<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>phishing Archives - Tech Trends</title>
	<atom:link href="https://techtrends.tech/tag/phishing/feed/" rel="self" type="application/rss+xml" />
	<link>https://techtrends.tech/tag/phishing/</link>
	<description>Tech Trends</description>
	<lastBuildDate>Fri, 27 Mar 2026 12:00:34 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>Cybercrime Goes Industrial</title>
		<link>https://techtrends.tech/cybersecurity/industrial-scale-cybercrime-networks/</link>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Fri, 27 Mar 2026 11:57:35 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Industry Trends]]></category>
		<category><![CDATA[Tech Trends]]></category>
		<category><![CDATA[Cryptocurrency scams]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[Digital fraud]]></category>
		<category><![CDATA[Fake websites]]></category>
		<category><![CDATA[Internet security]]></category>
		<category><![CDATA[Online scams]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Threat intelligence]]></category>
		<guid isPermaLink="false">https://techtrends.tech/?p=17203</guid>

					<description><![CDATA[<p>Scams are becoming global industrial scale operations</p>
<p>The post <a href="https://techtrends.tech/cybersecurity/industrial-scale-cybercrime-networks/">Cybercrime Goes Industrial</a> appeared first on <a href="https://techtrends.tech">Tech Trends</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Scams are becoming global industrial scale operations</strong></p>
<p>Cybercrime is no longer just hackers sending phishing emails or small groups running online scams. According to new research from <a href="https://nordvpn.com/">NordVPN’</a>s Threat Intelligence team, cybercrime is becoming industrialized — with large-scale operations running fake stores, cryptocurrency scams, and malware campaigns across thousands of websites worldwide.</p>
<p data-start="1771" data-end="2005">The report reveals three major global scam operations that demonstrate how cybercriminals are increasingly operating like technology companies, using automation, infrastructure, and large-scale systems to run fraud campaigns at scale.</p>
<h2 data-start="2007" data-end="2059">Old software vulnerabilities creating new threats</h2>
<p data-start="2061" data-end="2423">One of the most surprising findings in the report is that attackers are still exploiting extremely old software vulnerabilities. In one campaign, cybercriminals exploited a 15-year-old vulnerability in an outdated web editor tool to compromise more than 1,300 websites, including government, corporate, and research domains.</p>
<p data-start="2425" data-end="2669">These trusted websites were then used to redirect visitors to phishing pages, fake online stores, or malware downloads. Because the domains were legitimate, security systems were more likely to trust them, making the attacks far more effective.</p>
<div id="attachment_17206" style="width: 634px" class="wp-caption aligncenter"><img fetchpriority="high" decoding="async" aria-describedby="caption-attachment-17206" class="wp-image-17206 size-full" src="https://techtrends.tech/wp-content/uploads/2026/03/vulnerability-exploit-campaign-diagram-1.jpg" alt="Diagram showing cybercriminal campaign exploiting outdated software vulnerabilities" width="624" height="392" srcset="https://techtrends.tech/wp-content/uploads/2026/03/vulnerability-exploit-campaign-diagram-1.jpg 624w, https://techtrends.tech/wp-content/uploads/2026/03/vulnerability-exploit-campaign-diagram-1-150x94.jpg 150w, https://techtrends.tech/wp-content/uploads/2026/03/vulnerability-exploit-campaign-diagram-1-80x50.jpg 80w" sizes="(max-width: 624px) 100vw, 624px" /><p id="caption-attachment-17206" class="wp-caption-text">Attackers exploit outdated software to compromise trusted websites and redirect users to scams</p></div>
<p data-start="2731" data-end="2877">This strategy shows how cybercriminals are increasingly using legitimate infrastructure to run scams rather than building everything from scratch.</p>
<h2 data-start="2879" data-end="2942">Cryptocurrency scams evolving into identity theft operations</h2>
<p data-start="2944" data-end="3167">The report also uncovered a large-scale cryptocurrency phishing network involving more than 100 fake crypto domains. The scam begins with emails claiming the recipient has received a large cryptocurrency deposit by mistake.</p>
