<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Camilo Gutiérrez Amaya &#8211; Bitfinance</title>
	<atom:link href="https://bitfinance.news/en/etiqueta/camilo-gutierrez-amaya-en/feed/" rel="self" type="application/rss+xml" />
	<link>https://bitfinance.news</link>
	<description>Fintech &#38; new economy info</description>
	<lastBuildDate>Tue, 25 Nov 2025 15:39:38 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://bitfinance.news/wp-content/uploads/2025/01/favicon-64.png</url>
	<title>Camilo Gutiérrez Amaya &#8211; Bitfinance</title>
	<link>https://bitfinance.news</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Cybersecurity and cryptocurrencies: advances, risks, and lessons learned in 2025</title>
		<link>https://bitfinance.news/en/cybersecurity-and-cryptocurrencies-advances-risks-and-lessons-learned-in-2025/</link>
		
		<dc:creator><![CDATA[Marilin Pino]]></dc:creator>
		<pubDate>Mon, 24 Nov 2025 13:00:10 +0000</pubDate>
				<category><![CDATA[Financial security]]></category>
		<category><![CDATA[Cryptocurrencies]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[2025]]></category>
		<category><![CDATA[advances]]></category>
		<category><![CDATA[Camilo Gutiérrez Amaya]]></category>
		<category><![CDATA[crypto world]]></category>
		<category><![CDATA[cryptocurrencies]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[ESET]]></category>
		<category><![CDATA[ESET Latin America]]></category>
		<category><![CDATA[ESET Venezuela]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[highly specialized criminals]]></category>
		<category><![CDATA[lessons learned]]></category>
		<category><![CDATA[Research Lab]]></category>
		<category><![CDATA[risks]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[technical intrusions]]></category>
		<guid isPermaLink="false">https://bitfinance.news/?p=117602</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="900" height="556" src="https://bitfinance.news/wp-content/uploads/2025/11/BFN-Imagen-referencial-Ciberseguridad-en-el-mundo-cripto-avances-riesgos-y-aprendizajes-de-2025-Sumainistrada-por-ESET-y-Comstat-R.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="ESET fomenta la reflexión y analiza cómo durante el año que finaliza, pérdidas multimillonarias y ataques sofisticados pusieron a prueba la confianza en cuanto al futuro del mundo cripto" decoding="async" fetchpriority="high" srcset="https://bitfinance.news/wp-content/uploads/2025/11/BFN-Imagen-referencial-Ciberseguridad-en-el-mundo-cripto-avances-riesgos-y-aprendizajes-de-2025-Sumainistrada-por-ESET-y-Comstat-R.jpg 900w, https://bitfinance.news/wp-content/uploads/2025/11/BFN-Imagen-referencial-Ciberseguridad-en-el-mundo-cripto-avances-riesgos-y-aprendizajes-de-2025-Sumainistrada-por-ESET-y-Comstat-R-300x185.jpg 300w, https://bitfinance.news/wp-content/uploads/2025/11/BFN-Imagen-referencial-Ciberseguridad-en-el-mundo-cripto-avances-riesgos-y-aprendizajes-de-2025-Sumainistrada-por-ESET-y-Comstat-R-768x474.jpg 768w" sizes="(max-width: 900px) 100vw, 900px" /></div><p>The year 2025 was marked by record losses from attacks and fraud in the cryptocurrency universe. In the first half of the year alone, thefts totaled $2.17 billion, surpassing the total value recorded in 2024, according to Chainalysis. Projections indicate that 2025 could end with more than $4 billion in stolen assets, an all-time high. [&#8230;]</p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/cybersecurity-and-cryptocurrencies-advances-risks-and-lessons-learned-in-2025/">Cybersecurity and cryptocurrencies: advances, risks, and lessons learned in 2025</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="900" height="556" src="https://bitfinance.news/wp-content/uploads/2025/11/BFN-Imagen-referencial-Ciberseguridad-en-el-mundo-cripto-avances-riesgos-y-aprendizajes-de-2025-Sumainistrada-por-ESET-y-Comstat-R.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="ESET fomenta la reflexión y analiza cómo durante el año que finaliza, pérdidas multimillonarias y ataques sofisticados pusieron a prueba la confianza en cuanto al futuro del mundo cripto" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2025/11/BFN-Imagen-referencial-Ciberseguridad-en-el-mundo-cripto-avances-riesgos-y-aprendizajes-de-2025-Sumainistrada-por-ESET-y-Comstat-R.jpg 900w, https://bitfinance.news/wp-content/uploads/2025/11/BFN-Imagen-referencial-Ciberseguridad-en-el-mundo-cripto-avances-riesgos-y-aprendizajes-de-2025-Sumainistrada-por-ESET-y-Comstat-R-300x185.jpg 300w, https://bitfinance.news/wp-content/uploads/2025/11/BFN-Imagen-referencial-Ciberseguridad-en-el-mundo-cripto-avances-riesgos-y-aprendizajes-de-2025-Sumainistrada-por-ESET-y-Comstat-R-768x474.jpg 768w" sizes="(max-width: 900px) 100vw, 900px" /></div><p style="text-align: justify;">The year 2025 was marked by record losses from attacks and fraud in the <strong>cryptocurrency universe</strong>. In the first half of the year alone, thefts totaled $2.17 billion, surpassing the total value recorded in 2024, <a href="https://investalk.bb.com.br/noticias/mercado/valor-de-criptoativos-roubados-em-2025-ja-supera-o-total-de-2024-mostra-chainalysis" target="_blank" rel="noopener">according to Chainalysis</a>. Projections indicate that <strong>2025 could end with more than $4 billion in stolen assets, an all-time high.</strong></p>
<p style="text-align: justify;"><strong><a href="https://www.eset.com/latam/" target="_blank" rel="noopener">ESET,</a> a leading company in proactive threat detection,</strong> reviews some of the major cases that occurred in 2025 and how seemingly simple vulnerabilities resulted in <strong>multimillion-dollar thefts that shook the cryptocurrency market.</strong></p>
<p style="text-align: justify;">This scenario of vulnerability contrasts sharply with the growing institutionalization of the sector, where <a href="https://bitfinance.news/en/spain-approves-law-to-end-spam-calls/" target="_blank" rel="noopener">cryptocurrency ETFs registered record inflows of $5.95 billion</a> and corporate investors like Strategy (formerly MicroStrategy) announced new Bitcoin purchases. The market, however, exposed its security weaknesses. “The BBC noted that <a href="https://www.bbc.com/mundo/articles/c78e947586eo" target="_blank" rel="noopener">the $1.5 billion attack on the Bybit exchange</a>, attributed to hackers linked to North Korea, was the largest in history, thus symbolizing this contradiction: even with regulatory and technical advances, known vulnerabilities continue to be exploited,” comments <strong>Camilo Gutiérrez Amaya, Head of the Research Lab at ESET Latin America.</strong></p>
<p style="text-align: justify;"><strong>2025 is shaping up to be a year of historic losses for the cryptocurrency market.</strong> According to <a href="https://bitfinance.news/en/meta-wins-social-media-monopoly-case/" target="_blank" rel="noopener">CertiK</a>, the industry lost nearly $2.5 billion to attacks and scams in the first six months of the year alone. <a href="https://bitfinance.news/en/hydrocarbons-sector-contributes-17-of-venezuelas-gdp/" target="_blank" rel="noopener">Chainalysis</a>, on the other hand, noted that the volume of stolen crypto assets in the same period surpassed the $2.17 billion mark recorded for all of 2024.</p>
<p style="text-align: justify;">At this rate, according to ESET, losses could exceed $4 billion by the end of the year, <strong>making 2025 the year with the largest amount of stolen assets in cryptocurrency history.</strong></p>
<h3 style="text-align: left;">Vulnerabilities that can lead to multimillion-dollar losses</h3>
<p style="text-align: justify;">ESET has analyzed the most significant incidents of the year, illustrating <strong>how vulnerabilities of different kinds can result in multimillion-dollar losses:</strong></p>
<ol>
<li><strong>Attacks on exchanges and centralized platforms (CEXs):</strong> Among the most emblematic incidents is the <a href="https://www.bbc.com/portuguese/articles/crlx21zjnn4o" target="_blank" rel="noopener">attack on Bybit</a>, which resulted in the theft of approximately $1.5 billion worth of Ethereum, the largest ever recorded in cryptocurrency history. In this case, the attackers didn&#8217;t directly breach the exchange&#8217;s servers, but rather compromised a third-party platform provider, changing the wallet address where the funds were transferred. ByBit thought it was transferring the funds to its own digital wallet, but it was sending everything to the hackers. The sophistication of the operation revealed how chains of trust and external integrations can become entry points for highly specialized criminals.</li>
<li style="text-align: justify;"><strong>Exploits in DeFi protocols:</strong> The <a href="https://www.infomoney.com.br/onde-investir/hacker-rouba-mais-de-r-500-milhoes-em-ataque-a-servico-de-criptomoedas/" target="_blank" rel="noopener">Balancer</a> attack, which caused losses of over $100 million, highlighted one of the recurring weaknesses in the <a href="https://conteudos.xpi.com.br/criptomoedas/o-que-e-defi-entenda-como-funciona-as-financas-descentralizadas/" target="_blank" rel="noopener">DeFi space</a>: errors in the code. A bug in the smart contract allowed unauthorized withdrawals, exposing how small logical flaws can be exploited to compromise an entire protocol. The impact extended to derivative projects, such as Beets Finance, which also reported losses in the millions. These incidents reinforce the importance of continuous and independent audits, a challenge for protocols that prioritize innovation and speed of launch.</li>
<li><strong>Phishing scams:</strong> While large platforms suffered coordinated attacks, individual users remained the preferred targets. Phishing scams, in which victims are tricked into voluntarily surrendering their credentials, resulted in $410 million in losses, according to <a href="https://conteudos.xpi.com.br/criptomoedas/o-que-e-defi-entenda-como-funciona-as-financas-descentralizadas/" target="_blank" rel="noopener">Certik</a>. Attacks targeting individuals are estimated to have accounted for 23.35 % of all stolen funds during the period, a sign that <a href="https://www.eset.com/latam/blog/cultura-y-seguridad-digital/que-es-la-ingenieria-social/?utm_source=welivesecurity.com&amp;utm_medium=referral&amp;utm_campaign=autotagging&amp;utm_content=seguridad-digital&amp;utm_term=es" target="_blank" rel="noopener">social engineering</a> remains as effective as technical intrusions.</li>
<li style="text-align: justify;"><strong>Historical attacks and bridge vulnerabilities:</strong> Although no major bridge-related incidents occurred in 2025, this type of attack remains one of the most destructive. The memory of the <a href="https://bitfinance.news/en/hydrocarbons-sector-contributes-17-of-venezuelas-gdp/" target="_blank" rel="noopener">2022 Ronin Bridge breach</a>, in which $600 million was stolen, remains a constant warning. These failures show how the interconnectivity between networks, essential for the scalability of the crypto ecosystem, also expands the attack surface and can turn a single code error into a systemic collapse.</li>
</ol>
<p style="text-align: justify;"><em>“Recent attacks reveal the increasing professionalization of cryptocurrency-related cybercrime. Even with the growing technical and regulatory maturity of the ecosystem, cybercriminals have shown they remain one step ahead in 2025, improving their methods, exploiting known vulnerabilities, and diversifying their targets. While the industry has matured in terms of regulation, transparency, and infrastructure, many attacks exploited human error, poorly managed integrations, and unaudited code—issues that innovation alone cannot eliminate,”</em> notes Gutierrez Amaya.</p>
<p style="text-align: justify;">ESET invites you to learn more about cybersecurity by visiting: <a href="https://www.welivesecurity.com/es/" target="_blank" rel="noopener">https://www.welivesecurity.com/es/</a>.</p>
<p style="text-align: justify;">For other useful preventative information, also available in Venezuela:  <a href="https://www.eset.com/ve/" target="_blank" rel="noopener">https://www.eset.com/ve/</a>, and on their social media channels @eset_ve. Also on Instagram <a href="https://www.instagram.com/esetla/" target="_blank" rel="noopener">@esetla</a>) and Facebook (<a href="https://www.facebook.com/ESETLA" target="_blank" rel="noopener">ESET</a>).</p>
<p style="text-align: justify;"><em>With information and reference image provided by ESET and Comstat Rowland</em></p>
<p>Visit our news channel on <a href="https://news.google.com/publications/CAAqBwgKMP_wxAswoozcAw?ceid=VE:es-419&amp;oc=3" target="_blank" rel="noopener"><strong>Google News</strong></a> and follow us to get accurate, interesting information and stay up to date with everything. You can also see our daily content on <a href="https://twitter.com/BitFinance_News" target="_blank" rel="noopener"><strong>X/Twitter</strong></a> and <a href="https://www.instagram.com/bitfinancenews/?hl=es" target="_blank" rel="noopener"><strong>Instagram</strong></a></p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/cybersecurity-and-cryptocurrencies-advances-risks-and-lessons-learned-in-2025/">Cybersecurity and cryptocurrencies: advances, risks, and lessons learned in 2025</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Five key actions to take after discovering a cyberattack</title>
		<link>https://bitfinance.news/en/five-key-actions-to-take-after-discovering-a-cyberattack/</link>
		
