exclusively by police forces, military, intelligence agencies, and emergency services, was discovered to have a separate vulnerability. This flaw allows decryption of encrypted voice and data communications, enabling attackers to spread misinformation or divert personnel and forces during critical moments. ๐ฌ๐๐๐
The vulnerabilities were found in the European radio standard called TETRA, used by companies like Motorola, Damm, and Hytera since the '90s. The flaws remained hidden because the encryption algorithms were kept secret until now. ๐ต๏ธโโ๏ธ๐
Although TETRA is less common in the US, it is still used in at least two dozen critical infrastructures, including electric utilities, state border control agencies, oil refineries, chemical plants, major East Coast mass transit systems, international airports, and a US Army training base. Identifying users is difficult as TETRA is embedded in radios supplied through resellers and integrators. ๐บ๐ธ๐ป๐ก๏ธ
This revelation underscores the importance of thorough security evaluations for critical communication technologies to protect against potential threats. ๐ช๐๐จโ๐ป
Stay safe out there cyber-squad!!
So long and thanks for reading all the phish!
Give us a rating? |


