cybernews.com Open in urlscan Pro
2606:4700:3108::ac42:283b  Public Scan

URL: https://cybernews.com/news/hackers-exploit-capital-one-to-steal-identities/
Submission: On October 28 via api from US — Scanned from DE

Form analysis 2 forms found in the DOM

GET https://cybernews.com/search/

<form class="header__search-form" action="https://cybernews.com/search/" method="get" data-js-search-mobile="">
  <input class="header__search-form-input" placeholder="Search..." type="search" data-js-search-input-mobile="">
  <button type="submit" class="header__search-form-button" title="Search">
    <svg class="svg-icon header__search-form-button-icon" width="22" height="22">
      <use xlink:href="#mdi-magnify"></use>
    </svg>
  </button>
</form>

POST /api/add-comment/

<form id="comment-form" class="space space_size_n text text_size_small" action="/api/add-comment/" method="POST">
  <label for="comment-form-text">
    <strong class="form-label form-label_required">Comment</strong>
    <textarea id="comment-form-text" name="comment" required="" cols="45" rows="8" class="form-input space space_size_s" minlength="3"></textarea>
  </label>
  <div class="space space_size_n">
    <div class="cells cells_responsive">
      <label class="cells__item cells__item_width cells__item_width_2" for="comment-form-name">
        <strong class="form-label form-label_required">Name</strong>
        <input id="comment-form-name" type="text" name="name" required="" class="form-input space space_size_s" minlength="3">
      </label>
      <label class="cells__item cells__item_width cells__item_width_2" for="comment-form-email">
        <strong class="form-label form-label_required">Email</strong>
        <input id="comment-form-email" type="email" name="email" required="" class="form-input space space_size_s" minlength="3">
      </label>
    </div>
    <label class="space space_size_n display_block" for="privacy_policy">
      <strong class="form-label form-label_required">Privacy Policy Agreement</strong>
      <span class="space space_size_s content display_block">
        <input id="privacy_policy" name="privacy_policy" required="" type="checkbox"> &nbsp; I agree to the <a class="link" href="https://cybernews.com/terms-conditions/" target="_blank" rel="noreferrer">
Terms &amp; Conditions
</a> and <a href="https://cybernews.com/privacy-policy/" target="_blank" rel="noreferrer">
Privacy Policy
</a>. </span>
    </label>
  </div>
  <div class="space space_size_l">
    <button class="button" type="submit"> Post comment </button>
  </div>
</form>

Text Content

 * News
   * Cybersecurity news
   * Cyber war news
 * Editorial
 * Security
 * Privacy
 * Crypto
 * Tech
 * Resources
   * What is a VPN?
   * How to use a VPN?
   * What is malware?
   * Are password managers safe?
   * More resources
 * Tools
   * Strong password generator
   * Personal data leak checker
   * Password leak checker
   * Website security checker
   * VPN speed test
 * Reviews
   * Antivirus software
   * Best VPN services
   * Password managers
   * Secure email providers
   * Best website builders
   * Best web hosting services

 * Follow
   * 
   * 
   * 
   * 
   * 
   * 



© 2022 CyberNews - Latest tech news,
product reviews, and analyses.

If you purchase via links on our site, we may receive affiliate commissions.
 1. Home
 2. News


HACKERS EXPLOIT CAPITAL ONE TO STEAL IDENTITIES

Jurgita Lapienytė
Chief Editor
Updated on: 22 September 2022

--------------------------------------------------------------------------------

By Shutterstock


Attackers impersonate an American bank holding Capital One to steal identities
rather than account credentials.

The ongoing phishing campaign exploits Capital One's recent partnership with an
online verification service Authentify, cybersecurity company Vade said.

"Like other highly publicized partnerships, the Capital One/Authentify
collaboration piqued interest from phishers, who are known to pay attention to
the news cycle," Vade said. Authentify also works with Bank of America, PNC
Bank, Truist, U.S. Bank, and Wells Fargo.

The fake email introduces the Authentify service and urges victims to upload
their ID to start using it. Otherwise, the attackers threaten to restrict the
account.

Phishing emails were sent from an IP address in India. The link redirects
victims to a phishing page impersonating Capital One, asking them to upload
their state-issued IDs front and back.

Fraudsters send up to 6,000 phishing emails daily, and the campaign is still
ongoing.

Financial services are highly targeted by threat actors. During the first half
of 2022, 34% of all phishing URLs impersonated financial institutions.

"We anticipate this trend to continue and urge users to be suspicious of both
emails from financial institutions and also third-party applications associated
with those institutions. Always operate under the assumption that both can be
spoofed and always login to accounts directly from a browser or application and
not from email," Vade said.



--------------------------------------------------------------------------------


MORE FROM CYBERNEWS:

Identity theft explained

Synthetic ID fraud: who does it hurt the most?

Best Fraud Protection Services in 2022

Stop sharing US domain-name user data, senators tell government

On the frontline, Russia’s neighbors are boosting cybersecurity

Ask.FM database with 350m user records allegedly sold online

Ukraine applauds Amazon move to suspend business referral fees

Subscribe to our newsletter

Share
Tweet
Share
Share
Share

--------------------------------------------------------------------------------

Editor's choice
TECH
Quantum superfridge just one more step along the road, says IBM expert
by  Damien Black
25 October 2022

IBM made the headlines this summer when it announced its “superfridge”
Goldeneye, steadily approaching its superconducting version of quantum
computing. But with the company itself admitting it may not even use it in
future projects, just how much of a milestone was it?

Read more about IBM made the headlines this summer when it announced its
“superfridge” Goldeneye, steadily approaching its superconducting version of
quantum computing. But with the company itself admitting it may not even use it
in future projects, just how much of a milestone was it?
To improve or to abandon: what should we do about racist AI?
25 October 2022
Playing with fire: millions of .git folders exposed to public
19 October 2022
Cybersecurity is the “soft underbelly” of space networks, says US military
Commander
19 October 2022
DJI drone tracking data exposed in US
13 October 2022

--------------------------------------------------------------------------------



--------------------------------------------------------------------------------

--------------------------------------------------------------------------------

Leave a Reply

Your email address will not be published. Required fields are marked

Comment
Name Email
Privacy Policy Agreement   I agree to the Terms & Conditions and Privacy Policy
.
Post comment

 * Categories
   * News
   * Editorial
   * Security
   * Privacy
   * Crypto
   * Cloud
   * Tech
 * Reviews
   * Antivirus Software
   * Password Managers
   * Best VPNs
   * Best VPN for Android
   * Secure Email Providers
   * Website Builders
   * Best Web Hosting Services
 * Tools
   * Password generator
   * Personal data leak checker
   * Password leak checker
   * Website security checker
   * VPN speed test
   * Coupon codes
 * ENGAGE
   * About Us
   * Send Us a Tip
   * Careers

 * 
 * 
 * 
 * 
 * 
 * 

 * About Us
 * Contact
 * Send Us a Tip
 * Privacy Policy
 * Terms & Conditions
 * Vulnerability Disclosure

© 2022 Cybernews – Latest Cybersecurity and Tech News, Research & Analysis.



This website uses cookies. By continuing to use this website you are giving
consent to cookies being used. Visit our Privacy Policy .
I Agree