		<dc:creator><![CDATA[Marilin Pino]]></dc:creator>
		<pubDate>Wed, 19 Nov 2025 13:00:51 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Financial security]]></category>
		<category><![CDATA[Innovation]]></category>
		<category><![CDATA[5 key actions]]></category>
		<category><![CDATA[Camilo Gutiérrez Amaya]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[ESET]]></category>
		<category><![CDATA[ESET Latin America]]></category>
		<category><![CDATA[ESET Venezuela]]></category>
		<category><![CDATA[Guide]]></category>
		<category><![CDATA[how to act]]></category>
		<category><![CDATA[Research Lab]]></category>
		<category><![CDATA[the first 24 to 48 hours after discovering an attack]]></category>
		<guid isPermaLink="false">https://bitfinance.news/?p=117498</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="1244" height="680" src="https://bitfinance.news/wp-content/uploads/2025/11/Imagen-destacada-o-principal-5-acciones-clave-tras-descubrir-un-ciberataque-Suministrada-por-ESET-y-Comstat-R.jpeg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="ESET Latinoamérica explica que actuar rápido y con precisión luego de un ciberataque puede marcar la diferencia entre una crisis controlada y un desastre empresarial" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2025/11/Imagen-destacada-o-principal-5-acciones-clave-tras-descubrir-un-ciberataque-Suministrada-por-ESET-y-Comstat-R.jpeg 1244w, https://bitfinance.news/wp-content/uploads/2025/11/Imagen-destacada-o-principal-5-acciones-clave-tras-descubrir-un-ciberataque-Suministrada-por-ESET-y-Comstat-R-300x164.jpeg 300w, https://bitfinance.news/wp-content/uploads/2025/11/Imagen-destacada-o-principal-5-acciones-clave-tras-descubrir-un-ciberataque-Suministrada-por-ESET-y-Comstat-R-1024x560.jpeg 1024w, https://bitfinance.news/wp-content/uploads/2025/11/Imagen-destacada-o-principal-5-acciones-clave-tras-descubrir-un-ciberataque-Suministrada-por-ESET-y-Comstat-R-768x420.jpeg 768w" sizes="(max-width: 1244px) 100vw, 1244px" /></div><p>The number of data breaches in 2024, investigated by Verizon, increased by 20 percentage points in the total number of incidents compared to the previous year. ESET, a leading company in proactive threat detection, asserts that prior preparation is significantly important for providing an effective incident response (IR). Once threats infiltrate a network, time is [&#8230;]</p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/five-key-actions-to-take-after-discovering-a-cyberattack/">Five key actions to take after discovering a cyberattack</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="1244" height="680" src="https://bitfinance.news/wp-content/uploads/2025/11/Imagen-destacada-o-principal-5-acciones-clave-tras-descubrir-un-ciberataque-Suministrada-por-ESET-y-Comstat-R.jpeg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="ESET Latinoamérica explica que actuar rápido y con precisión luego de un ciberataque puede marcar la diferencia entre una crisis controlada y un desastre empresarial" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2025/11/Imagen-destacada-o-principal-5-acciones-clave-tras-descubrir-un-ciberataque-Suministrada-por-ESET-y-Comstat-R.jpeg 1244w, https://bitfinance.news/wp-content/uploads/2025/11/Imagen-destacada-o-principal-5-acciones-clave-tras-descubrir-un-ciberataque-Suministrada-por-ESET-y-Comstat-R-300x164.jpeg 300w, https://bitfinance.news/wp-content/uploads/2025/11/Imagen-destacada-o-principal-5-acciones-clave-tras-descubrir-un-ciberataque-Suministrada-por-ESET-y-Comstat-R-1024x560.jpeg 1024w, https://bitfinance.news/wp-content/uploads/2025/11/Imagen-destacada-o-principal-5-acciones-clave-tras-descubrir-un-ciberataque-Suministrada-por-ESET-y-Comstat-R-768x420.jpeg 768w" sizes="(max-width: 1244px) 100vw, 1244px" /></div><p style="text-align: justify;">The number of data breaches in 2024, investigated <a href="https://www.verizon.com/business/resources/T23a/reports/2025-dbir-data-breach-investigations-report.pdf" target="_blank" rel="noopener">by Verizon</a>, increased by 20 percentage points in the total number of incidents compared to the previous year. <a href="https://www.eset.com/latam/" target="_blank" rel="noopener">ESET</a>, a leading company in proactive threat detection, asserts that prior preparation is significantly important for providing an effective incident response (IR).</p>
<p style="text-align: justify;">Once threats infiltrate a network, time is of the essence, and stopping them before they cause harm is increasingly difficult. According to the <a href="https://reliaquest.com/blog/racing-the-clock-outpacing-accelerating-attacks/" target="_blank" rel="noopener">latest research</a>, in 2024, adversaries were 22 % faster than the previous year in progressing from initial access to lateral movement (also known as &#8220;time to escape&#8221;). The average penetration time was 48 minutes, although the fastest recorded attack was almost half that: just 27 minutes.</p>
<figure id="attachment_117494" aria-describedby="caption-attachment-117494" style="width: 570px" class="wp-caption alignnone"><img decoding="async" class="wp-image-117494 size-full" src="https://bitfinance.news/wp-content/uploads/2025/11/Imagen-referencial-B-Para-acompanar-el-texto.png" alt="Ransomware detections chart between June 2024 and May 2025 (source: ESET Threat Report H1 2025)" width="570" height="294" srcset="https://bitfinance.news/wp-content/uploads/2025/11/Imagen-referencial-B-Para-acompanar-el-texto.png 570w, https://bitfinance.news/wp-content/uploads/2025/11/Imagen-referencial-B-Para-acompanar-el-texto-300x155.png 300w" sizes="(max-width: 570px) 100vw, 570px" /><figcaption id="caption-attachment-117494" class="wp-caption-text">Ransomware detections chart between June 2024 and May 2025 (source: <a href="https://web-assets.esetstatic.com/wls/en/papers/threat-reports/eset-threat-report-h12025.pdf#page=33" target="_blank" rel="noopener">ESET Threat Report H1 2025</a>)</figcaption></figure>
<p>&nbsp;</p>
<p style="text-align: justify;"><em>&#8220;A data breach doesn&#8217;t have to be as catastrophic as it seems for network defenders, as long as teams are able to respond quickly and decisively to intrusions. While every organization (and every incident) is different, if all members of the incident response team know exactly what they have to do, and nothing is left to chance or improvised, there&#8217;s a greater chance of a quick, successful, and low-cost resolution,&#8221;</em> says<strong> Camilo Gutiérrez Amaya, Head of the ESET Latin America Research Lab.</strong></p>
<h3 style="text-align: left;">Guide on how to act during the first 24 to 48 hours</h3>
<p style="text-align: justify;">ESET clarifies that no organization is 100% protected or breach-proof, and that if an incident occurs and unauthorized access is suspected, a methodical and rapid response is essential. To this end, <strong>a guide on how to act quickly and thoroughly during the first 24 to 48 hours, without compromising accuracy or evidence, is extremely useful:</strong></p>
<ol style="text-align: justify;">
<li><strong>Gather information and understand the scope:</strong> The first step is to understand exactly what happened, activate the pre-established incident response plan, and notify the team. This group should include stakeholders from across the company, including human resources, public relations and communications, the legal department, and executive management. They all have an important role to play after the incident.</li>
</ol>
<p style="text-align: justify;">Next, the scope of the attack is assessed: How did the attacker gain access to the company&#8217;s network? Which systems were compromised? What malicious actions have the attackers already taken?</p>
<p style="text-align: justify;">It is essential to document each step and gather evidence, both to evaluate the impact of the attack and for the forensic investigation stage, and even for future legal proceedings. Maintaining the chain of custody ensures credibility should law enforcement or the courts need to intervene.</p>
<ol style="text-align: justify;" start="2">
<li><strong>Notify third parties:</strong> Once it has been established what happened, it is necessary to inform the relevant authorities.</li>
</ol>
<ul style="text-align: justify;">
<li>Regulators: If personally identifiable information (PII) has been stolen, the appropriate authorities must be contacted under data protection or industry-specific laws. In the United States, for example, action must be taken in accordance with the SEC&#8217;s cybersecurity disclosure rules or state-level violation laws.</li>
</ul>
<ul style="text-align: justify;">
<li>Insurance companies: Most insurance policies stipulate that your insurance provider be informed as soon as a violation has occurred.</li>
<li>Customers, partners, and employees: Transparency builds trust and helps prevent misinformation. It&#8217;s best to inform them before the information spreads through social media or news outlets.</li>
</ul>
<ul style="text-align: justify;">
<li>Law enforcement agencies: Reporting incidents, especially ransomware, can help identify larger campaigns or provide decryption tools and intelligence support.</li>
</ul>
<ul style="text-align: justify;">
<li>External experts: It may also be necessary to contact external legal and IT specialists.</li>
</ul>
<ol style="text-align: justify;" start="3">
<li><strong>Isolate and contain:</strong> While maintaining contact with relevant third parties, work quickly to prevent the attack from spreading. It is recommended to isolate affected systems from the internet without powering down devices, to limit the attacker&#8217;s reach without compromising potentially valuable evidence.</li>
</ol>
<p style="text-align: justify;">All backups should be taken offline and disconnected to prevent them from being hijacked or <a href="https://www.welivesecurity.com/2021/06/18/5-essential-things-do-before-ransomware-strikes/" target="_blank" rel="noopener">corrupted</a> by ransomware. Disable all remote access, reset VPN credentials, and use security tools to block any incoming malicious traffic and command and control connections.</p>
<ol style="text-align: justify;" start="4">
<li><strong>Remove and recover:</strong> A forensic analysis must be performed to understand the attacker&#8217;s tactics, techniques, and procedures (TTPs), from initial entry to lateral movement and (if applicable) encryption or data exfiltration. Any persistent malware, backdoors, fraudulent accounts, and other signs of danger must be removed. Recovery and restoration require removing malware and unauthorized accounts, verifying the integrity of critical systems and data, restoring clean backups (after confirming they are not compromised), and closely monitoring for signs of renewed compromise or persistence mechanisms.</li>
</ol>
<p style="text-align: justify;">This phase can be used to rebuild systems and strengthen privilege controls, implement stricter authentication, and reinforce network segmentation. Partners offering tools such as ESET <a href="https://www.eset.com/us/about/newsroom/products/eset-launches-ransomware-remediation-and-ai-advisor-updates-at-eset-world-2025/?utm_source=welivesecurity.com&amp;utm_medium=referral&amp;utm_campaign=autotagging&amp;utm_content=seguridad-para-empresas&amp;utm_term=es" target="_blank" rel="noopener">Ransomware Remediation</a> can accelerate the process.</p>
<ol style="text-align: justify;" start="5">
<li>Review and Improve: Once the immediate threat has passed, it&#8217;s time to review obligations to regulators, customers, and other stakeholders (e.g., partners and suppliers). It is necessary to update communications once the scope of the breach is understood, which could include filing a report with regulatory bodies. This initiative should be driven by legal and public relations advisors.</li>
</ol>
<p style="text-align: justify;">The post-incident review can be a catalyst for resilience. Once the situation has calmed, it is also a good idea to investigate what happened and what lessons can be learned to prevent a similar incident from occurring in the future. A useful step would be to introduce adjustments to the incident management plan or recommend new security controls and employee training.</p>
<h4 style="text-align: left;">A strong incident response culture treats each breach as a training exercise for the next, improving defenses and decision-making under stress</h4>
<p style="text-align: justify;"><em><strong>“It’s not always possible to prevent a breach, but it is possible to minimize the damage.</strong> If your organization doesn’t have the resources to monitor threats 24/7, consider hiring a managed detection and response (MDR) service from a trusted third party. Whatever happens, test your</em> <em>incident response plan, and then test it again. Because successful incident response isn’t just an IT issue. It requires a range of stakeholders from across the organization and external partners working together seamlessly. The kind of muscle memory everyone needs often takes a lot of practice to develop,”</em> concludes Gutiérrez Amaya of ESET Latin America.</p>
<p style="text-align: justify;">ESET invites you to learn more about cybersecurity by visiting: <a href="https://www.welivesecurity.com/es/" target="_blank" rel="noopener">https://www.welivesecurity.com/es/</a>.</p>
<p style="text-align: justify;">For other useful preventative information, also available in Venezuela at: <a href="https://www.eset.com/ve/" target="_blank" rel="noopener">https://www.eset.com/ve/</a>, and on their social media channels @eset_ve. Also on Instagram (<a href="mailto:@esetla" target="_blank" rel="noopener">@esetla</a>) and Facebook (<a href="https://www.facebook.com/ESETLA" target="_blank" rel="noopener">ESET</a>).</p>
<p style="text-align: justify;"><em>With information and images provided by ESET and Comstat Rowland</em></p>
<p>Visit our news channel on <a href="https://news.google.com/publications/CAAqBwgKMP_wxAswoozcAw?ceid=VE:es-419&amp;oc=3" target="_blank" rel="noopener"><strong>Google News</strong></a> and follow us to get accurate, interesting information and stay up to date with everything. You can also see our daily content on <a href="https://twitter.com/BitFinance_News" target="_blank" rel="noopener"><strong>X/Twitter</strong></a> and <a href="https://www.instagram.com/bitfinancenews/?hl=es" target="_blank" rel="noopener"><strong>Instagram</strong></a></p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/five-key-actions-to-take-after-discovering-a-cyberattack/">Five key actions to take after discovering a cyberattack</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to detect fake job applicants: corporate espionage with malicious informants</title>
		<link>https://bitfinance.news/en/how-to-detect-fake-job-applicants-corporate-espionage-with-malicious-informants/</link>
		
		<dc:creator><![CDATA[Marilin Pino]]></dc:creator>
		<pubDate>Sat, 08 Nov 2025 14:00:20 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Financial security]]></category>
		<category><![CDATA[Innovation]]></category>
		<category><![CDATA[Other topics]]></category>
		<category><![CDATA[Applying human expertise and technical controls proactively]]></category>
		<category><![CDATA[Camilo Gutiérrez Amaya]]></category>
		<category><![CDATA[corporate espionage]]></category>
		<category><![CDATA[detection and protection]]></category>
		<category><![CDATA[ESET]]></category>
		<category><![CDATA[ESET Latin America]]></category>
		<category><![CDATA[Europe]]></category>
		<category><![CDATA[fake job applicants]]></category>
		<category><![CDATA[Research Lab]]></category>
		<category><![CDATA[scam]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">https://bitfinance.news/?p=117258</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="1100" height="618" src="https://bitfinance.news/wp-content/uploads/2025/11/Imagen-referencial-Espionaje-corporativo-¿como-detectar-falsos-postulantes-a-empleos-Suministrada-por-ESET-y-Comstat-R.jpeg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="ESET alerta sobre que ninguna organización es inmune al riesgo de contratar inadvertidamente a un saboteador. Los mejores métodos para evitar que falsos candidatos se conviertan en informadores maliciosos combinan conocimientos humanos y controles técnicos" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2025/11/Imagen-referencial-Espionaje-corporativo-¿como-detectar-falsos-postulantes-a-empleos-Suministrada-por-ESET-y-Comstat-R.jpeg 1100w, https://bitfinance.news/wp-content/uploads/2025/11/Imagen-referencial-Espionaje-corporativo-¿como-detectar-falsos-postulantes-a-empleos-Suministrada-por-ESET-y-Comstat-R-300x169.jpeg 300w, https://bitfinance.news/wp-content/uploads/2025/11/Imagen-referencial-Espionaje-corporativo-¿como-detectar-falsos-postulantes-a-empleos-Suministrada-por-ESET-y-Comstat-R-1024x575.jpeg 1024w, https://bitfinance.news/wp-content/uploads/2025/11/Imagen-referencial-Espionaje-corporativo-¿como-detectar-falsos-postulantes-a-empleos-Suministrada-por-ESET-y-Comstat-R-768x431.jpeg 768w" sizes="(max-width: 1100px) 100vw, 1100px" /></div><p>In July 2024, cybersecurity provider KnowBe4 began observing suspicious activity related to a new employee who started manipulating and transferring potentially harmful files and attempted to run unauthorized software. It was later discovered that he was a North Korean worker who had deceived the company&#8217;s human resources team to obtain a remote job. In total, [&#8230;]</p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/how-to-detect-fake-job-applicants-corporate-espionage-with-malicious-informants/">How to detect fake job applicants: corporate espionage with malicious informants</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="1100" height="618" src="https://bitfinance.news/wp-content/uploads/2025/11/Imagen-referencial-Espionaje-corporativo-¿como-detectar-falsos-postulantes-a-empleos-Suministrada-por-ESET-y-Comstat-R.jpeg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="ESET alerta sobre que ninguna organización es inmune al riesgo de contratar inadvertidamente a un saboteador. Los mejores métodos para evitar que falsos candidatos se conviertan en informadores maliciosos combinan conocimientos humanos y controles técnicos" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2025/11/Imagen-referencial-Espionaje-corporativo-¿como-detectar-falsos-postulantes-a-empleos-Suministrada-por-ESET-y-Comstat-R.jpeg 1100w, https://bitfinance.news/wp-content/uploads/2025/11/Imagen-referencial-Espionaje-corporativo-¿como-detectar-falsos-postulantes-a-empleos-Suministrada-por-ESET-y-Comstat-R-300x169.jpeg 300w, https://bitfinance.news/wp-content/uploads/2025/11/Imagen-referencial-Espionaje-corporativo-¿como-detectar-falsos-postulantes-a-empleos-Suministrada-por-ESET-y-Comstat-R-1024x575.jpeg 1024w, https://bitfinance.news/wp-content/uploads/2025/11/Imagen-referencial-Espionaje-corporativo-¿como-detectar-falsos-postulantes-a-empleos-Suministrada-por-ESET-y-Comstat-R-768x431.jpeg 768w" sizes="(max-width: 1100px) 100vw, 1100px" /></div>
<p style="text-align: justify;">In July 2024, cybersecurity provider <a href="https://blog.knowbe4.com/how-a-north-korean-fake-it-worker-tried-to-infiltrate-us" target="_blank" rel="noopener">KnowBe4 began observing suspicious activity</a> related to <strong>a new employee</strong> who started <strong>manipulating and transferring potentially harmful files and attempted to run unauthorized software.</strong> It was later discovered that he was a North Korean worker who had deceived the company&#8217;s human resources team to obtain a remote job. In total, he managed to pass four video conference interviews, as well as a pre-employment background check.</p>



<p style="text-align: justify;"><a href="https://www.eset.com/latam/" target="_blank" rel="noopener"><strong>ESET</strong></a>, a leading company in proactive threat detection, analyzes and delves into this scam and warns that <strong>no organization is immune to the risk of inadvertently hiring a saboteur.</strong></p>



<p style="text-align: justify;"><em>“<a href="https://bitfinance.news/en/china-extends-visa-free-transit-to-more-countries-until-december-2026/" target="_blank" rel="noopener">Identity-based threats</a> are not limited to password theft or account takeover, but extend to new hires. As <a href="https://bitfinance.news/en/shrimp-ranks-as-a-leading-export-product-in-venezuela/" target="_blank" rel="noopener">AI becomes more adept at falsifying reality</a>, it becomes essential to refine and optimize hiring processes” </em>warns <strong>Camilo Gutiérrez Amaya, Head of the ESET Latin America Research Lab.</strong></p>



