The FBI has placed a warning on cybercrooks mimicking its Internet Crime Complaint Center (IC3) website to mislead the public. The spoofed sites are designed to look very much like the official IC3 gateway (www.ic3.gov ), with slight domain variations like alternate spellings or varying top-level domains. The FBI pointed this out as an emerging malicious activity wherein attackers could gather personal data or scam users. Although the agency did not provide specific examples, cybersecurity publication BleepingComputer reported imposter domains like icc3[.]live, practicinglawyer[.]net, and ic3a[.]com. These fake portals are one component of an expansive scam strategy that has been documented more than 100 times between December 2023 and February 2025. Threat actors target victims with a plan to obtain personally identifiable information such as names, residential addresses, emails, telephone numbers, and financial information. Some websites go so far as to replicate FBI alerts, making them appear legitimate. In earlier scams related to this, scammers have already reached out to victims impersonating FBI or Europol officials, promising to help victims recover lost cryptocurrency or money—only to request further payments in the form of "local taxes" or "recovery fees." In order not to become a victim of these scams, the FBI advises users to always manually enter www.ic3.gov into their web browser instead of using search engines or sponsored links. Also, people should never exchange personal and financial details with online strangers, and keep in mind that real FBI or IC3 staff members will never contact victims or ask for payments directly via unsolicited emails, phone calls, or messages.
Researchers at Cofense Intelligence found the campaign of group Lone None distributing advanced malware in the form of spoofed copyright takedown notices. The campaign delivers the...
A widespread security issue has been uncovered in mobile apps using Firebase, where misconfigured services expose sensitive user data to unauthenticated attackers. First disclosed ...
A new phishing campaign is targeting PyPI maintainers using deceptive emails that mimic official PyPI communications. These emails, crafted to look like account verification reques...