<p data-start="3169" data-end="3434">Victims are directed to fake cryptocurrency platforms where they are asked to log in and later pay so-called “gas fees” to withdraw the funds. In reality, the platforms are fake and the fees are stolen, while attackers also collect personal data for identity theft.</p>
<div id="attachment_17205" style="width: 634px" class="wp-caption aligncenter"><img decoding="async" aria-describedby="caption-attachment-17205" class="size-full wp-image-17205" src="https://techtrends.tech/wp-content/uploads/2026/03/vulnerability-exploit-campaign-diagram.jpg" alt="Diagram showing cryptocurrency phishing scam process" width="624" height="344" srcset="https://techtrends.tech/wp-content/uploads/2026/03/vulnerability-exploit-campaign-diagram.jpg 624w, https://techtrends.tech/wp-content/uploads/2026/03/vulnerability-exploit-campaign-diagram-150x83.jpg 150w" sizes="(max-width: 624px) 100vw, 624px" /><p id="caption-attachment-17205" class="wp-caption-text">Cryptocurrency phishing scams trick users into paying fake fees and revealing personal data</p></div>
<p data-start="3493" data-end="3648">These scams combine phishing, identity theft, and cryptocurrency fraud into a single operation, making them particularly effective and difficult to detect.</p>
<h2 data-start="3650" data-end="3691">Fake online stores run like businesses</h2>
<p data-start="3693" data-end="3992">Another operation uncovered in the investigation involved more than 800 fake e-commerce stores built using common website tools like WordPress and WooCommerce. These sites advertise products at extremely low prices to attract buyers, but customers either receive counterfeit goods or nothing at all.</p>
<p data-start="3994" data-end="4173">Investigators found that many of these websites were connected to a centralized operation, showing how automation allows a single group to operate hundreds of fake stores at once.</p>
<h2 data-start="4175" data-end="4212">Cybercrime is becoming an industry</h2>
<p data-start="4214" data-end="4461">The most important takeaway from the report is that cybercrime is increasingly being run like a business. Criminal groups are using automation, software platforms, data analytics, and large-scale infrastructure to run fraud operations efficiently.</p>
<p data-start="4463" data-end="4508">Instead of isolated scams, we are now seeing:</p>
<ul data-start="4509" data-end="4641">
<li data-start="4509" data-end="4524">Scam networks</li>
<li data-start="4525" data-end="4542">Fraud platforms</li>
<li data-start="4543" data-end="4571">Automated phishing systems</li>
<li data-start="4572" data-end="4600">Fake e-commerce ecosystems</li>
<li data-start="4601" data-end="4641">Industrial-scale cybercrime operations</li>
</ul>
<p data-start="4643" data-end="4806">This shift means cybersecurity is no longer just about stopping individual hackers — it is about defending against organized digital industries built around fraud.</p>
<h2 data-start="4808" data-end="4838">The future of cybersecurity</h2>
<p data-start="4840" data-end="5032">As cybercrime becomes more organized and automated, cybersecurity will increasingly rely on AI, automation, and threat intelligence to detect patterns and stop attacks before they reach users.</p>
<p data-start="5034" data-end="5225">For individuals and businesses, the biggest risks continue to come from phishing, fake websites, outdated software, and online scams — all of which are becoming more sophisticated every year.</p>
<p>The post <a href="https://techtrends.tech/cybersecurity/industrial-scale-cybercrime-networks/">Cybercrime Goes Industrial</a> appeared first on <a href="https://techtrends.tech">Tech Trends</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">17203</post-id>	</item>
		<item>
		<title>Expert View: Spam and Phishing Trends</title>
		<link>https://techtrends.tech/tech-trends/expert-view-spam-and-phishing-trends/</link>
		
		<dc:creator><![CDATA[Contributor Network]]></dc:creator>
		<pubDate>Thu, 08 Aug 2019 05:07:32 +0000</pubDate>
				<category><![CDATA[Expert View]]></category>
		<category><![CDATA[Tech Trends]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[scams]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[SMS scams]]></category>
		<guid isPermaLink="false">https://techtrends.tech/?p=14315</guid>