<p style="text-align: justify;">This type of threat has been present since at least April 2017, according to an <a href="https://www.fbi.gov/wanted/cyber/dprk-it-workers" target="_blank" rel="noopener">FBI alert</a> and tracked as <a href="https://www.welivesecurity.com/es/investigaciones/deceptivedevelopment-infostealers-cryptocurrency-fraude-laboral/" target="_blank" rel="noopener">WageMole by ESET Research</a>. <a href="https://www.microsoft.com/en-us/security/blog/2025/06/30/jasper-sleet-north-korean-remote-it-workers-evolving-tactics-to-infiltrate-organizations/" target="_blank" rel="noopener">According to Microsoft</a>, the US government has discovered more than 300 companies—some of them Fortune 500—that have fallen victim to these types of attacks between 2020 and 2022. The tech giant was forced in June to <a href="https://therecord.media/microsoft-shuts-down-3000-north-korea-it-worker-email" target="_blank" rel="noopener">suspend</a> 3,000 Outlook and Hotmail accounts created by North Korean job applicants.</p>



<p style="text-align: justify;">Furthermore, a US <a href="https://www.justice.gov/opa/pr/two-north-korean-nationals-and-three-facilitators-indicted-multi-year-fraudulent-remote" target="_blank" rel="noopener">indictment</a> accuses two North Koreans and three &#8220;facilitators&#8221; of obtaining more than $860,000 from 10 of the more than 60 companies where they worked. <a href="https://www.welivesecurity.com/en/eset-research/deceptivedevelopment-from-primitive-crypto-theft-to-sophisticated-ai-based-deception/" target="_blank" rel="noopener">ESET&#8217;s research</a> team warns that the focus has recently shifted to Europe, including France, Poland, and Ukraine. <a href="https://www.theguardian.com/technology/2025/apr/20/british-firms-urged-to-hold-video-or-in-person-interviews-amid-north-korea-job-scam" target="_blank" rel="noopener">Google, for its part, has warned</a> that British companies are also being targeted.</p>



<h2 class="wp-block-heading" style="text-align: left;">Identity theft scams</h2>



<p style="text-align: justify;">These scams are possible because fraudsters create or steal identities that match the location of the target organization and then open email accounts, social media profiles, and fake accounts on developer platforms like GitHub to add legitimacy. During the hiring process, they may use <strong>deepfake images and videos, or face-swapping and voice-changing software</strong>, to <a href="https://www.welivesecurity.com/es/seguridad-digital/fraude-identificacion-inteligencia-artificial/" target="_blank" rel="noopener">disguise their identity</a> or create synthetic ones.</p>



<p style="text-align: justify;">According to ESET researchers, the WageMole group is linked to another North Korean campaign they track as <em><a href="https://www.welivesecurity.com/es/investigaciones/deceptivedevelopment-desarrolladores-freelancers-oferta-falsa-infostealers/" target="_blank" rel="noopener">DeceptiveDevelopment</a></em>. This campaign focuses on tricking Western developers into applying for nonexistent jobs. The scammers ask their victims to participate in a coding challenge or a pre-interview task. But the project they download to participate actually contains Trojanized code. WageMole steals these developer identities to use in their fake employee schemes.</p>



<h3 class="wp-block-heading" style="text-align: left;">The key to the scam lies with the foreign facilitators</h3>



<ul class="wp-block-list" style="text-align: justify;">
<li>Creating accounts on freelance websites</li>



<li>Opening bank accounts, or lending the North Korean worker their own</li>



<li>Purchasing mobile phone numbers or SIM cards</li>



<li>Validating the worker&#8217;s fraudulent identity during the employment verification process, using background check services. Once the fake worker is hired, these individuals receive the company laptop and install it on a laptop farm located in the hiring company&#8217;s country. The North Korean IT worker then uses VPNs, proxy services, remote monitoring and management (RMM), and/or virtual private servers (VPS) to conceal their true location.</li>
</ul>



<p style="text-align: justify;"><em>“The impact on deceived organizations could be enormous. Not only are they unwittingly paying workers from a heavily sanctioned country, but these same employees often gain privileged access to critical systems. It’s an open invitation to steal confidential data or even demand a ransom from the company”</em> emphasizes the ESET researcher.</p>



<h4 class="wp-block-heading" style="text-align: justify;">In terms of detection and protection, ESET explains how to prevent an organization from becoming a victim</h4>



<ol class="wp-block-list" style="text-align: justify;">
<li><strong>Identify fake employees during the hiring process:</strong></li>
</ol>



<ul class="wp-block-list" style="text-align: justify;">
<li>Check the candidate’s digital profile, including social media and other online accounts, for similarities with other people whose identities they may have stolen. They may also create multiple fake profiles to apply for jobs under different names.</li>
</ul>



<ul class="wp-block-list" style="text-align: justify;">
<li>Pay attention to discrepancies between online activity and declared experience: a “senior developer” with generic code repositories or recently created accounts should raise red flags.</li>



<li>Ensure they have a legitimate and unique phone number, and check that their resume is consistent. Verify that the companies mentioned actually exist. Contact references directly (phone/video call) and pay close attention to employees of staffing agencies.</li>
</ul>



<p style="text-align: justify;">Since many applicants may use fabricated audio, video, and images, insist on video interviews and conduct them multiple times during the hiring process.</p>



<p style="text-align: justify;">During interviews, consider any claim that the camera is malfunctioning a major red flag. Ask the candidate to turn off background filters to increase the chances of identifying deepfakes (signs might include visual glitches, facial expressions that appear stiff and unnatural, and lip movements that are not synchronized with the audio). Ask questions based on the location and culture of where they “live” or “work,” for example, about local food or sports.</p>



<ol class="wp-block-list" style="text-align: justify;" start="2">
<li><strong>Monitor employees for potentially suspicious activity:</strong></li>
</ol>



<ul class="wp-block-list" style="text-align: justify;">
<li>Be on the lookout for red flags such as Chinese phone numbers, the immediate download of RMM software on a newly issued laptop, and work performed outside of normal office hours. If the laptop authenticates from Chinese or Russian IP addresses, this should also be investigated.</li>



<li>Monitor employee behavior and system access patterns, such as unusual logins, large file transfers, or changes in work schedules. Focus on the context, not just the alerts: the difference between a mistake and malicious activity can lie in the intent.</li>



<li>Use insider threat detection tools to identify anomalous activity.</li>
</ul>



<ol class="wp-block-list" style="text-align: justify;" start="3">
<li><strong>Contain the threat:</strong></li>
</ol>



<ul class="wp-block-list" style="text-align: justify;">
<li>If a North Korean worker is believed to have been identified within the organization, proceed cautiously at first to avoid alerting them.</li>



<li>Restrict their access to sensitive resources and review their network activity, limiting this task to a small group of trusted individuals from the IT security, human resources, and legal departments.</li>
</ul>



<p style="text-align: justify;"><em>Preserve evidence and report the incident to law enforcement, while also seeking legal counsel for the company. “Furthermore, it’s a good idea to update <a href="https://www.welivesecurity.com/es/seguridad-corporativa/como-aprovechar-maximo-entrenamientos-en-ciberseguridad/" target="_blank" rel="noopener">cybersecurity training programs</a>. And ensure that all employees, especially IT recruiters and HR staff, understand some of the warning signs to watch out for in the future. Threat actors’ tactics, techniques, and procedures (TTPs) are constantly evolving, so this advice will also need to be updated periodically. <strong>The best methods for preventing fake candidates from becoming malicious informants combine human expertise and technical controls.</strong> Make sure you cover all the bases,”</em> suggests Gutiérrez Amaya of ESET.</p>



<p style="text-align: justify;">ESET invites you to learn more about cybersecurity by visiting: <a href="https://www.welivesecurity.com/es/" target="_blank" rel="noopener">https://www.welivesecurity.com/es/</a>.</p>



<p style="text-align: justify;">For other useful preventative information, also available in Venezuela: <a href="https://www.eset.com/ve/" target="_blank" rel="noopener">https://www.eset.com/ve/</a>, and on their social media channels @eset_ve. Also on Instagram (<a href="https://www.instagram.com/esetla/" target="_blank" rel="noopener">@esetla</a>) and Facebook (<a href="https://www.facebook.com/ESETLA" target="_blank" rel="noopener">ESET</a>).</p>



<p style="text-align: justify;"><em>With information and reference image provided by ESET and Comstat Rowland</em></p>



<p style="text-align: left;">Visit our news channel on <a href="https://news.google.com/publications/CAAqBwgKMP_wxAswoozcAw?ceid=VE:es-419&amp;oc=3" target="_blank" rel="noopener"><strong>Google News</strong></a> and follow us to get accurate, interesting information and stay up to date with everything. You can also see our daily content on <a href="https://twitter.com/BitFinance_News" target="_blank" rel="noopener"><strong>X/Twitter</strong></a> and <a href="https://www.instagram.com/bitfinancenews/?hl=es" target="_blank" rel="noopener"><strong>Instagram</strong></a></p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/how-to-detect-fake-job-applicants-corporate-espionage-with-malicious-informants/">How to detect fake job applicants: corporate espionage with malicious informants</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersecurity myths that can put you at risk: ESET analyzes 5 common ones</title>
		<link>https://bitfinance.news/en/cybersecurity-myths-that-can-put-you-at-risk-eset-analyzes-5-common-ones/</link>
		
		<dc:creator><![CDATA[Marilin Pino]]></dc:creator>
		<pubDate>Mon, 27 Oct 2025 21:00:17 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Financial security]]></category>
		<category><![CDATA[Innovation]]></category>
		<category><![CDATA[analysis]]></category>
		<category><![CDATA[Camilo Gutiérrez Amaya]]></category>
		<category><![CDATA[can put you at risk]]></category>
		<category><![CDATA[corporate systems]]></category>
		<category><![CDATA[Cybersecurity Awareness Month]]></category>
		<category><![CDATA[cybersecurity myths]]></category>
		<category><![CDATA[ESET Latin America]]></category>
		<category><![CDATA[ESET Security Report 2025]]></category>
		<category><![CDATA[ESET Venezuela]]></category>
		<category><![CDATA[global initiative to strengthen safe habits in the digital environment]]></category>
		<category><![CDATA[Latin American region]]></category>
		<category><![CDATA[October]]></category>
		<category><![CDATA[personal users]]></category>
		<category><![CDATA[practices to protect yourself]]></category>
		<category><![CDATA[Research Lab]]></category>
		<category><![CDATA[specific risks]]></category>
		<guid isPermaLink="false">https://bitfinance.news/?p=117015</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="1000" height="684" src="https://bitfinance.news/wp-content/uploads/2025/10/Imagen-referencial-5-mitos-sobre-ciberseguridad-que-pueden-ponerte-en-riesgo-Suministrada-por-ESET-y-Comstat-R.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Con motivo de la celebración en octubre el mes de la Concienciación sobre la Ciberseguridad, ESET analiza riesgos comunes para estar alerta" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2025/10/Imagen-referencial-5-mitos-sobre-ciberseguridad-que-pueden-ponerte-en-riesgo-Suministrada-por-ESET-y-Comstat-R.jpg 1000w, https://bitfinance.news/wp-content/uploads/2025/10/Imagen-referencial-5-mitos-sobre-ciberseguridad-que-pueden-ponerte-en-riesgo-Suministrada-por-ESET-y-Comstat-R-300x205.jpg 300w, https://bitfinance.news/wp-content/uploads/2025/10/Imagen-referencial-5-mitos-sobre-ciberseguridad-que-pueden-ponerte-en-riesgo-Suministrada-por-ESET-y-Comstat-R-768x525.jpg 768w" sizes="(max-width: 1000px) 100vw, 1000px" /></div><p>October marks Cybersecurity Awareness Month, a global initiative to strengthen safe habits in the digital environment. In the Latin American region, cybersecurity risks are specific. According to the latest ESET Security Report 2025, 1 in 4 companies has already suffered a cyberattack in the last year. But it&#8217;s not just businesses that are vulnerable, as [&#8230;]</p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/cybersecurity-myths-that-can-put-you-at-risk-eset-analyzes-5-common-ones/">Cybersecurity myths that can put you at risk: ESET analyzes 5 common ones</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="1000" height="684" src="https://bitfinance.news/wp-content/uploads/2025/10/Imagen-referencial-5-mitos-sobre-ciberseguridad-que-pueden-ponerte-en-riesgo-Suministrada-por-ESET-y-Comstat-R.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Con motivo de la celebración en octubre el mes de la Concienciación sobre la Ciberseguridad, ESET analiza riesgos comunes para estar alerta" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2025/10/Imagen-referencial-5-mitos-sobre-ciberseguridad-que-pueden-ponerte-en-riesgo-Suministrada-por-ESET-y-Comstat-R.jpg 1000w, https://bitfinance.news/wp-content/uploads/2025/10/Imagen-referencial-5-mitos-sobre-ciberseguridad-que-pueden-ponerte-en-riesgo-Suministrada-por-ESET-y-Comstat-R-300x205.jpg 300w, https://bitfinance.news/wp-content/uploads/2025/10/Imagen-referencial-5-mitos-sobre-ciberseguridad-que-pueden-ponerte-en-riesgo-Suministrada-por-ESET-y-Comstat-R-768x525.jpg 768w" sizes="(max-width: 1000px) 100vw, 1000px" /></div>
<p><strong>October</strong> marks <strong>Cybersecurity Awareness Month,</strong> a <strong>global initiative to strengthen safe habits in the digital environment.</strong> In the <strong>Latin American region,</strong> cybersecurity risks are specific. According to the latest <strong><a href="https://bitfinance.news/en/tips-to-shop-safely-on-black-friday/" target="_blank" rel="noopener">ESET Security Report 2025</a></strong>, 1 in 4 companies has already suffered a cyberattack in the last year. But it&#8217;s not just businesses that are vulnerable, as massive <a href="https://www.welivesecurity.com/es/phishing/que-es-el-phishing-y-como-evitar-caer-en-este-engano/" target="_blank" rel="noopener">phishing</a> campaigns seek to attract the public and simulate <a href="https://www.welivesecurity.com/es/phishing/mensajes-falsos-problemas-entrega-paquetes-envios/" target="_blank" rel="noopener">messages from postal companies</a> with supposed delivery problems, or from <a href="https://www.welivesecurity.com/es/estafas-enganos/alerta-campana-phishing-mensajes-texto-gobierno-ciudad-mexico/" target="_blank" rel="noopener">government agencies communicating nonexistent fines</a>, court summonses, among many other attempts to deceive and generate urgency so that action is taken under pressure.</p>



<p>In this context, <a href="https://www.eset.com/latam/" target="_blank" rel="noopener">ESET</a>, a leading company in proactive threat detection, warns that any user of online services is a target of attack and comments that <strong>it is necessary to address some myths that persist about digital security and that can put both personal users and corporate systems at risk.</strong></p>



<h3 class="wp-block-heading"><strong>Security is not just about technology; it is also about process and governance</strong></h3>



<p><strong>THE MYTHS:</strong></p>



<ol class="wp-block-list">
<li><strong>I am not a target because I have nothing of value:</strong> It is common for people to believe that cyberattacks only target large companies or public figures. The reality is that any personal data is valuable to cybercriminals, from banking information to email or social media credentials. Digital scams reach millions of ordinary users, regardless of their online profile or relevance.</li>
</ol>



<p><em>“Underestimating the risk creates a false sense of security and leads to risky behaviors, such as not enabling multi-factor authentication, using weak passwords, or clicking on suspicious links. These weaknesses are a unique opportunity for attacks that result in data theft, card cloning, account takeovers, or even digital extortion, targeting users who believe they are not targets,”</em> says <strong>Camilo Gutiérrez Amaya, Head of the ESET Latin America Research Lab.</strong></p>



<p><strong>2.My antivirus protects me against everything:</strong> Antivirus is an important piece of defense, but it doesn&#8217;t cover all attack vectors. <a href="https://www.eset.com/br/blog/cultura/o-que-e-engenharia-social/?srsltid=AfmBOorJQ6cZFQK2bGKO6V9NP9QHCZ6Du1Zt_WWIKTgaiQ615rPLL5-X?utm_source=welivesecurity.com&amp;utm_medium=referral&amp;utm_campaign=autotagging&amp;utm_content=seguridad-digital&amp;utm_term=es" target="_blank" rel="noopener">Social engineering</a>, process failures, poor privilege management, supply chain attacks, and operational visibility gaps are all actions that antivirus alone cannot address.</p>



