cybernews.com
Open in
urlscan Pro
2606:4700:3108::ac42:283b
Public Scan
URL:
https://cybernews.com/news/hackers-exploit-capital-one-to-steal-identities/
Submission: On October 28 via api from US — Scanned from DE
Submission: On October 28 via api from US — Scanned from DE
Form analysis
2 forms found in the DOMGET https://cybernews.com/search/
<form class="header__search-form" action="https://cybernews.com/search/" method="get" data-js-search-mobile="">
<input class="header__search-form-input" placeholder="Search..." type="search" data-js-search-input-mobile="">
<button type="submit" class="header__search-form-button" title="Search">
<svg class="svg-icon header__search-form-button-icon" width="22" height="22">
<use xlink:href="#mdi-magnify"></use>
</svg>
</button>
</form>
POST /api/add-comment/
<form id="comment-form" class="space space_size_n text text_size_small" action="/api/add-comment/" method="POST">
<label for="comment-form-text">
<strong class="form-label form-label_required">Comment</strong>
<textarea id="comment-form-text" name="comment" required="" cols="45" rows="8" class="form-input space space_size_s" minlength="3"></textarea>
</label>
<div class="space space_size_n">
<div class="cells cells_responsive">
<label class="cells__item cells__item_width cells__item_width_2" for="comment-form-name">
<strong class="form-label form-label_required">Name</strong>
<input id="comment-form-name" type="text" name="name" required="" class="form-input space space_size_s" minlength="3">
</label>
<label class="cells__item cells__item_width cells__item_width_2" for="comment-form-email">
<strong class="form-label form-label_required">Email</strong>
<input id="comment-form-email" type="email" name="email" required="" class="form-input space space_size_s" minlength="3">
</label>
</div>
<label class="space space_size_n display_block" for="privacy_policy">
<strong class="form-label form-label_required">Privacy Policy Agreement</strong>
<span class="space space_size_s content display_block">
<input id="privacy_policy" name="privacy_policy" required="" type="checkbox"> I agree to the <a class="link" href="https://cybernews.com/terms-conditions/" target="_blank" rel="noreferrer">
Terms & Conditions
</a> and <a href="https://cybernews.com/privacy-policy/" target="_blank" rel="noreferrer">
Privacy Policy
</a>. </span>
</label>
</div>
<div class="space space_size_l">
<button class="button" type="submit"> Post comment </button>
</div>
</form>
Text Content
* News * Cybersecurity news * Cyber war news * Editorial * Security * Privacy * Crypto * Tech * Resources * What is a VPN? * How to use a VPN? * What is malware? * Are password managers safe? * More resources * Tools * Strong password generator * Personal data leak checker * Password leak checker * Website security checker * VPN speed test * Reviews * Antivirus software * Best VPN services * Password managers * Secure email providers * Best website builders * Best web hosting services * Follow * * * * * * © 2022 CyberNews - Latest tech news, product reviews, and analyses. If you purchase via links on our site, we may receive affiliate commissions. 1. Home 2. News HACKERS EXPLOIT CAPITAL ONE TO STEAL IDENTITIES Jurgita Lapienytė Chief Editor Updated on: 22 September 2022 -------------------------------------------------------------------------------- By Shutterstock Attackers impersonate an American bank holding Capital One to steal identities rather than account credentials. The ongoing phishing campaign exploits Capital One's recent partnership with an online verification service Authentify, cybersecurity company Vade said. "Like other highly publicized partnerships, the Capital One/Authentify collaboration piqued interest from phishers, who are known to pay attention to the news cycle," Vade said. Authentify also works with Bank of America, PNC Bank, Truist, U.S. Bank, and Wells Fargo. The fake email introduces the Authentify service and urges victims to upload their ID to start using it. Otherwise, the attackers threaten to restrict the account. Phishing emails were sent from an IP address in India. The link redirects victims to a phishing page impersonating Capital One, asking them to upload their state-issued IDs front and back. Fraudsters send up to 6,000 phishing emails daily, and the campaign is still ongoing. Financial services are highly targeted by threat actors. During the first half of 2022, 34% of all phishing URLs impersonated financial institutions. "We anticipate this trend to continue and urge users to be suspicious of both emails from financial institutions and also third-party applications associated with those institutions. Always operate under the assumption that both can be spoofed and always login to accounts directly from a browser or application and not from email," Vade said. -------------------------------------------------------------------------------- MORE FROM CYBERNEWS: Identity theft explained Synthetic ID fraud: who does it hurt the most? Best Fraud Protection Services in 2022 Stop sharing US domain-name user data, senators tell government On the frontline, Russia’s neighbors are boosting cybersecurity Ask.FM database with 350m user records allegedly sold online Ukraine applauds Amazon move to suspend business referral fees Subscribe to our newsletter Share Tweet Share Share Share -------------------------------------------------------------------------------- Editor's choice TECH Quantum superfridge just one more step along the road, says IBM expert by Damien Black 25 October 2022 IBM made the headlines this summer when it announced its “superfridge” Goldeneye, steadily approaching its superconducting version of quantum computing. But with the company itself admitting it may not even use it in future projects, just how much of a milestone was it? Read more about IBM made the headlines this summer when it announced its “superfridge” Goldeneye, steadily approaching its superconducting version of quantum computing. But with the company itself admitting it may not even use it in future projects, just how much of a milestone was it? To improve or to abandon: what should we do about racist AI? 25 October 2022 Playing with fire: millions of .git folders exposed to public 19 October 2022 Cybersecurity is the “soft underbelly” of space networks, says US military Commander 19 October 2022 DJI drone tracking data exposed in US 13 October 2022 -------------------------------------------------------------------------------- -------------------------------------------------------------------------------- -------------------------------------------------------------------------------- Leave a Reply Your email address will not be published. Required fields are marked Comment Name Email Privacy Policy Agreement I agree to the Terms & Conditions and Privacy Policy . Post comment * Categories * News * Editorial * Security * Privacy * Crypto * Cloud * Tech * Reviews * Antivirus Software * Password Managers * Best VPNs * Best VPN for Android * Secure Email Providers * Website Builders * Best Web Hosting Services * Tools * Password generator * Personal data leak checker * Password leak checker * Website security checker * VPN speed test * Coupon codes * ENGAGE * About Us * Send Us a Tip * Careers * * * * * * * About Us * Contact * Send Us a Tip * Privacy Policy * Terms & Conditions * Vulnerability Disclosure © 2022 Cybernews – Latest Cybersecurity and Tech News, Research & Analysis. This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy . I Agree