					<description><![CDATA[<p>Scammers are getting ever more creative with new spam, SMS and phishing techniques. Here&#8217;s how to avoid getting caught by &#8230; <a class="kt-excerpt-readmore" href="https://techtrends.tech/tech-trends/expert-view-spam-and-phishing-trends/" aria-label="Expert View: Spam and Phishing Trends">Read More</a></p>
<p>The post <a href="https://techtrends.tech/tech-trends/expert-view-spam-and-phishing-trends/">Expert View: Spam and Phishing Trends</a> appeared first on <a href="https://techtrends.tech">Tech Trends</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em><strong>Scammers are getting ever more creative with new spam, SMS and phishing techniques. Here&#8217;s how to avoid getting caught by these latest scamming strategies. </strong></em></p>
<blockquote><p>By Daniel Markuson, Digital Privacy Expert at <a href="https://nordvpn.com/">NordVPN</a>.</p></blockquote>
<p><a href="https://www.talosintelligence.com/reputation_center/email_rep">422.49 billion spam emails</a> are sent worldwide every day. This number also includes phishing, sextortion, advertising, and finance-related scams. Most people can already spot the traditional spam messages that claim they have won a new Lamborghini or inherited a million dollars, so spammers are finding new creative ways to trick people into giving them money or information.</p>
<hr /><p><em>There has been an increase in the numbers of SMS spamming attacks known as smishing</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D14315&#038;text=There%20has%20been%20an%20increase%20in%20the%20numbers%20of%20SMS%20spamming%20attacks%20known%20as%20smishing&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<p>With so much personal data available out there, it is much easier for criminals to customize all kinds of scamming attempts &#8211; from simple spam, to much more advanced phishing or extortion. These emails, messages, and websites often seem so real, and provide such a high level of detail, as to make even the most cautious person susceptible to falling into a trap.</p>
<hr /><p><em>A few months ago, a massive smishing attack produced tens of millions of fake SMS messages, inviting the recipients to go on fake websites</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D14315&#038;text=A%20few%20months%20ago%2C%20a%20massive%20smishing%20attack%20produced%20tens%20of%20millions%20of%20fake%20SMS%20messages%2C%20inviting%20the%20recipients%20to%20go%20on%20fake%20websites&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<h5>A New Era of Smishing</h5>
<p>Recently, there has been an increase in the numbers of SMS spamming attacks, known as “smishing” where scammers try o steal people&#8217;s personal information or credit card details. They do this by initially sending text messages designed to look like they come from a bank, an employer, or an official governmental institution.</p>
<hr /><p><em>422.49 billion spam emails are sent worldwide every day</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D14315&#038;text=422.49%20billion%20spam%20emails%20are%20sent%20worldwide%20every%20day&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<p>A few months ago, a massive smishing attack produced tens of millions of fake SMS messages, inviting the recipients to go on fake websites. The texts were generated by a spam-sending database run by a company called ApexSMS. Interestingly, the system was able to detect when people messaged back using keywords such as “report” and &#8220;FCC. These phone numbers were added to a special list of contacts that would not be used by the fraudsters again. However, you should bear in mind that responding to these kinds of texts may leave you vulnerable to identity theft because if you contact the hackers, the hacked phone transmits your sensitive data stored on it.</p>
<hr /><p><em>Responding to a text can leave your phone vulnerable to being hacked</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D14315&#038;text=Responding%20to%20a%20text%20can%20leave%20your%20phone%20vulnerable%20to%20being%20hacked&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<p>As <a href="https://techcrunch.com/2019/05/09/sms-spammers-doxxed/">investigators later discovered</a>, the database contained around 80 million records. They included people&#8217;s names, phone numbers, carrier network names, IP addresses, and even locations. Out of the 38 million texts. that were sent during the attack, 2.1 million people clicked on a link in the fraudulent message. Luckily on this occasion, the scammers used an unprotected server, which experts discovered in time to stop the attack.</p>