<p>An example of this occurred in Brazil. The <a href="https://www.welivesecurity.com/pt/cibercrime/o-que-aprendemos-com-o-caso-da-cm-software/" target="_blank" rel="noopener">C&amp;M Software case</a> exposed how procedural gaps, a lack of controls, and failures in third-party management allowed resources to be diverted and compromised the organization&#8217;s operational security. This demonstrated that <strong>security is not just about technology; it&#8217;s also about process and governance.</strong> Another critical point is that many attacks exploit leaked credentials, human weaknesses, or insecure authorization flows, scenarios in which an antivirus solution fails to prevent the initial intrusion or escalation of access. Therefore, the current defense strategy must be layered.</p>



<ol start="3" class="wp-block-list">
<li><strong>My password is secure, you can use it everywhere:</strong> Even if a password is secure, reusing it across multiple services poses a risk. In practice, criminals specialize in automated attacks, such as credential stuffing, where they use leaked email and password combinations to attempt to automatically access other accounts. If the password is the same, access is immediate and silent.</li>
</ol>



<p>On the other hand, password reuse makes scams like phishing and account takeovers more effective, because cybercriminals can combine information from different services to trick users more convincingly. Even if a platform has strong protection, using the same password on a website with weak security replicates the risk.</p>



<p><em>“Relying exclusively on strong, unique passwords creates a false sense of security and leaves users vulnerable to hacking, identity theft, and financial fraud. Effective protection requires not only strong passwords, but also a combination of multi-factor authentication, monitoring for suspicious activity, and good credential management practices,”</em> adds Gutiérrez Amaya of ESET.</p>



<ol start="4" class="wp-block-list">
<li><strong>My phone is safe, I only have to worry about my computer:</strong> Many people believe their smartphones or tablets are protected because they are smaller or more modern devices, and that cyberattacks don&#8217;t affect them. <strong>Mobile devices are frequent targets for sophisticated scams,</strong> and the risks increase as personal, financial, and professional information is concentrated on them. Effective mobile defense involves strong passwords, multi-factor authentication, being wary of suspicious apps and links, regular updates, and paying attention to unexpected phone calls.</li>
</ol>



<p>In addition to phishing, vishing, and other <strong>social engineering</strong> cases, devices—both Android and Apple—are also targets for malware distribution, with fake apps and system vulnerability exploitation that can compromise the device even without direct user interaction. In fact, <a href="https://www.welivesecurity.com/la-es/2019/07/26/aplicaciones-malware-permanecen-google-play/" target="_blank" rel="noopener">malicious apps have been identified in the past as remaining undetected in official Google stores for a considerable amount of time</a>. Or, towards the end of 2023, <a href="https://www.welivesecurity.com/es/investigaciones/app-prestamos-espian-usuarios-android/" target="_blank" rel="noopener">an increase in Android lending apps was noted, which were nothing more than entry points for spyware</a>.</p>



<ol start="5" class="wp-block-list">
<li><strong>Cybersecurity is the sole responsibility of the IT sector:</strong> Every user has an essential role in protecting data and systems. Anyone who adopts good practices contributes to strengthening the security of the entire organization or online community. Simple habits such as checking links before clicking, maintaining strong and unique passwords, enabling multi-factor authentication, and reporting suspicious activity create effective barriers that complement IT technologies and policies.</li>
</ol>



<h4 class="wp-block-heading"><strong>The more each person acts consciously, the more resilient the digital ecosystem will be</strong></h4>



<p>&#8220;When we all get involved, collective awareness becomes a powerful defense, capable of preventing scams, fraud, and invasions, protecting personal and corporate information, and the digital community as a whole. The more each person acts consciously, the more resilient the digital ecosystem will be. It&#8217;s important to remember that cybersecurity is everyone&#8217;s responsibility, and small habits make a big difference,&#8221; concludes the ESET Latin America researcher.</p>



<p>ESET invites you to learn more about cybersecurity by visiting: <a href="https://www.welivesecurity.com/es/" target="_blank" rel="noopener">https://www.welivesecurity.com/es/</a>.</p>



<p>For other useful preventive information, it is also available in Venezuela: <a href="https://www.eset.com/ve/" target="_blank" rel="noopener">https://www.eset.com/ve/</a>, and on its social media @eset_ve. Also available on Instagram (<a href="https://www.instagram.com/esetla/" target="_blank" rel="noopener">@esetla</a>) and Facebook (<a href="https://www.facebook.com/ESETLA" target="_blank" rel="noopener">ESET</a>).</p>



<p><em>With information and reference images provided by ESET and Comstat Rowland</em></p>



<p>Visit our news channel on&nbsp;<a href="https://news.google.com/publications/CAAqBwgKMP_wxAswoozcAw?ceid=VE:es-419&amp;oc=3" target="_blank" rel="noopener"><strong>Google News</strong></a>&nbsp;and follow us to get accurate, interesting information and stay up to date with everything. You can also see our daily content on&nbsp;<a href="https://twitter.com/BitFinance_News" target="_blank" rel="noopener"><strong>X/Twitter</strong></a>&nbsp;and&nbsp;<a href="https://www.instagram.com/bitfinancenews/?hl=es" target="_blank" rel="noopener"><strong>Instagram</strong></a></p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/cybersecurity-myths-that-can-put-you-at-risk-eset-analyzes-5-common-ones/">Cybersecurity myths that can put you at risk: ESET analyzes 5 common ones</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Discord suffered data breach due to vendor attack: ESET analyzes it and comments</title>
		<link>https://bitfinance.news/en/discord-suffered-data-breach-due-to-vendor-attack-eset-analyzes-it-and-comments/</link>
		
		<dc:creator><![CDATA[Marilin Pino]]></dc:creator>
		<pubDate>Mon, 13 Oct 2025 13:00:44 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Financial security]]></category>
		<category><![CDATA[attention and care with vendors]]></category>
		<category><![CDATA[Camilo Gutiérrez Amaya]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data that was affected and/or compromised]]></category>
		<category><![CDATA[Discord messaging platform]]></category>
		<category><![CDATA[Discord suffers data breach]]></category>
		<category><![CDATA[ESET analyzes and comments]]></category>
		<category><![CDATA[ESET Global Security Advisor]]></category>
		<category><![CDATA[ESET Venezuela]]></category>
		<category><![CDATA[Head of ESET Latin America Research Lab]]></category>
		<category><![CDATA[Jake Moore]]></category>
		<category><![CDATA[prevention]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[strengthening the supply chain]]></category>
		<category><![CDATA[vendor attack]]></category>
		<guid isPermaLink="false">https://bitfinance.news/?p=116631</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="1000" height="667" src="https://bitfinance.news/wp-content/uploads/2025/10/Imagen-referencial-Discord-sufre-filtracion-de-datos-por-ataque-a-proveedor-Suministrada-por-ESET-y-Comstat-R.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Los servicios de terceros y sus debilidades, explica Jake Moore, Global Security Advisor de ESET, “son más difíciles de monitorear y controlar, y a menudo guardan información sensible, por lo que se están transformando en objetivos comunes para los cibercriminales”  " decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2025/10/Imagen-referencial-Discord-sufre-filtracion-de-datos-por-ataque-a-proveedor-Suministrada-por-ESET-y-Comstat-R.jpg 1000w, https://bitfinance.news/wp-content/uploads/2025/10/Imagen-referencial-Discord-sufre-filtracion-de-datos-por-ataque-a-proveedor-Suministrada-por-ESET-y-Comstat-R-300x200.jpg 300w, https://bitfinance.news/wp-content/uploads/2025/10/Imagen-referencial-Discord-sufre-filtracion-de-datos-por-ataque-a-proveedor-Suministrada-por-ESET-y-Comstat-R-768x512.jpg 768w" sizes="(max-width: 1000px) 100vw, 1000px" /></div><p>The Discord messaging platform, used by more than 200 million people each month, confirmed last Friday that it was affected by a security incident in its customer support service, managed by a third party. The third-party provider suffered an extortion attack, similar to ransomware, in which attackers accessed sensitive data and demanded a ransom to [&#8230;]</p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/discord-suffered-data-breach-due-to-vendor-attack-eset-analyzes-it-and-comments/">Discord suffered data breach due to vendor attack: ESET analyzes it and comments</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="1000" height="667" src="https://bitfinance.news/wp-content/uploads/2025/10/Imagen-referencial-Discord-sufre-filtracion-de-datos-por-ataque-a-proveedor-Suministrada-por-ESET-y-Comstat-R.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Los servicios de terceros y sus debilidades, explica Jake Moore, Global Security Advisor de ESET, “son más difíciles de monitorear y controlar, y a menudo guardan información sensible, por lo que se están transformando en objetivos comunes para los cibercriminales”  " decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2025/10/Imagen-referencial-Discord-sufre-filtracion-de-datos-por-ataque-a-proveedor-Suministrada-por-ESET-y-Comstat-R.jpg 1000w, https://bitfinance.news/wp-content/uploads/2025/10/Imagen-referencial-Discord-sufre-filtracion-de-datos-por-ataque-a-proveedor-Suministrada-por-ESET-y-Comstat-R-300x200.jpg 300w, https://bitfinance.news/wp-content/uploads/2025/10/Imagen-referencial-Discord-sufre-filtracion-de-datos-por-ataque-a-proveedor-Suministrada-por-ESET-y-Comstat-R-768x512.jpg 768w" sizes="(max-width: 1000px) 100vw, 1000px" /></div><p style="text-align: justify;">The Discord messaging platform, used by more than <strong><a href="https://discord.com/company#:~:text=In%20Numbers-,200M%2B,Source%3A%20%E2%93%98,-1.9B" target="_blank" rel="noopener">200 million people each month</a>, </strong>confirmed last Friday that it was affected by a security incident in its customer support service, managed by a third party. The third-party provider suffered an extortion attack, similar to ransomware, in which attackers accessed sensitive data and demanded a ransom to retain the stolen information.  <a href="https://www.eset.com/latam/" target="_blank" rel="noopener">ESET</a>, a leading company in proactive threat detection, is analyzing the incident, which affected users who had interacted with customer service and trusted and safety representatives.</p>
<p style="text-align: justify;">Among the leaked and compromised data were identity documents, partial credit card details, and payment history.</p>
<p style="text-align: justify;">According to <strong>the incident notification that <a href="https://discord.com/press-releases/update-on-security-incident-involving-third-party-customer-service" target="_blank" rel="noopener">Discord sent to affected users</a></strong> and made public on its website, the <strong>attackers did not access the most sensitive information</strong>, such as physical addresses, full credit or debit card details, or authentication data. &#8220;Nor did they access messages other than those exchanged with the customer support center,&#8221; they detailed.</p>
<p><figure id="attachment_116627" aria-describedby="caption-attachment-116627" style="width: 794px" class="wp-caption alignnone"><img decoding="async" class="wp-image-116627 size-full" src="https://bitfinance.news/wp-content/uploads/2025/10/Imagen-referencial-2-Acompanamiento-del-texto.jpg" alt="Official statement on Discord's website (Source: Discord)" width="794" height="510" srcset="https://bitfinance.news/wp-content/uploads/2025/10/Imagen-referencial-2-Acompanamiento-del-texto.jpg 794w, https://bitfinance.news/wp-content/uploads/2025/10/Imagen-referencial-2-Acompanamiento-del-texto-300x193.jpg 300w, https://bitfinance.news/wp-content/uploads/2025/10/Imagen-referencial-2-Acompanamiento-del-texto-768x493.jpg 768w, https://bitfinance.news/wp-content/uploads/2025/10/Imagen-referencial-2-Acompanamiento-del-texto-210x136.jpg 210w" sizes="(max-width: 794px) 100vw, 794px" /><figcaption id="caption-attachment-116627" class="wp-caption-text">Official statement on Discord&#8217;s website (Source: Discord)</figcaption></figure></p>
<p style="text-align: justify;">While it is asserted that the cybercriminal group did not have direct access to the platform&#8217;s servers, ESET maintains that <strong>the case demonstrates how a service with high security standards can be weakened at one of the links in its supply chain.</strong></p>
<p style="text-align: justify;">Third-party services and their weaknesses, explains Jake Moore, ESET Global Security Advisor, &#8220;are more difficult to monitor and control, and they often store sensitive information, so they are becoming common targets for cybercriminals.&#8221;</p>
<p style="text-align: justify;">A security incident reportedly occurred on September 20, which is still under investigation. Since October 3, the platform began notifying each affected party about the breach and has issued a statement alerting the community at large.</p>
<h2 style="text-align: justify;"><strong>Data affected and/or compromised</strong></h2>
<p style="text-align: justify;">According to the information published by Discord, the compromised data includes:</p>
<ul style="text-align: justify;">
<li>Usernames, email addresses, and contact information.</li>
<li>Payment information, such as the last four digits of card details and purchase history.</li>
<li>IP addresses.</li>
<li>Messages and attachments sent to customer service, or inquiries to members of the platform&#8217;s trust and safety department.</li>
<li>Corporate information, such as training materials and internal presentations.</li>
</ul>
<p style="text-align: justify;">According to the same alert, the data accessed by cybercriminals includes &#8220;a small number&#8221; of identity documents, such as driver&#8217;s licenses or passports, which are often requested to verify a Discord member&#8217;s age. While the volume of these leaked documents is not detailed, the platform assures that the incident notification email specifies this information for each affected user. This means that if you receive an email notifying you of the data breach, it will clarify which data was compromised.</p>
<p style="text-align: justify;"><em>“The recommendation for any user of the platform who has been affected, or who uses Discord, is <strong>to pay special attention to any communication that appears to originate from Discord, as the possibility of data being used in targeted phishing campaigns is higher.</strong> Cybercriminals may not only leverage the leaked information, but also the news of the leak to use that excuse or bait to launch a specific campaign targeting users of the platform—even if they were not the targets of this latest leak,”</em> warns <strong>Camilo Gutiérrez Amaya, Head of the ESET Latin America Research Lab.</strong></p>
<p style="text-align: justify;">Regardless of whether you were notified or not, ESET assures that this is a good opportunity to review some recommendations that may be essential in the event of incidents like this:</p>
<ul style="text-align: justify;">
<li>Check if you have two-step verification enabled on your account. This provides an additional layer of protection against login credentials leaks.</li>
<li>Review payment transactions if you use Discord Nitro or other paid services.</li>
</ul>
<h3 style="text-align: left;"><strong>Importance of strengthening the supply chain (be careful with suppliers)</strong></h3>
<p style="text-align: justify;">At the time of this publication, and according to an article on the specialized website <a href="https://www.bleepingcomputer.com/news/security/discord-discloses-data-breach-after-hackers-steal-support-tickets/#:~:text=update%3A%20while%20slh%20initially%20appeared%20to%20confirm%20to%20bleepingcomputer%20that%20they%20were%20behind%20the%20discord%20zendesk%20compromise%2C%20they%20later%20stated%20that%20it%20was%20a%20different%20group%20that%20they%20know%20and%20interact%20with." target="_blank" rel="noopener">BleepingComputer</a>, the Scattered Lapsus$ Hunters (SLH) ransomware group had initially claimed responsibility for the attack, although they later told that outlet that the attack was carried out by another group with ties to SLH.</p>
<p style="text-align: justify;">“These types of incidents at third-party suppliers are a reminder of the importance of strengthening the <a href="https://www.welivesecurity.com/es/seguridad-corporativa/como-mitigar-riesgo-cadena-suministro/" target="_blank" rel="noopener">supply chain</a>. A robust cybersecurity policy must include and address all the links that make up the supplier network. It is also key for users to understand the importance of <a href="https://www.welivesecurity.com/es/privacidad/filtraciones-contrasenas-como-comprobar-afectado/" target="_blank" rel="noopener">staying informed and alert</a> to incidents that could compromise the security and privacy of their data, and to remember the basic measures they can take to address them, or at least be better prepared for these types of situations, which are becoming <a href="https://www.weforum.org/stories/2025/08/to-end-the-data-breach-epidemic-do-we-need-to-rethink-data-sharing/#:~:text=exposing%20raw%20data.-,Data%20breaches%20are%20rising,organization%20that%20collected%20it.,-These%20breaches%20go" target="_blank" rel="noopener">more frequent</a>,” concludes Gutiérrez Amaya of ESET.</p>
<p style="text-align: justify;">ESET invites you to learn more about cybersecurity by visiting: <a href="https://www.welivesecurity.com/es/" target="_blank" rel="noopener">https://www.welivesecurity.com/es/</a>.</p>
<p style="text-align: justify;">For other useful preventive information, it is also available in Venezuela: <a href="https://www.eset.com/ve/" target="_blank" rel="noopener">https://www.eset.com/ve/</a>, and its social media channels @eset_ve. Also available on Instagram (<a href="https://www.instagram.com/esetla/" target="_blank" rel="noopener">@esetla</a>) and Facebook (<a href="https://www.facebook.com/ESETLA" target="_blank" rel="noopener">ESET</a>).</p>
<p><em>With information and reference images provided by ESET and Comstat Rowland</em></p>
<p><em>Visit our news channel on </em><a href="https://news.google.com/publications/CAAqBwgKMP_wxAswoozcAw?ceid=VE:es-419&amp;oc=3" target="_blank" rel="noopener"><em><strong>Google News</strong></em></a><em> and follow us to get accurate, interesting information and stay up to date with everything. You can also see our daily content on </em><a href="https://twitter.com/BitFinance_News" target="_blank" rel="noopener"><em><strong>X/Twitter</strong></em></a><em> and </em><a href="https://www.instagram.com/bitfinancenews/?hl=es" target="_blank" rel="noopener"><em><strong>Instagram</strong></em></a></p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/discord-suffered-data-breach-due-to-vendor-attack-eset-analyzes-it-and-comments/">Discord suffered data breach due to vendor attack: ESET analyzes it and comments</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>ESET reports and summarizes 7 shocking real-life cases of scams using deepfakes</title>
		<link>https://bitfinance.news/en/eset-reports-and-summarizes-7-shocking-real-life-cases-of-scams-using-deepfakes/</link>
		
