digitalskeleton.com.ng
Open in
urlscan Pro
2a07:7800::170
Public Scan
URL:
https://digitalskeleton.com.ng/threads/cryptorom-crypto-scam-abusing-iphone-features-to-target-mobile-users.15398/
Submission: On March 22 via api from GB — Scanned from GB
Submission: On March 22 via api from GB — Scanned from GB
Form analysis
2 forms found in the DOMPOST /search/search
<form action="/search/search" method="post" class="menu-content" data-xf-init="quick-search">
<h3 class="menu-header">Search</h3>
<div class="menu-row">
<div class="inputGroup inputGroup--joined">
<input type="text" class="input" name="keywords" placeholder="Search…" aria-label="Search" data-menu-autofocus="true">
<select name="constraints" class="js-quickSearch-constraint input" aria-label="Search within" style="width: 110px; flex-grow: 0; flex-shrink: 0;">
<option value="">Everywhere</option>
<option value="{"search_type":"post"}">Threads</option>
<option value="{"search_type":"post","c":{"nodes":[6],"child_nodes":1}}">This forum</option>
<option value="{"search_type":"post","c":{"thread":15398}}">This thread</option>
</select>
</div>
</div>
<div class="menu-row">
<label class="iconic"><input type="checkbox" name="c[title_only]" value="1"><i aria-hidden="true"></i><span class="iconic-label">Search titles only</span></label>
</div>
<div class="menu-row">
<div class="inputGroup">
<span class="inputGroup-text" id="ctrl_search_menu_by_member">By:</span>
<input type="text" class="input" name="c[users]" data-xf-init="auto-complete" placeholder="Member" aria-labelledby="ctrl_search_menu_by_member" autocomplete="off">
</div>
</div>
<div class="menu-footer">
<span class="menu-footer-controls">
<button type="submit" class="button--primary button button--icon button--icon--search"><span class="button-text">Search</span></button>
<a href="/search/" class="button"><span class="button-text">Advanced search…</span></a>
</span>
</div>
<input type="hidden" name="_xfToken" value="1647929275,4b7325de6d5fb4ba98acbedab66f3590">
</form>
<form style="display:none" hidden="hidden">
<input type="text" name="_xfClientLoadTime" value="" id="_xfClientLoadTime" title="_xfClientLoadTime" tabindex="-1">
</form>
Text Content
* Upgrade * Home * Forums New posts Search forums * What's new New posts New resources Latest activity Log in Register What's new Search SEARCH Everywhere Threads This forum This thread Search titles only By: Search Advanced search… * New posts * Search forums Menu Log in -------------------------------------------------------------------------------- Register -------------------------------------------------------------------------------- Install the app Install * Home * Forums * Resources * CyberSecurity JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding. 'CRYPTOROM' CRYPTO SCAM ABUSING IPHONE FEATURES TO TARGET MOBILE USERS * Thread starter digitalskeleton * Start date Yesterday at 9:25 AM D DIGITALSKELETON Staff member * Yesterday at 9:25 AM * * #1 'CryptoRom' Crypto Scam Abusing iPhone Features to Target Mobile Users Social engineering attacks leveraging a combination of romantic lures and cryptocurrency fraud have been luring unsuspecting victims into installing fake apps by taking advantage of legitimate iOS features like TestFlight and Web Clips. Cybersecurity company Sophos, which has named the organized crime campaign "CryptoRom," characterized it as a wide-ranging global scam. "This style of You must log in or register to reply here. Share: Facebook Twitter Reddit Pinterest Tumblr WhatsApp Email Share Link * Home * Forums * Resources * CyberSecurity * Contact us * Terms and rules * Privacy policy * Help * Home * RSS * This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register. By continuing to use this site, you are consenting to our use of cookies. Accept Learn more… Top