<hr /><p><em>Scammers are abusing Notifications and Push APIs on Android devices</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D14315&#038;text=Scammers%20are%20abusing%20Notifications%20and%20Push%20APIs%20on%20Android%20devices&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<h5>Fake Missed Calls</h5>
<p>Besides SMS frauds, scammers are now <a href="https://www.bleepingcomputer.com/news/security/android-users-being-spammed-using-fake-missed-call-alerts/">abusing the Notifications and Push APIs</a> on Android devices. These two APIs are used to push notifications on mobile phones to re-engage users. An application or server can push them even if the app is not running. The problem is, the API allows scammers to make their notifications look identical to a legitimate app. For example, they can create fake alerts customized to look like a missed phone call.</p>
<hr /><p><em>Scammers aim to take advantage of well-known applications by creating false alerts using the looks of popular apps</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D14315&#038;text=Scammers%20aim%20to%20take%20advantage%20of%20well-known%20applications%20by%20creating%20false%20alerts%20using%20the%20looks%20of%20popular%20apps&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<p>One of the ways scammers exploit the feature is using Google Chrome to push messages to mobile phones. To hide their origin, the Google Chrome icon is changed into a “Missed Call” notification. When this happens, one message informs the scammers that they can hack the phone. Another one shows a missed call from a medium called Esmeralda.</p>
<hr /><p><em>Once users press the fake push notification, their phones get hacked</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D14315&#038;text=Once%20users%20press%20the%20fake%20push%20notification%2C%20their%20phones%20get%20hacked&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<p>Scammers aim to take advantage of well-known applications. They create false alerts using the looks of popular apps. This confuses mobile phone users. Once they press the push notification, their phones get hacked. Thus, before pressing the notification, it is important to pay attention to the message that it contains and think if it is actually related to the nature of the app.</p>
<hr /><p><em>While fraudsters are becoming more creative, it is still possible to save ourselves from their attacks by becoming more aware of the latest scamming techniques</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D14315&#038;text=While%20fraudsters%20are%20becoming%20more%20creative%2C%20it%20is%20still%20possible%20to%20save%20ourselves%20from%20their%20attacks%20by%20becoming%20more%20aware%20of%20the%20latest%20scamming%20techniques&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<h5>Phishing with legal threats</h5>
<p>Another new strategy that creative spammers are now using is lawsuit emails. They send fake emails, which claim that the recipient is being sued and request to open and read the attached fraudulent documents and respond within seven days.The scammers use the names of existing law firms and falsify their email addresses. Most of the time, they target the employees of big companies. Around 100,000 businesses have been attacked to date — mostly in Canada.</p>
<hr /><p><em>Around 100,000 businesses have been attacked to date with legal threat phishing scams — mostly in Canada</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D14315&#038;text=Around%20100%2C000%20businesses%20have%20been%20attacked%20to%20date%20with%20legal%20threat%20phishing%20scams%20%E2%80%94%20mostly%20in%20Canada&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<h5>Steps anyone can take to protect themselves</h5>
<p>While fraudsters are becoming more creative, it is still possible to save ourselves from their attacks by becoming more aware of the latest scamming techniques. Then, it is crucial to check the messages, phone calls, and emails you receive before opening them. These are the basic but important steps in protecting ourselves handing our personal data to scammers.</p>
<p>The post <a href="https://techtrends.tech/tech-trends/expert-view-spam-and-phishing-trends/">Expert View: Spam and Phishing Trends</a> appeared first on <a href="https://techtrends.tech">Tech Trends</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">14315</post-id>	</item>
	</channel>
</rss>