		<dc:creator><![CDATA[Marilin Pino]]></dc:creator>
		<pubDate>Tue, 23 Sep 2025 12:30:05 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Financial security]]></category>
		<category><![CDATA[7 amazing real-life cases]]></category>
		<category><![CDATA[Alert]]></category>
		<category><![CDATA[Arup]]></category>
		<category><![CDATA[Baltimore school]]></category>
		<category><![CDATA[best practices]]></category>
		<category><![CDATA[Camilo Gutiérrez Amaya]]></category>
		<category><![CDATA[continuing education]]></category>
		<category><![CDATA[Cybercriminals]]></category>
		<category><![CDATA[Deepfakes]]></category>
		<category><![CDATA[elon musk]]></category>
		<category><![CDATA[ESET]]></category>
		<category><![CDATA[ESET Latin America]]></category>
		<category><![CDATA[ESET Venezuela]]></category>
		<category><![CDATA[Ferrari]]></category>
		<category><![CDATA[incidents]]></category>
		<category><![CDATA[Lionel Messi]]></category>
		<category><![CDATA[President Zelensky]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[recent]]></category>
		<category><![CDATA[reducing the risk of becoming a victim]]></category>
		<category><![CDATA[scams]]></category>
		<category><![CDATA[scams that caused millions in losses or compromised sensitive information]]></category>
		<category><![CDATA[training]]></category>
		<category><![CDATA[WPP]]></category>
		<guid isPermaLink="false">https://bitfinance.news/?p=116132</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="1000" height="563" src="https://bitfinance.news/wp-content/uploads/2025/09/Imagen-referencial-7-casos-reales-de-estafas-donde-se-utilizaron-deepfakes-Suministrada-por-ESET-Latam-y-Comstat-R.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Incluye desde la clonación de personalidades famosas e icónicas, a directivos de importantes empresas, hasta el objetivo de hacer daño a un director de escuela" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2025/09/Imagen-referencial-7-casos-reales-de-estafas-donde-se-utilizaron-deepfakes-Suministrada-por-ESET-Latam-y-Comstat-R.jpg 1000w, https://bitfinance.news/wp-content/uploads/2025/09/Imagen-referencial-7-casos-reales-de-estafas-donde-se-utilizaron-deepfakes-Suministrada-por-ESET-Latam-y-Comstat-R-300x169.jpg 300w, https://bitfinance.news/wp-content/uploads/2025/09/Imagen-referencial-7-casos-reales-de-estafas-donde-se-utilizaron-deepfakes-Suministrada-por-ESET-Latam-y-Comstat-R-768x432.jpg 768w" sizes="(max-width: 1000px) 100vw, 1000px" /></div><p>Cybercriminals have found that using artificial intelligence allows them to enhance their scams, making their deceptions more realistic and harder to detect. Recently, fake videos have surfaced impersonating internationally renowned figures, such as Lionel Messi or the CEO of a major organization.  However, these scams also occur on a smaller scale, such as targeting a [&#8230;]</p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/eset-reports-and-summarizes-7-shocking-real-life-cases-of-scams-using-deepfakes/">ESET reports and summarizes 7 shocking real-life cases of scams using deepfakes</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="1000" height="563" src="https://bitfinance.news/wp-content/uploads/2025/09/Imagen-referencial-7-casos-reales-de-estafas-donde-se-utilizaron-deepfakes-Suministrada-por-ESET-Latam-y-Comstat-R.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Incluye desde la clonación de personalidades famosas e icónicas, a directivos de importantes empresas, hasta el objetivo de hacer daño a un director de escuela" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2025/09/Imagen-referencial-7-casos-reales-de-estafas-donde-se-utilizaron-deepfakes-Suministrada-por-ESET-Latam-y-Comstat-R.jpg 1000w, https://bitfinance.news/wp-content/uploads/2025/09/Imagen-referencial-7-casos-reales-de-estafas-donde-se-utilizaron-deepfakes-Suministrada-por-ESET-Latam-y-Comstat-R-300x169.jpg 300w, https://bitfinance.news/wp-content/uploads/2025/09/Imagen-referencial-7-casos-reales-de-estafas-donde-se-utilizaron-deepfakes-Suministrada-por-ESET-Latam-y-Comstat-R-768x432.jpg 768w" sizes="(max-width: 1000px) 100vw, 1000px" /></div>
<p><strong>Cybercriminals</strong> have found that using artificial intelligence allows them to enhance their scams, making their deceptions more realistic and harder to detect. Recently, fake videos have surfaced <strong>impersonating internationally renowned figures,</strong> such as Lionel Messi or the CEO of a major organization.  However, these scams also occur on a smaller scale, such as targeting a school principal in the United States. <strong><a href="https://www.eset.com/latam/" target="_blank" rel="noopener">ESET</a></strong>, a leading proactive threat detection company, reviews some of the cases where <strong>deepfakes were the main tool used in scams that resulted in millions of dollars in losses or the compromise of sensitive information.</strong></p>



<p>Deepfake is an <a href="https://en.wikipedia.org/wiki/Deepfake" target="_blank" rel="noopener">artificial intelligence-based technique for synthesizing human images</a> to create fake content from scratch, using existing videos or even just a still image. They are designed to <strong>replicate the appearance and voice of a real person.</strong></p>



<p>“With the evolution of Artificial Intelligence, these videos and audio recordings seem increasingly real. Many exploit the image of public figures or well-known entities to say something false, as part of a scam that aims to obtain money or sensitive information,” says <strong>Camilo Gutiérrez Amaya, Head of the ESET Latin America Research Lab.</strong></p>



<h2 class="wp-block-heading">ESET compiled amazing, truly real, and recent cases</h2>



<p><strong>Lionel Messi:</strong> The Argentine football player is one of the most recognized personalities worldwide. In this case, cybercriminals exploited his popularity to carry out a deepfake scam, promoting an app that promised suspiciously high and irresistible earnings. The app in question was called <a href="https://www.welivesecurity.com/es/estafas-enganos/alerta-deepfake-messi-utilizado-promover-aplicacion-fraudulenta/" target="_blank" rel="noopener">&#8220;Wildcat Dive,&#8221;</a> and in the fake video, Messi claimed it was one of his main sources of income and that it had helped many people earn money. Through advertisements on the social network Instagram, the cybercriminals distributed snippets of a fabricated interview, which was based on a real interview the footballer had given to a well-known Argentine streaming program.</p>



<p><strong>Arup:</strong> In early 2024, the architectural firm that designed the Sydney Opera House and the Etihad Stadium, <a href="https://fortune.com/europe/2024/05/17/arup-deepfake-fraud-scam-victim-hong-kong-25-million-cfo/" target="_blank" rel="noopener">Arup</a>, made headlines when a financial employee at the company&#8217;s Hong Kong office received a video call from (allegedly) the company&#8217;s CFO. The result of the meeting was 15 transfers totaling over $25 million. The bad news is that it was actually a deepfake, so the transfers had not been approved by anyone in the company.</p>



<p><strong>Ferrari:</strong> In this case, cybercriminals attempted <a href="https://bitfinance.news/en/chatgpt-chatbot-will-be-able-to-identify-teenagers-to-tailor-the-experience-to-their-age/" target="_blank" rel="noopener">a deepfake voice scam</a>, impersonating Benedetto Vigna, the CEO of the automotive company. In July 2024, using voice imitation, they tried to convince the company&#8217;s finance executives to make a large money transfer. One of the employees became suspicious and asked a question that the AI ​​used in the scam could not answer correctly. Not only did this attack fail, but it prompted Ferrari to reinforce its employee training to prevent similar scams in the future.</p>



<p><strong>WPP:</strong> One of the world&#8217;s largest advertising companies was also the target of <a href="https://www.theguardian.com/technology/article/2024/may/10/ceo-wpp-deepfake-scam" target="_blank" rel="noopener">a scam attempt involving a deepfake</a>. In mid-2024, cybercriminals used a fake WhatsApp account, a voice recording, and YouTube footage of a virtual meeting to impersonate the company&#8217;s CFO, Mark Read. The malicious actors organized a meeting via Microsoft Teams, under the pretext of creating a new company, and used this as a lure to obtain money and sensitive personal data from the company. According to WPP, this attack was unsuccessful thanks to the company&#8217;s vigilance and the training its employees received to detect these scams.</p>



<p><strong>School in Baltimore:</strong> Not only high-profile companies are targeted by deepfakes. In this case, <a href="https://edition.cnn.com/2024/04/26/us/pikesville-principal-maryland-deepfake-cec" target="_blank" rel="noopener">a school principal</a> was heard making racist and antisemitic comments. The incident went viral (over 2 million views) and resulted in death threats against the educator. After an investigation, local police confirmed that the audio was a fake, manipulated with AI.</p>



<p><strong>Elon Musk:</strong> A <a href="https://www.nytimes.com/2021/05/18/business/elon-musk-cryptocurrency-fraud.html" target="_blank" rel="noopener">cryptocurrency investment scam</a> used Elon Musk&#8217;s image to spread ads on X and YouTube, promoting supposed investment opportunities that promised high returns on Bitcoin. The ads included a link to a fraudulent website where unsuspecting users were asked to make initial deposits to participate in the alleged investment. According to the US Federal Trade Commission, the scam, which included deepfakes, resulted in losses of over $80 million for more than 7,000 victims who believed in the supposed investment.</p>



<p><strong>President Zelensky:</strong> Politics was also affected by deepfake scams. In March 2022, during the conflict between Russia and Ukraine, a <a href="http://bbc.com/news/technology-60780142" target="_blank" rel="noopener">fake video</a> circulated showing Ukrainian President Volodymyr Zelensky urging his troops to surrender. The president responded almost immediately with a genuine video posted on his official channels.</p>



<h3 class="wp-block-heading">While deepfake scams are becoming increasingly realistic and difficult to detect, ESET shares some best practices to reduce the risk of falling victim to these types of scams</h3>



<ul class="wp-block-list">
<li>Be wary of eye-catching advertisements that offer an opportunity for easy and unrealistic gains. Also be suspicious of those that feature well-known celebrities.</li>



<li>Pay attention to the video quality: if there are visual glitches, poor synchronization, or low resolution, it is likely a deepfake.</li>



<li>Use <a href="https://bitfinance.news/en/spanish-openbank-to-offer-cryptocurrency-trading/" target="_blank" rel="noopener">security software</a> on all devices to help block fake websites and emails containing malicious content.</li>



<li>For businesses, it is important to not authorize payments solely based on a phone call or video call. Consider using keywords or internal codes as an additional verification method.</li>



<li>Continuous training is essential: being trained to recognize the warning signs of deepfakes and scams is another key practice.</li>



<li>Take advantage of the tools currently available <a href="https://www.welivesecurity.com/es/seguridad-digital/herramientas-para-detectar-deepfakes-combatir-desinformacion/" target="_blank" rel="noopener">to detect deepfakes</a> and combat misinformation.</li>
</ul>



<p>ESET invites you to learn more about cybersecurity by visiting: <a href="https://www.welivesecurity.com/es/" target="_blank" rel="noopener">https://www.welivesecurity.com/es/</a>.</p>



<p>For additional useful preventative information, visit ESET&#8217;s website in Venezuela: <a href="https://www.eset.com/ve/" target="_blank" rel="noopener">https://www.eset.com/ve/</a>, and follow them on social media @eset_ve. Also on Instagram (<a href="https://www.instagram.com/esetla/" target="_blank" rel="noopener">@esetla</a>) and Facebook (<a href="https://www.facebook.com/ESETLA" target="_blank" rel="noopener">ESET</a>).</p>



<p><em>Information and images courtesy of ESET and Comstat Rowland</em></p>



<p>Visit our news channel on <a href="https://news.google.com/publications/CAAqBwgKMP_wxAswoozcAw?ceid=VE:es-419&amp;oc=3" target="_blank" rel="noopener"><strong>Google News</strong></a> and follow us to get accurate, interesting information and stay up to date with everything. You can also see our daily content on <a href="https://twitter.com/BitFinance_News" target="_blank" rel="noopener"><strong>X/Twitter</strong></a> and <a href="https://www.instagram.com/bitfinancenews/?hl=es" target="_blank" rel="noopener"><strong>Instagram</strong></a></p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/eset-reports-and-summarizes-7-shocking-real-life-cases-of-scams-using-deepfakes/">ESET reports and summarizes 7 shocking real-life cases of scams using deepfakes</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Investor scams on social media are on the rise with the help of artificial intelligence</title>
		<link>https://bitfinance.news/en/investor-scams-on-social-media-are-on-the-rise-with-the-help-of-artificial-intelligence/</link>
		
