Blog Posts Tagged with "IC3"

69dafe8b58066478aea48f3d0f384820

FBI and IC3 Issue Advisory on Revetion Ransomware

August 10, 2012 Added by:Headlines

Reveton is drive-by malware and unlike many viruses which activate when users open a file or attachment. Reveton can install itself when users simply click on a compromised website. Once infected, the computer immediately locks, and the monitor displays a screen stating there has been a violation of federal law...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Alert: Fake FBI Emails Seek Personal Information

June 26, 2012 Added by:Headlines

The fraudulent e-mails give the appearance of legitimacy due to the use of pictures of the FBI Director, seal, letterhead, and/or banners. The schemes cover a range from threat and extortion e-mails, website monitoring containing malicious computer program attachments (malware), and online auction scams...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Citadel Malware Delivers Reveton Ransomware to Extort Money

May 31, 2012 Added by:Headlines

A new Citadel malware platform is being used to deliver ransomware named Reveton, which lures the victim to a drive-by download website, and the ransomware is installed. The computer then freezes and a screen is displayed warning the user they have violated United States Federal Law...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

FBI Guidance on Avoiding Internet-Based Fraud

May 21, 2012 Added by:Infosec Island Admin

Listed below are tips to protect your business, yourself and your family from various forms of Internet fraud. For information on the most common complaints and scams, see the annual reports of the Internet Crime Complaint Center a partnership of the FBI and the NWCCC...

Comments  (2)

03b2ceb73723f8b53cd533e4fba898ee

IC3: 2011 Internet Crime Report

May 15, 2012 Added by:Pierluigi Paganini

IC3 represents a perfect example of how technological services could help in the prevention and analysis of criminal activities, and highlights that the real weapon against Internet crime is awareness and information sharing...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Malware Spreading Through Hotel Internet Connections

May 10, 2012 Added by:Headlines

The FBI and other agencies warn that malicious actors are targeting travelers with pop-up windows while establishing an Internet connection in their hotel rooms, infecting laptops with malicious software. Anyone who has been a target of this attack should contact the FBI and IC3...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

IC3: Blackhole Exploit Kit 1.2.3 Released

April 26, 2012 Added by:Headlines

Blackhole, the most widely purchased exploit pack in the underground market, is a toolkit that is injected into malicious and/or compromised websites, allowing the attacker to push a variety of exploits targeting vulnerabilities of popular applications like Java and Flash...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Spoofed Email with Keylogger Malware Costs Company $100,000

April 04, 2012 Added by:Headlines

In one complaint received by the IC3, a business claimed their computer was infected with a virus after opening the attachment in the e-mail they received. As a result, the business lost nearly $100,000 when fraudsters successfully wired money from the company's bank account...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

IC3: Browser Bot Infection and HTML Attachment Malware

March 28, 2012 Added by:Headlines

The open source browser can now function like a bot and accept commands. It can process the content of the current page where it is located, redirect the user, halt the loading of particular pages, steal passwords, run executables, and even kill itself...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Email Intrusions Facilitate Wire Transfers Overseas

January 30, 2012 Added by:Headlines

The FBI has observed a trend in which cyber criminals are compromising the e-mail accounts of U.S. individuals and businesses and using variations of the legitimate e-mail addresses associated with the victim accounts to request and authorize overseas transactions...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

IC3: Recovery from the Malicious Erasure of Files

January 23, 2012 Added by:Headlines

Cyber criminals can damage a victim's computer by changing or deleting files, wiping hard drives, or erasing backups to hide some or all of their malicious activity and tradecraft. The FBI and DHS encourage businesses and individuals to employ these mitigation strategies...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

FBI: Malicious Software Features Usama bin Laden Links

May 04, 2011 Added by:Headlines

The FBI warns computer users to exercise caution when they receive e-mails that purport to show photos or videos of Usama bin Laden’s recent death. This content could be a virus that could damage your computer...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Two Million Online Fraud Complaints and Growing

November 24, 2010 Added by:David Navetta

November 9, marked the 2 millionth consumer complaint filed with the IC3. This milestone is all the more notable because it took seven years for the IC3 to receive its first million complaints. The second million arrived in less than half the time - just under 3.5 years....

Comments  (0)

69dafe8b58066478aea48f3d0f384820

FBI's IC3 Has Logged Two Million Internet Crime Reports

November 16, 2010 Added by:Headlines

Statistics reported by the organization, which was was established as a partnership between the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center (NW3C), indicate the losses from cyber crime have doubled in recent years...

Comments  (1)