		<dc:creator><![CDATA[Marilin Pino]]></dc:creator>
		<pubDate>Mon, 01 Sep 2025 13:00:52 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Financial security]]></category>
		<category><![CDATA[Alert]]></category>
		<category><![CDATA[Camilo Gutiérrez Amaya]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Cyberscams]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[deception]]></category>
		<category><![CDATA[ESET Latin America]]></category>
		<category><![CDATA[ESET Venezuela]]></category>
		<category><![CDATA[increase in fake ads]]></category>
		<category><![CDATA[Investor scams on social media]]></category>
		<category><![CDATA[prevention]]></category>
		<category><![CDATA[promises of profits]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[Research Laboratory]]></category>
		<category><![CDATA[Safeguard]]></category>
		<category><![CDATA[social media]]></category>
		<category><![CDATA[Warning]]></category>
		<category><![CDATA[with the help of artificial intelligence]]></category>
		<guid isPermaLink="false">https://bitfinance.news/?p=115699</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="1244" height="700" src="https://bitfinance.news/wp-content/uploads/2025/09/Imagen-referencial-Aumentan-las-estafas-a-inversores-en-redes-sociales-con-la-ayuda-de-la-inteligencia-artificial-Suministrada-por-ESET-y-Comstat-R.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="El incremento de anuncios falsos, deepfakes y promesas de ganancias busca engañar incluso a las personas más cautelosas. ESET advierte de un crecimiento del 335% en las amenazas del troyano tipo Nomani, lo que llevó al bloqueo más de 8.500 dominios relacionados" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2025/09/Imagen-referencial-Aumentan-las-estafas-a-inversores-en-redes-sociales-con-la-ayuda-de-la-inteligencia-artificial-Suministrada-por-ESET-y-Comstat-R.jpg 1244w, https://bitfinance.news/wp-content/uploads/2025/09/Imagen-referencial-Aumentan-las-estafas-a-inversores-en-redes-sociales-con-la-ayuda-de-la-inteligencia-artificial-Suministrada-por-ESET-y-Comstat-R-300x169.jpg 300w, https://bitfinance.news/wp-content/uploads/2025/09/Imagen-referencial-Aumentan-las-estafas-a-inversores-en-redes-sociales-con-la-ayuda-de-la-inteligencia-artificial-Suministrada-por-ESET-y-Comstat-R-1024x576.jpg 1024w, https://bitfinance.news/wp-content/uploads/2025/09/Imagen-referencial-Aumentan-las-estafas-a-inversores-en-redes-sociales-con-la-ayuda-de-la-inteligencia-artificial-Suministrada-por-ESET-y-Comstat-R-768x432.jpg 768w" sizes="(max-width: 1244px) 100vw, 1244px" /></div><p>Faced with financial doubts and concerns, it&#8217;s no surprise that people are looking for alternatives to make their money go further. This leads users with little investment experience to become interested and take their first steps. ESET, a leading company in proactive threat detection, warns that scammers are taking advantage of this curiosity or need [&#8230;]</p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/investor-scams-on-social-media-are-on-the-rise-with-the-help-of-artificial-intelligence/">Investor scams on social media are on the rise with the help of artificial intelligence</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="1244" height="700" src="https://bitfinance.news/wp-content/uploads/2025/09/Imagen-referencial-Aumentan-las-estafas-a-inversores-en-redes-sociales-con-la-ayuda-de-la-inteligencia-artificial-Suministrada-por-ESET-y-Comstat-R.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="El incremento de anuncios falsos, deepfakes y promesas de ganancias busca engañar incluso a las personas más cautelosas. ESET advierte de un crecimiento del 335% en las amenazas del troyano tipo Nomani, lo que llevó al bloqueo más de 8.500 dominios relacionados" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2025/09/Imagen-referencial-Aumentan-las-estafas-a-inversores-en-redes-sociales-con-la-ayuda-de-la-inteligencia-artificial-Suministrada-por-ESET-y-Comstat-R.jpg 1244w, https://bitfinance.news/wp-content/uploads/2025/09/Imagen-referencial-Aumentan-las-estafas-a-inversores-en-redes-sociales-con-la-ayuda-de-la-inteligencia-artificial-Suministrada-por-ESET-y-Comstat-R-300x169.jpg 300w, https://bitfinance.news/wp-content/uploads/2025/09/Imagen-referencial-Aumentan-las-estafas-a-inversores-en-redes-sociales-con-la-ayuda-de-la-inteligencia-artificial-Suministrada-por-ESET-y-Comstat-R-1024x576.jpg 1024w, https://bitfinance.news/wp-content/uploads/2025/09/Imagen-referencial-Aumentan-las-estafas-a-inversores-en-redes-sociales-con-la-ayuda-de-la-inteligencia-artificial-Suministrada-por-ESET-y-Comstat-R-768x432.jpg 768w" sizes="(max-width: 1244px) 100vw, 1244px" /></div><p style="text-align: justify;">Faced with financial doubts and concerns, it&#8217;s no surprise that people are looking for alternatives to make their money go further. This leads users with little investment experience to become interested and take their first steps. <strong><a href="https://www.eset.com/latam/" target="_blank" rel="noopener">ESET</a></strong>, a leading company in proactive threat detection, warns that scammers are taking advantage of this curiosity or need with increasingly sophisticated scams on social media. It also warns that AI-powered scams produce fake ads, deepfakes, and promises of profits that seek to deceive even the most cautious users.</p>
<p style="text-align: justify;"><em>“Could you distinguish between a real investment ad and a fake one? It&#8217;s becoming increasingly difficult to do so. Threat actors today have various tactics to make their scams more credible, including deepfake videos generated with artificial intelligence. While there are many tactics, techniques, and procedures (TTPs) associated with this type of fraud, most begin with malicious or deceptive ads circulating on social media. They are often used as a lure to trick the victim, either into providing personal information or directly directing them to an investment scam,”</em> says <strong>Camilo Gutiérrez Amaya, Head of the ESET Latin America Research Lab.</strong></p>
<p style="text-align: justify;">According to the <a href="https://www.ic3.gov/AnnualReport/Reports/2024_IC3Report.pdf" target="_blank" rel="noopener">FBI</a>, investment scams have been the main source of income for cybercriminals for several years. At last count, they earned nearly $6.6 billion, and that&#8217;s just from crimes reported to the federal government. This figure dwarfs the $2.8 billion earned by the second-largest scam, <a href="https://www.welivesecurity.com/2022/04/26/trouble-bec-how-stop-costliest-scam/" target="_blank" rel="noopener">business email compromise</a> (BEC).</p>
<p style="text-align: justify;">An <a href="https://bitfinance.news/en/vegetable-production-in-venezuela-increased-30/" target="_blank" rel="noopener">example of this type of campaign</a> was identified in June 2025, when Instagram ads impersonated legitimate banks. Some used tempting offers, such as high-interest accounts, in an attempt to persuade the victim to click and enter their banking information. In other cases, they used deepfake Instagram stories featuring banking investment strategists to collect personal information and/or lure them into WhatsApp groups about investment scams. A 2024 campaign spread a fake video of <a href="https://bitfinance.news/en/china-secures-oil-supplies-from-russia/" target="_blank" rel="noopener">Lionel Messi to promote supposed investments</a> through an app that promised high returns.</p>
<p style="text-align: justify;">Also in 2024, <a href="https://web-assets.esetstatic.com/wls/en/papers/threat-reports/eset-threat-report-h22024.pdf#page=17" target="_blank" rel="noopener">ESET observed the Nomani Trojan campaign</a>. The ad content and the phishing websites they linked to were designed to impersonate local news outlets and other organizations. Or, it could be a generic financial-themed visual with frequently changing names like &#8220;Quantum Bumex, Immediate Mator, or Bitcoin Trader.&#8221; Some of the characteristics of the Nomani campaign (and other similar campaigns) include:</p>
<ul style="text-align: justify;">
<li>Highly localized content to attract specific regional victims.</li>
<li>Distribution via fake ads on Facebook, Instagram, X, YouTube, as well as Messenger and Threads.</li>
<li>Deepfake video testimonials potentially using celebrities, often displayed in low-quality videos and with unnatural keyword repetition.</li>
<li>Use of fake and hacked accounts to run the ads (including, in one case, an <a href="https://www.welivesecurity.com/en/scams/hijacked-hacked-youtube-channels-scams-malware/" target="_blank" rel="noopener">actor with 300,000 followers</a>).</li>
<li>Shared templates and callbacks pointing to the same hosting infrastructure.</li>
</ul>
<p style="text-align: justify;">In this campaign, according to ESET, the intended objective is to persuade the victim to provide their personal information, which the scammers use to contact them directly. They use this method to trick them into signing up for an investment scam, <a href="https://www.welivesecurity.com/en/scams/borrower-beware-common-loan-scams/" target="_blank" rel="noopener">taking out a loan</a>, or even installing remote access software on their device. <strong>ESET observed a 335% increase in Nomani threats between H1 and H2 2024, and blocked more than 8,500 related domains.</strong></p>
<p style="text-align: justify;">While these techniques seem like clear indicators of fraud, they can be much more difficult to detect, especially if you are looking for opportunities to alleviate financial pressures. ESET states that the <a href="https://www.welivesecurity.com/2022/05/12/10-reasons-why-we-fall-scams/" target="_blank" rel="noopener">continued effectiveness of these types of scams</a>, such as fraudulent financial ads, is due to the following:</p>
<ul style="text-align: justify;">
<li>Times are tough, and the prospect of quick and easy financial gain is attractive.</li>
<li>Attention spans are decreasing, especially on mobile devices, so warning signs may not be detected in time.</li>
<li>Many people are unfamiliar with the latest threat TTPs, such as the use of deepfake videos, which makes them more vulnerable.</li>
<li>Many of these threats are localized, use legitimate (hijacked) accounts, and can appear at the top of search results.</li>
<li>Banks&#8217; traditional anti-fraud mechanisms often don&#8217;t work if the manipulation is also carried out socially via telephone to invest in a fraudulent scheme.</li>
</ul>
<h3 style="text-align: left;">Investment scams are very common, and ESET points out that it&#8217;s necessary to pay attention to these warning signs</h3>
<ul>
<li style="text-align: justify;">Flashy ads (which may leverage legitimate brands) offering returns that are too good to be true or unusually high interest rates.</li>
<li style="text-align: justify;">Celebrity endorsements are often the hook to give the product a certain legitimacy. Always check if the endorsement is legitimate.</li>
<li style="text-align: justify;">Videos that don&#8217;t look entirely right, for example, with visual glitches, poor audio and video synchronization, low resolution, or robotic or overly polished voices.</li>
<li style="text-align: justify;">Pressure to act quickly and secure the investment.</li>
<li style="text-align: justify;">Guaranteed return on investment.</li>
</ul>
<p style="text-align: justify;">They also advise staying alert to warning signs, resisting the temptation to click on ads about finance or investments, even if they appear to be promoted by legitimate brands and individuals, searching online for reviews of a specific investment plan or group to verify their authenticity, not investing in financial products without having thoroughly researched them and understanding how they work, ignoring any unsolicited third-party offers, never sharing personal and/or financial information after clicking on an online ad, and always checking the information circulated with the supposedly issuing entity through official channels. Finally, <strong>use security software</strong> <strong>on all your devices </strong>from a trusted provider <a href="https://bitfinance.news/en/vegetable-production-in-venezuela-increased-30/" target="_blank" rel="noopener">like ESET</a>, which will help block scams.</p>
<p style="text-align: justify;">“In times of economic uncertainty, it&#8217;s understandable that we look for alternatives to improve our financial situation. But scammers are exploiting this very need with increasingly sophisticated tactics. Therefore, being wary of what&#8217;s easy, recognizing the warning signs, and protecting your personal data is essential to avoid falling for this type of scam,” concludes the ESET researcher. ESET invites you to learn more about cybersecurity by visiting:  <a href="https://www.welivesecurity.com/es/" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://www.welivesecurity.com/es/&amp;source=gmail&amp;ust=1756810847233000&amp;usg=AOvVaw2ji62LZTXjdo6UzrkQHffK">https://www.welivesecurity.com/es/</a>.</p>
<p style="text-align: justify;">For other useful preventive information, it is also available in Venezuela:  <a href="https://www.eset.com/ve/" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://www.eset.com/ve/&amp;source=gmail&amp;ust=1756810847233000&amp;usg=AOvVaw0tO0ykjxd09rJ178m-eJ5P">https://www.eset.com/ve/</a>, and on its social media channels @eset_ve. Also, available on Instagram (<a href="https://www.instagram.com/esetla/" target="_blank" rel="noopener">@esetla</a>) and Facebook (<a href="https://www.facebook.com/ESETLA" target="_blank" rel="noopener">ESET</a>).</p>
<p style="text-align: justify;"><em>Bitfinance.News</em></p>
<p>With information and reference image provided by ESET and Comstat Rowland</p>
<p><em>Visit our news channel on </em><a href="https://news.google.com/publications/CAAqBwgKMP_wxAswoozcAw?ceid=VE:es-419&amp;oc=3" target="_blank" rel="noopener"><em><strong>Google News</strong></em></a><em> and follow us to get accurate, interesting information and stay up to date with everything. You can also see our daily content on </em><a href="https://twitter.com/BitFinance_News" target="_blank" rel="noopener"><em><strong>X/Twitter</strong></em></a><em> and </em><a href="https://www.instagram.com/bitfinancenews/?hl=es" target="_blank" rel="noopener"><em><strong>Instagram</strong></em></a></p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/investor-scams-on-social-media-are-on-the-rise-with-the-help-of-artificial-intelligence/">Investor scams on social media are on the rise with the help of artificial intelligence</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Credential stuffing: the risk of repeating passwords and how to protect yourself</title>
		<link>https://bitfinance.news/en/credential-stuffing-the-risk-of-repeating-passwords-and-how-to-protect-yourself/</link>
		
		<dc:creator><![CDATA[Marilin Pino]]></dc:creator>
		<pubDate>Mon, 18 Aug 2025 12:00:37 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Financial security]]></category>
		<category><![CDATA[Camilo Gutiérrez Amaya]]></category>
		<category><![CDATA[credential stuffing]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[ESET Latin America]]></category>
		<category><![CDATA[ESET Venezuela]]></category>
		<category><![CDATA[prevention]]></category>
		<category><![CDATA[repetition]]></category>
		<category><![CDATA[Research Lab]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Warning]]></category>
		<guid isPermaLink="false">https://bitfinance.news/?p=115364</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="1000" height="667" src="https://bitfinance.news/wp-content/uploads/2025/08/Imagen-referencial-Credential-stuffing-el-riesgo-de-repetir-contrasenas-y-como-protegerse-Suministrada-por-ESET-y-Comstat-R-2.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="ESET advierte que si se utiliza la misma contraseña en diversas cuentas y servicios entonces podemos ser víctimas de credential stuffing, y comparte información sobre cómo funciona y de qué manera protegerse" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2025/08/Imagen-referencial-Credential-stuffing-el-riesgo-de-repetir-contrasenas-y-como-protegerse-Suministrada-por-ESET-y-Comstat-R-2.jpg 1000w, https://bitfinance.news/wp-content/uploads/2025/08/Imagen-referencial-Credential-stuffing-el-riesgo-de-repetir-contrasenas-y-como-protegerse-Suministrada-por-ESET-y-Comstat-R-2-300x200.jpg 300w, https://bitfinance.news/wp-content/uploads/2025/08/Imagen-referencial-Credential-stuffing-el-riesgo-de-repetir-contrasenas-y-como-protegerse-Suministrada-por-ESET-y-Comstat-R-2-768x512.jpg 768w" sizes="(max-width: 1000px) 100vw, 1000px" /></div><p>Credential stuffing is a type of cyberattack in which malicious actors use leaked usernames and passwords to log in to accounts and services other than the one that was leaked. The success of these attacks relies on the habit of reusing the same password for different accounts or services. Therefore, if a password is leaked, [&#8230;]</p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/credential-stuffing-the-risk-of-repeating-passwords-and-how-to-protect-yourself/">Credential stuffing: the risk of repeating passwords and how to protect yourself</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="1000" height="667" src="https://bitfinance.news/wp-content/uploads/2025/08/Imagen-referencial-Credential-stuffing-el-riesgo-de-repetir-contrasenas-y-como-protegerse-Suministrada-por-ESET-y-Comstat-R-2.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="ESET advierte que si se utiliza la misma contraseña en diversas cuentas y servicios entonces podemos ser víctimas de credential stuffing, y comparte información sobre cómo funciona y de qué manera protegerse" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2025/08/Imagen-referencial-Credential-stuffing-el-riesgo-de-repetir-contrasenas-y-como-protegerse-Suministrada-por-ESET-y-Comstat-R-2.jpg 1000w, https://bitfinance.news/wp-content/uploads/2025/08/Imagen-referencial-Credential-stuffing-el-riesgo-de-repetir-contrasenas-y-como-protegerse-Suministrada-por-ESET-y-Comstat-R-2-300x200.jpg 300w, https://bitfinance.news/wp-content/uploads/2025/08/Imagen-referencial-Credential-stuffing-el-riesgo-de-repetir-contrasenas-y-como-protegerse-Suministrada-por-ESET-y-Comstat-R-2-768x512.jpg 768w" sizes="(max-width: 1000px) 100vw, 1000px" /></div><p style="text-align: justify;"><strong>Credential stuffing</strong> is a type of cyberattack in which malicious actors use leaked usernames and passwords to log in to accounts and services other than the one that was leaked. The success of these attacks relies on the habit of <a href="https://www.eset.com/latam/blog/cultura-y-seguridad-digital/riesgos-usar-misma-contrasena/?utm_source=welivesecurity.com&amp;utm_medium=referral&amp;utm_campaign=autotagging&amp;utm_content=contraseas&amp;utm_term=es" target="_blank" rel="noopener">reusing the same password for different accounts or services</a>. Therefore, if a password is leaked, attackers only need to try it on other sites where the user already has an account, since if there is a match, they gain access without needing to breach the system. <a href="https://www.eset.com/latam/" target="_blank" rel="noopener">ESET</a>, a leading company in proactive threat detection, analyzes what a credential stuffing attack looks like, why they&#8217;re so effective, what their consequences can be, and how to avoid them.</p>
<p style="text-align: justify;">&#8220;Repeating passwords is like using the same key to open your house, car, office, and safe. Paying attention and managing passwords properly is as important as locking your front door. Simple habits can make a difference: avoiding password reuse, enabling two-factor authentication, and using a secure password manager are practices we need to incorporate to stay protected against this type of threat and many others,&#8221; says <strong>Camilo Gutiérrez Amaya, Head of the ESET Latin America Research Lab.</strong></p>
<p style="text-align: justify;">The start of a credential stuffing attack is when a cybercriminal obtains leaked credentials. These are triggered by <a href="https://www.welivesecurity.com/es/seguridad-digital/5-filtraciones-de-datos-ultimos-10-anos/" target="_blank" rel="noopener">data breaches</a> from important and well-known companies and organizations, and <a href="https://www.welivesecurity.com/es/contrasenas/16-mil-millones-credenciales-filtradas-que-significa/" target="_blank" rel="noopener">involve the exposure of millions of data points.</a></p>
<p style="text-align: justify;">With this sensitive information available, and <a href="https://thehackernews.com/2025/03/how-new-ai-agents-will-transform.html" target="_blank" rel="noopener">using bots or automated scripts,</a> these passwords are tested on various sites, accounts, or services (such as Netflix, Gmail, banks, social networks, among others). Thousands of logins are tested per minute.</p>
<p style="text-align: justify;">If a match is found, the accounts are logged in. This login would be identical to that of the legitimate user, making it difficult to detect, as there is no suspicious activity, such as repeated failed attempts.</p>
<h4 style="text-align: left;">To better understand the impact of these attacks, ESET reviews two specific cases that show how credential stuffing can compromise thousands of accounts</h4>
<ul style="text-align: justify;">
<li><strong>PayPal case:</strong> Between December 6 and 8, 2022, <a href="https://www.welivesecurity.com/la-es/2023/01/19/paypal-sufrio-incidente-expuso-informacion-personal-varios-usuarios/" target="_blank" rel="noopener"><strong>PayPal suffered a credential stuffing attack</strong></a> that compromised nearly <strong>35,000 accounts</strong>, exposing sensitive information such as names, addresses, dates of birth, and tax identification numbers.</li>
<li><strong>Snowflake:</strong> <strong>More than 165 organizations</strong> were affected when attackers accessed <a href="https://www.welivesecurity.com/es/privacidad/filtraciones-datos-2024-se-cuentan-miles-millones/#:~:text=el%20grupo%20que%20se%20atribuyo%20el%20ataque%2C%20shinyhunters%2C%20habia%20utilizado%20credenciales%20de%20ticketmaster%20comprometidas%20que%20no%20tenian%20activado%20la%20autenticacion%20multifactor%2C%20lo%20que%20les%20permitio%20acceder%2" target="_blank" rel="noopener">Snowflake utilizando credenciales robadas mediante malware tipo infostealer</a>. Although Snowflake&#8217;s infrastructure was not directly compromised, attackers took advantage of the lack of multi-factor authentication and the use of old passwords.</li>
</ul>
<p style="text-align: justify;"><em>&#8220;Large data breaches are the primary way cybercriminals obtain these credentials, and they are occurring more frequently than expected,&#8221;</em> adds the ESET specialist.</p>
<p style="text-align: justify;">In June 2025, another example was a series of databases totaling <a href="https://www.welivesecurity.com/es/contrasenas/16-mil-millones-credenciales-filtradas-que-significa/" target="_blank" rel="noopener">16 billion records</a> that were hosted in misconfigured repositories that were left exposed and public. Although the exposure was temporary, it was enough for researchers, or anyone else, to access the data, which included username and password combinations for online services such as Google, Facebook, Meta, Apple, and other accounts.</p>
<p style="text-align: justify;">But it wasn&#8217;t the only one of the year: in May, security researcher <strong>Jeremiah Fowler</strong> revealed the public exposure of <a href="https://www.welivesecurity.com/es/seguridad-digital/184-millones-credenciales-expuestas-base-desprotegida/" target="_blank" rel="noopener">184 million login credentials</a> for users&#8217; accounts around the world. This included information from various email server providers, Apple products, Google, Facebook, Instagram, Snapchat, and Roblox, to name just the most well-known. Not only that: the records included credentials from banks and other financial institutions, healthcare platforms, and government portals from several countries.</p>
<h3 style="text-align: left;">To avoid a credential stuffing attack, ESET recommends several actions</h3>
<ol style="text-align: justify;">
<li>Essential: Do not reuse the same password across different accounts, platforms, and services.</li>
<li>Have <a href="https://www.welivesecurity.com/es/contrasenas/contrasenas-que-tan-seguras-son/" target="_blank" rel="noopener">strong, secure, and unique passwords</a> for each account. For this purpose, a <a href="https://www.eset.com/latam/blog/cultura-y-seguridad-digital/gestor-contrasena-que-es/?utm_source=welivesecurity.com&amp;utm_medium=referral&amp;utm_campaign=autotagging&amp;utm_content=contraseas&amp;utm_term=es" target="_blank" rel="noopener">password manager</a> is very useful. This tool is designed to store login credentials and protect them through encryption, and also includes a dedicated feature for generating complex and strong passwords.</li>
<li>Enable <a href="https://www.welivesecurity.com/la-es/2022/12/22/doble-factor-autenticacion-que-es-porque-lo-necesito/" target="_blank" rel="noopener">doble factor de autenticación</a> on as many accounts and services as possible. This second factor is key if a password falls into the wrong hands, as a cyberattacker won&#8217;t be able to access the accounts without it.</li>
<li>Check if passwords or login credentials have already been leaked in a data breach, and change them immediately. For example, visit the website <a href="https://haveibeenpwned.com/" target="_blank" rel="noopener">haveibeenpwned.com</a>.</li>
</ol>
<p style="text-align: justify;">ESET invites you to learn more about computer security by visiting: <a href="https://www.welivesecurity.com/es/" target="_blank" rel="noopener">https://www.welivesecurity.com/es/</a>.</p>
<p style="text-align: justify;">For other useful preventive information, it is also available in Venezuela: <a href="https://www.eset.com/ve/" target="_blank" rel="noopener">https://www.eset.com/ve/</a>, and its social media channels @eset_ve. Also available on Instagram (<a href="https://www.instagram.com/esetla/" target="_blank" rel="noopener">@esetla</a>) and Facebook (<a href="https://www.facebook.com/ESETLA" target="_blank" rel="noopener">ESET</a>).</p>
<p style="text-align: justify;"><em>With information and main image provided by ESET and Comstat Rowland</em></p>
<p>Visit our news channel on <a href="https://news.google.com/publications/CAAqBwgKMP_wxAswoozcAw?ceid=VE:es-419&amp;oc=3" target="_blank" rel="noopener"><strong>Google News</strong></a> and follow us to get accurate, interesting information and stay up to date with everything. You can also see our daily content on <a href="https://twitter.com/BitFinance_News" target="_blank" rel="noopener"><strong>X/Twitter</strong></a> and <a href="https://www.instagram.com/bitfinancenews/?hl=es" target="_blank" rel="noopener"><strong>Instagram</strong></a></p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/credential-stuffing-the-risk-of-repeating-passwords-and-how-to-protect-yourself/">Credential stuffing: the risk of repeating passwords and how to protect yourself</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How secure is your iPhone?: ESET analyzes, explains, and makes recommendations</title>
		<link>https://bitfinance.news/en/how-secure-is-your-iphone-eset-analyzes-explains-and-makes-recommendations/</link>
		
		<dc:creator><![CDATA[Marilin Pino]]></dc:creator>
		<pubDate>Sun, 18 May 2025 12:00:35 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Financial security]]></category>
		<category><![CDATA[Innovation]]></category>
		<category><![CDATA[Apple's official App Store]]></category>
		<category><![CDATA[Camilo Gutiérrez Amaya]]></category>
		<category><![CDATA[challenges]]></category>
		<category><![CDATA[Computer Security Lab]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[ESET]]></category>
		<category><![CDATA[ESET Latin America]]></category>
		<category><![CDATA[EU antitrust law]]></category>
		<category><![CDATA[GoldPickaxe]]></category>
		<category><![CDATA[iOS]]></category>
		<category><![CDATA[Iphone]]></category>
		<category><![CDATA[jailbreak]]></category>
		<category><![CDATA[Prevention and protection]]></category>
		<category><![CDATA[prudence]]></category>
		<category><![CDATA[risks]]></category>
		<category><![CDATA[threats]]></category>
		<guid isPermaLink="false">https://bitfinance.news/?p=113672</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="739" height="503" src="https://bitfinance.news/wp-content/uploads/2025/05/Imagen-referencial-Que-tan-seguro-es-tu-iPhone-Suministrada-por-ESET-y-Comstat-R.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Aplicaciones maliciosas, descargas desde sitios web, redes de wifi públicas, phishing, ingeniería social, son algunas de las amenazas que ponen en riesgo a los usuarios de iPhone" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2025/05/Imagen-referencial-Que-tan-seguro-es-tu-iPhone-Suministrada-por-ESET-y-Comstat-R.jpg 739w, https://bitfinance.news/wp-content/uploads/2025/05/Imagen-referencial-Que-tan-seguro-es-tu-iPhone-Suministrada-por-ESET-y-Comstat-R-300x204.jpg 300w" sizes="(max-width: 739px) 100vw, 739px" /></div><p>Apple&#8217;s control over its ecosystem of devices and apps has historically been strict. Additionally, several built-in security features, such as strong encryption and containerization, help prevent data leakage and limit the spread of malware. However, in addition to all this, ESET, a leading company in proactive threat detection, warns in this extensive analysis that risks [&#8230;]</p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/how-secure-is-your-iphone-eset-analyzes-explains-and-makes-recommendations/">How secure is your iPhone?: ESET analyzes, explains, and makes recommendations</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="739" height="503" src="https://bitfinance.news/wp-content/uploads/2025/05/Imagen-referencial-Que-tan-seguro-es-tu-iPhone-Suministrada-por-ESET-y-Comstat-R.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Aplicaciones maliciosas, descargas desde sitios web, redes de wifi públicas, phishing, ingeniería social, son algunas de las amenazas que ponen en riesgo a los usuarios de iPhone" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2025/05/Imagen-referencial-Que-tan-seguro-es-tu-iPhone-Suministrada-por-ESET-y-Comstat-R.jpg 739w, https://bitfinance.news/wp-content/uploads/2025/05/Imagen-referencial-Que-tan-seguro-es-tu-iPhone-Suministrada-por-ESET-y-Comstat-R-300x204.jpg 300w" sizes="(max-width: 739px) 100vw, 739px" /></div><p style="text-align: justify;"><strong>Apple&#8217;s control over its ecosystem of devices and apps has historically been strict. </strong>Additionally, several built-in security features, such as strong encryption and <a href="https://www.welivesecurity.com/la-es/2021/01/05/formas-comunes-dispositivos-pueden-infectarse-con-malwareen-infectarse-con-malware/" target="_blank" rel="noopener">containerization</a>, help prevent data leakage and limit the <a href="https://www.welivesecurity.com/la-es/2021/01/05/formas-comunes-dispositivos-pueden-infectarse-con-malwareen-infectarse-con-malware/" target="_blank" rel="noopener">spread of malware</a>. However, in addition to all this, <a href="https://www.eset.com/latam/" target="_blank" rel="noopener"><strong>ESET</strong></a>, a leading company in proactive threat detection, warns in this extensive analysis that risks <a href="https://www.welivesecurity.com/2022/09/19/can-iphone-be-hacked-what-know-ios-security/" target="_blank" rel="noopener">are not completely eliminated</a>, as everyday scams and other threats also bombard iOS users&#8230; and while some are more common than others, they <a href="https://www.welivesecurity.com/2022/09/19/can-iphone-be-hacked-what-know-ios-security/" target="_blank" rel="noopener">all demand attention.</a></p>
<p style="text-align: justify;"><em>“The fact that iOS apps typically originate from Apple&#8217;s official App Store and must pass strict testing for approval has avoided security and privacy headaches over the years. However, the recent EU antitrust law, known as the <a href="https://commission.europa.eu/strategy-and-policy/priorities-2019-2024/europe-fit-digital-age/digital-markets-act-ensuring-fair-and-open-digital-markets_es" target="_blank" rel="noopener">Digital Markets Act</a> (DMA), seeks to give iOS users the option of using third-party app marketplaces. This will present new challenges for Apple in protecting iOS users from potential harm and for those who use its products, as they will need to be more aware of threats. This change in the rules of the game will undoubtedly be exploited by cybercrime,”</em> comments Camilo Gutiérrez Amaya, Head of the ESET Latin America IT Security Lab.</p>
<p style="text-align: justify;"><strong>ESET </strong>has also studied and offers its opinion on<strong> other, possibly more immediate, threats targeting iOS users worldwide:</strong></p>
<p style="text-align: justify;"><strong>Jailbroken devices:</strong> Deliberately jailbreaking a device to allow what Apple calls &#8220;unauthorized modifications&#8221; could violate the Software License Agreement and disable some built-in security features, such as <a href="https://support.apple.com/en-gb/guide/security/secb3000f149/web" target="_blank" rel="noopener">Secure Boot</a> and <a href="https://www.devx.com/terms/data-execution-prevention/" target="_blank" rel="noopener">Data Execution Prevention</a>. The device will no longer receive automatic updates. And being able to download apps from outside the App Store exposes you to malicious and/or buggy software.</p>
<p style="text-align: justify;"><strong>Malicious apps</strong>: While Apple does a good job of vetting apps, <a href="https://www.welivesecurity.com/2018/12/03/scam-ios-apps-promise-fitness-steal-money-instead/" target="_blank" rel="noopener">it isn&#8217;t 100 % accurate</a>. <strong>Malicious apps recently detected on the App Store include:</strong> A fake version of the <a href="https://blog.lastpass.com/posts/warning-fraudulent-app-impersonating-lastpass-currently-available-in-apple-app-store" target="_blank" rel="noopener">LastPass</a> <a href="https://blog.lastpass.com/posts/warning-fraudulent-app-impersonating-lastpass-currently-available-in-apple-app-store" target="_blank" rel="noopener">password manager</a> designed to harvest credentials; a screenshot-reading malware dubbed &#8220;SparkCat,&#8221; disguised as <a href="https://www.theverge.com/news/606649/ios-iphone-app-store-malicious-apps-malware-crypto-password-screenshot-reader-found" target="_blank" rel="noopener">artificial intelligence and food delivery apps</a>; as well as <a href="https://discussions.apple.com/thread/255482851?sortBy=rank" target="_blank" rel="noopener">a fake crypto wallet app</a> called &#8220;Rabby Wallet &amp; Crypto Solution.&#8221;</p>
<p style="text-align: justify;"><strong>Downloading apps from websites</strong>: As detailed in <a href="https://web-assets.esetstatic.com/wls/en/papers/threat-reports/eset-threat-report-h22024.pdf" target="_blank" rel="noopener">the latest ESET Threat Report</a>, progressive web apps (PWAs) allow direct installation without requiring users to grant explicit permissions, meaning downloads could go unnoticed. ESET discovered this technique used to disguise banking malware as legitimate mobile banking apps.</p>
<p style="text-align: justify;"><strong>Phishing/Social Engineering:</strong> Phishing attacks via email, text (or iMessage), and even voice are common. They impersonate legitimate brands and trick users into providing their credentials, clicking on malicious links, or opening attachments to trigger malware downloads. Apple IDs are among the most valuable logins, as they can provide access to all data stored in an iCloud account and/or allow attackers to make iTunes/App Store purchases. ESET advises caution with:</p>
<ul style="text-align: justify;">
<li><strong>Fake pop-ups</strong> <a href="https://www.welivesecurity.com/2021/07/20/url-shortener-services-android-malware-banking-sms-trojans/" target="_blank" rel="noopener">claiming the device</a> has a security issue</li>
<li>Fraudulent phone calls and FaceTime calls impersonating Apple Support or partner organizations</li>
<li>Fake promotions offering freebies and sweepstakes</li>
<li>Calendar invitation spam with phishing links</li>
</ul>
<p style="text-align: justify;">As an example, in a <a href="https://web-assets.esetstatic.com/wls/en/papers/threat-reports/eset-threat-report-h12024.pdf" target="_blank" rel="noopener">highly sophisticated campaign</a>, threat actors and attack planners used social engineering techniques to trick users into downloading a mobile device management (MDM) profile that would allow them to control the victims&#8217; devices. They then deployed the GoldPickaxe malware, designed to collect facial biometric data and use it to bypass banking logins.</p>
<p style="text-align: justify;"><strong>Risks of public Wi-Fi networks:</strong> A public Wi-Fi hotspot can be a fake access point created by threat actors to monitor web traffic and steal sensitive information, such as banking passwords. Even if the access point is legitimate, many don&#8217;t encrypt data in transit, meaning hackers with the right tools could see the websites you visit and the credentials you enter. That&#8217;s why ESET recommends using a <a href="https://www.welivesecurity.com/en/privacy/buying-vpn-what-know-look-for/" target="_blank" rel="noopener">VPN</a>, which creates an encrypted tunnel between your device and the internet.</p>
<p style="text-align: justify;"><strong>Vulnerabilities:</strong> While Apple puts a lot of time and effort into ensuring its code is free of vulnerabilities, sometimes flaws occur in production. In these cases, hackers can take advantage if users haven&#8217;t updated their device, for example by sending malicious links in messages that trigger an exploit if clicked.</p>
<ul style="text-align: justify;">
<li>Last year, Apple was <a href="https://www.darkreading.com/vulnerabilities-threats/siri-bug-enables-data-theft-on-locked-apple-devices" target="_blank" rel="noopener">forced to patch</a> a vulnerability that could allow attackers to steal information from a locked device using Siri voice commands.</li>
<li>Sometimes, threat actors and commercial companies themselves research new (zero-day) vulnerabilities to exploit. Although rare and highly targeted, <a href="https://www.infosecurity-magazine.com/news/apple-update-extremely/" target="_blank" rel="noopener">attacks that exploit these vulnerabilities</a> are often used to covertly install spyware to spy on victims&#8217; devices.</li>
</ul>
<h3 style="text-align: left;">Prevention and protection are necessary and wise</h3>
<p style="text-align: justify;">While malware lurks on iOS devices, it is also possible to minimize exposure to threats. ESET shares the following key tactics:</p>
<ul style="text-align: justify;">
<li><strong>Keep iOS and all apps updated</strong>. This will reduce the window of opportunity for threat actors to exploit any vulnerabilities in older versions to achieve their goals.</li>
<li>Always use strong, unique passwords for all accounts, perhaps using the <a href="https://www.eset.com/us/ios-cyber-security/?utm_source=welivesecurity.com&amp;utm_medium=referral&amp;utm_campaign=autotagging&amp;utm_content=seguridad-en-mviles&amp;utm_term=es" target="_blank" rel="noopener">ESET Password Manager for iOS</a>, and enable multi-factor authentication if offered. This is easy on iPhones, as it will require a simple Face ID scan. This will ensure that even if attackers obtain the passwords, they won&#8217;t be able to access the apps without scanning the user&#8217;s face.</li>
<li><strong>Enable Face ID or Touch ID to access the device,</strong> backed up with a strong password. This will keep the iPhone secure in case of loss or theft.</li>
<li><strong>Do not jailbreak the device</strong>, for the reasons mentioned above. Your iPhone would be less secure.</li>
<li><strong>Be wary of phishing</strong>. This means treating unsolicited calls, texts, emails, and social media messages with <a href="https://www.welivesecurity.com/en/scams/dear-all-what-are-some-common-subject-lines-in-phishing-emails/" target="_blank" rel="noopener">extreme caution</a>. Do not click on links or open attachments. If you really need to do so, verify separately with the sender that the message is legitimate (i.e., not responding to the information contained in the message). Look for signs of social engineering, such as grammatical and spelling errors, an urgency to act, gifts and offers that are too good to be true, or domains (from the sender) that don&#8217;t match the supposed sender.</li>
<li><strong>Avoid public Wi-Fi networks</strong>. If you must use them, do so <a href="https://www.eset.com/py/hogar/planes-de-proteccion/#inside-ios?utm_source=welivesecurity.com&amp;utm_medium=referral&amp;utm_campaign=autotagging&amp;utm_content=seguridad-en-mviles&amp;utm_term=es" target="_blank" rel="noopener">with a VPN</a>. At the very least, don&#8217;t log into any valuable accounts or enter sensitive information on public Wi-Fi.</li>
<li><strong>Try to limit any downloads to the App Store</strong> to minimize the risk of downloading something malicious or risky.</li>
<li>If you think you might be a target of spyware (often used against journalists, activists, and dissidents), activate <a href="https://support.apple.com/en-us/105120" target="_blank" rel="noopener">blocking mode</a>.</li>
<li><strong>Pay attention to the telltale signs of a malware infection</strong>, which could include slow performance, unwanted ad pop-ups, an overheating device, new apps appearing on the home screen, or increased data usage.</li>
</ul>
<p style="text-align: justify;">“While the Apple iPhone remains one of the most secure devices available, this doesn&#8217;t mean it&#8217;s free from threats. Staying alert, knowing the potential risks, and taking the necessary protective measures help keep your information and devices safe,” concludes Gutiérrez Amaya of ESET Latin America.</p>
<p style="text-align: justify;">For more preventive information on cybersecurity, you can visit the ESET website: <a href="https://www.eset.com/ve/" target="_blank" rel="noopener">https://www.eset.com/ve/</a> and its social media channels @eset_ve. Also visit Instagram (<a href="https://www.instagram.com/esetla/" target="_blank" rel="noopener">@esetla</a>) and Facebook (<a href="https://www.facebook.com/ESETLA" target="_blank" rel="noopener">ESET</a>). Or visit <a href="https://www.eset.com/latam/" target="_blank" rel="noopener">https://www.eset.com/latam</a>.</p>
<p style="text-align: left;"><em>With information and reference image provided by ESET and Comstat Rowland.</em></p>
<p style="text-align: left;">Visit our news channel on <a href="https://news.google.com/publications/CAAqBwgKMP_wxAswoozcAw?ceid=VE:es-419&amp;oc=3" target="_blank" rel="noopener"><strong>Google News</strong></a> and follow us to get accurate, interesting information and stay up to date with everything. You can also see our daily content on <a href="https://twitter.com/BitFinance_News" target="_blank" rel="noopener"><strong>X/Twitter</strong></a> and <a href="https://www.instagram.com/bitfinancenews/?hl=es" target="_blank" rel="noopener"><strong>Instagram</strong></a></p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/how-secure-is-your-iphone-eset-analyzes-explains-and-makes-recommendations/">How secure is your iPhone?: ESET analyzes, explains, and makes recommendations</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Scams leveraging voice cloning with Artificial Intelligence are on the rise</title>
		<link>https://bitfinance.news/en/scams-leveraging-voice-cloning-with-artificial-intelligence-are-on-the-rise/</link>
		
		<dc:creator><![CDATA[Marilin Pino]]></dc:creator>
		<pubDate>Thu, 20 Mar 2025 17:00:55 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Innovation]]></category>
		<category><![CDATA[Other topics]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[Camilo Gutiérrez Amaya]]></category>
		<category><![CDATA[Cybercriminals]]></category>
		<category><![CDATA[ESET]]></category>
		<category><![CDATA[ESET Latin America]]></category>
		<category><![CDATA[preventive measures]]></category>
		<category><![CDATA[proactive threat detection]]></category>
		<category><![CDATA[Research Lab]]></category>
		<category><![CDATA[stay alert]]></category>
		<category><![CDATA[voice cloning]]></category>
		<guid isPermaLink="false">https://bitfinance.news/?p=112550</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="900" height="450" src="https://bitfinance.news/wp-content/uploads/2025/03/Imagen-referencial-Crecen-las-estafas-que-utilizan-clonacion-de-voz-con-Inteligencia-Artificial-Suministrada-por-ESET-y-Comstat-R-e1742067761484-800x400-1.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Los cibercriminales toman fragmentos de una grabación real para crear conversaciones y frases para llevar a cabo sus engaños mediante el uso de la Inteligencia Artificial y los patrones de voz" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2025/03/Imagen-referencial-Crecen-las-estafas-que-utilizan-clonacion-de-voz-con-Inteligencia-Artificial-Suministrada-por-ESET-y-Comstat-R-e1742067761484-800x400-1.jpg 900w, https://bitfinance.news/wp-content/uploads/2025/03/Imagen-referencial-Crecen-las-estafas-que-utilizan-clonacion-de-voz-con-Inteligencia-Artificial-Suministrada-por-ESET-y-Comstat-R-e1742067761484-800x400-1-300x150.jpg 300w, https://bitfinance.news/wp-content/uploads/2025/03/Imagen-referencial-Crecen-las-estafas-que-utilizan-clonacion-de-voz-con-Inteligencia-Artificial-Suministrada-por-ESET-y-Comstat-R-e1742067761484-800x400-1-768x384.jpg 768w" sizes="(max-width: 900px) 100vw, 900px" /></div><p>It&#8217;s no surprise that Artificial Intelligence has revolutionized the world, and that cybercriminals have taken advantage of all this potential to create highly realistic and sophisticated targeted social engineering attacks. Techniques involving voice cloning to impersonate family members, friends, or acquaintances are on the rise, with the aim of obtaining private information or even money [&#8230;]</p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/scams-leveraging-voice-cloning-with-artificial-intelligence-are-on-the-rise/">Scams leveraging voice cloning with Artificial Intelligence are on the rise</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="900" height="450" src="https://bitfinance.news/wp-content/uploads/2025/03/Imagen-referencial-Crecen-las-estafas-que-utilizan-clonacion-de-voz-con-Inteligencia-Artificial-Suministrada-por-ESET-y-Comstat-R-e1742067761484-800x400-1.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Los cibercriminales toman fragmentos de una grabación real para crear conversaciones y frases para llevar a cabo sus engaños mediante el uso de la Inteligencia Artificial y los patrones de voz" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2025/03/Imagen-referencial-Crecen-las-estafas-que-utilizan-clonacion-de-voz-con-Inteligencia-Artificial-Suministrada-por-ESET-y-Comstat-R-e1742067761484-800x400-1.jpg 900w, https://bitfinance.news/wp-content/uploads/2025/03/Imagen-referencial-Crecen-las-estafas-que-utilizan-clonacion-de-voz-con-Inteligencia-Artificial-Suministrada-por-ESET-y-Comstat-R-e1742067761484-800x400-1-300x150.jpg 300w, https://bitfinance.news/wp-content/uploads/2025/03/Imagen-referencial-Crecen-las-estafas-que-utilizan-clonacion-de-voz-con-Inteligencia-Artificial-Suministrada-por-ESET-y-Comstat-R-e1742067761484-800x400-1-768x384.jpg 768w" sizes="(max-width: 900px) 100vw, 900px" /></div><p style="text-align: justify;">It&#8217;s no surprise that <strong>Artificial Intelligence</strong> has revolutionized the world, and that cybercriminals have <a href="https://www.welivesecurity.com/es/seguridad-digital/ciberseguridad-ai-inteligencia-artificial-ia-2025/" target="_blank" rel="noopener">taken advantage of all this potential</a> to create highly realistic and sophisticated targeted social engineering attacks. Techniques involving voice cloning to impersonate family members, friends, or acquaintances are on the rise, with the aim of obtaining private information or even money from their victims. <a href="https://www.eset.com/latam/" target="_blank" rel="noopener">ESET,</a> a leading company in proactive threat detection, analyzes the methodology used by attackers in these types of scams, how they can affect people, and how we should avoid becoming victims.</p>
<p style="text-align: justify;"><strong>Cybercriminals</strong> take small fragments of a real recording and, using Artificial Intelligence (AI) and voice patterns, create conversations and phrases to carry out their deceptions, with consequences that are as serious as they are costly. These samples are obtained from voice recordings or videos posted on social media platforms like Instagram or TikTok.</p>
<p style="text-align: justify;">To measure the impact, the <strong>United States Federal Trade Commission</strong> reported that in <a href="https://www.ftc.gov/es/noticias/con-perdidas-por-fraude-en-todo-el-pais-que-en-2023-superaron-los-10000-millones-de-dolares-la-ftc" target="_blank" rel="noopener">2023, the United States lost $2.7 billion due to scams alone.</a> Along these lines, <strong>Starling Bank</strong> (a British online bank) <a href="https://www.starlingbank.com/news/starling-bank-launches-safe-phrases-campaign/" target="_blank" rel="noopener">warned about the prevalence of these types of scams</a> in the United Kingdom. The survey of more than 3,000 people revealed that more than a quarter of adults say they have been the victim of an AI voice cloning scam at least once a year. Furthermore, 46 % of respondents stated they were unaware such scams existed.</p>
<p style="text-align: justify;">The growing number of scams involving Artificial Intelligence led the <a href="https://www.fbi.gov/contact-us/field-offices/sanfrancisco/news/fbi-warns-of-increasing-threat-of-cyber-criminals-utilizing-artificial-intelligence" target="_blank" rel="noopener">FBI to issue a statement warning people:</a> &#8220;Attackers are leveraging AI to create highly convincing voice or video messages and emails to enable fraud schemes against individuals and businesses alike. These sophisticated tactics can result in devastating financial losses, reputational damage, and the compromise of sensitive data,&#8221; the US investigative agency noted.</p>
<h2 style="text-align: justify;"><strong>ESET recommendations</strong></h2>
<p style="text-align: justify;">ESET warns that when faced with these types of scams involving social engineering, <strong>the first advice is to remain highly alert.</strong> This means paying special attention to unexpected messages that urgently request money or account credentials. Similarly, <strong>call back a family member or friend using a known phone number.</strong></p>
<p style="text-align: justify;">Another measure suggested by the ESET research team is to have a <strong>&#8220;safe phrase,&#8221;</strong> agreed upon in advance by family and friends, to verify whether the person on the other end of the line is who they claim to be.</p>
<p style="text-align: justify;">It&#8217;s also very important<strong> to implement multifactor authentication</strong> whenever possible. It&#8217;s about adding an extra layer of security to prevent cybercriminals from accessing our accounts and systems.</p>
<p style="text-align: justify;">&#8220;For companies, beyond combining solutions to reduce the number of phishing emails, calls, and messages that reach their employees, it&#8217;s essential to educate and raise awareness among their teams so they can detect scams and avoid falling into the trap,&#8221; commented <strong>Camilo Gutiérrez Amaya,</strong> Head of the <strong>ESET Latin America Research Lab.</strong></p>
<p style="text-align: justify;">Contact information for ESET, a digital and IT security specialist and source of this information and recommendations: <a href="https://www.eset.com/ve/" target="_blank" rel="noopener">https://www.eset.com/ve/</a>.</p>
<p style="text-align: justify;">Also available on social media: Instagram (<a href="https://www.instagram.com/esetla/" target="_blank" rel="noopener">@esetla</a>) and Facebook: (<a href="https://www.facebook.com/ESETLA" target="_blank" rel="noopener">ESET</a>).</p>
<p style="text-align: justify;"><em>With information and reference images provided by ESET and Comstat Rowland</em></p>
<p>Visit our news channel on <a href="https://news.google.com/publications/CAAqBwgKMP_wxAswoozcAw?ceid=VE:es-419&amp;oc=3" target="_blank" rel="noopener"><strong>Google News</strong></a> and follow us to get accurate, interesting information and stay up to date with everything. You can also see our daily content on <a href="https://twitter.com/BitFinance_News" target="_blank" rel="noopener"><strong>X/Twitter</strong></a> and <a href="https://www.instagram.com/bitfinancenews/?hl=es" target="_blank" rel="noopener"><strong>Instagram</strong></a></p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/scams-leveraging-voice-cloning-with-artificial-intelligence-are-on-the-rise/">Scams leveraging voice cloning with Artificial Intelligence are on the rise</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
