Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

Behind enemy lines: F-Secure reveals how scammers operate with new Scam Kill Chain

PR NEWSWIRE by PR NEWSWIRE
January 30, 2025
Home Telco
Share on FacebookShare on Twitter


HELSINKI, Jan. 30, 2025 /PRNewswire/ — Go inside the mind of a cyber criminal with F-Secure’s Scam Kill Chain framework: a new in-depth look at the playbook used by scammers around the world. Global cyber security leader F-Secure’s threat intelligence experts break down exactly how these digital con artists choose, approach, and ultimately attack their victims – information that only strengthens the fight against fraud for everyone.

“We’re essentially shining a huge spotlight on cyber criminals who have been operating in the shadows,” said Laura Kankaala, Head of Threat Intelligence at F-Secure. “While there’s no way to completely prevent this, the Scam Kill Chain is our best defense. We have to be one step ahead of how these scammers operate, so we as an industry can help prevent the crimes from happening in the first place.”

With the borderless nature of the internet, cyber crime is thriving, and consumers are losing more than $1 trillion per year to scams on average. It’s the single biggest threat facing consumers today. And while some efforts have been made in the industry to make sense of the scam ecosystem, they’re often disjointed. There hasn’t been any comprehensive framework detailing the full range of techniques scammers use – until now.

Introducing the F-Secure Scam Kill Chain

Every scam is made up of a series of tactics, known as F-Secure’s Scam Kill Chain. Originating from the military, the term “Kill Chain” has been historically applied to cyber security. Now, given the threat level scams pose to consumer safety, it’s only fitting to extend it to cover scams targeting consumers too.

The framework is broken down methodically into eight stages: 

1.      Reconnaissance

2.      Development

3.      Contact

4.      Persistence

5.      Access

6.      Exfiltrate

7.      Lateral Movement

8.      Monetization

By sharing the Scam Kill Chain widely, F-Secure is helping the anti-scam industry in their fight against digital fraud — detailed research is the best way to develop effective defenses against scams. Click here to view the entire Scam Kill Chain framework.

F-Secure: The Solution
F-Secure’s cutting-edge scam protection solutions identify and block digital threats as soon as they appear. Their flagship app Total gives millions of users comprehensive online security with a single subscription. This includes VPN, password management, ID monitoring, antivirus, Wi-Fi protection, and much more.

F-Secure’s anti-scam technology also features AI-driven tools like Shopping Protection, SMS Scam Protection, and Banking Protection. It’s no surprise that over 200 telecom providers, banks, insurance companies, and other key players in digital security partner with F-Secure to integrate its features into their apps, providing their customers with a complete, all-in-one security solution.

About F-Secure

F-Secure makes every digital moment more secure, for everyone. We deliver brilliantly simple, frictionless security experiences that make life easier for the tens of millions of people we protect and for our more than 200 service provider partners. For over 35 years, we’ve led the cyber security industry, inspired by a pioneering spirit born out of a shared commitment to do better by working together.


PRESS CONTACTS:

Meghan Sawyer
Public Relations and Social Media Manager, North America
[email protected]

Joel Latto
Public Relations and Social Media Manager, EMEA
[email protected]

This information was brought to you by Cision http://news.cision.com

https://news.cision.com/f-secure/r/behind-enemy-lines–f-secure-reveals-how-scammers-operate-with-new-scam-kill-chain,c4098627

SOURCE F-Secure



Source link

Tags: F-Secure
PR NEWSWIRE

PR NEWSWIRE

Next Post
AWS, Meta, Microsoft, Nvidia And Oracle: Five Data Center Deals Worth 6B Announced This Month

AWS, Meta, Microsoft, Nvidia And Oracle: Five Data Center Deals Worth $676B Announced This Month

Recommended.

AFFOA TO HOST 2025 ADVANCED FUNCTIONAL FABRICS SUMMIT IN SEPTEMBER

AFFOA TO HOST 2025 ADVANCED FUNCTIONAL FABRICS SUMMIT IN SEPTEMBER

August 6, 2025
Next phase of fintech reflected in strong financials, says World Economic Forum | Computer Weekly

Next phase of fintech reflected in strong financials, says World Economic Forum | Computer Weekly

June 26, 2025

Trending.

Wesco Declares Quarterly Dividend on Common Stock

Wesco Declares Quarterly Dividend on Common Stock

December 1, 2025
HeyGears Launches Reflex 2 Series 3D Printers – Enabling Users to Go Beyond Prototypes and Start Production

HeyGears Launches Reflex 2 Series 3D Printers – Enabling Users to Go Beyond Prototypes and Start Production

October 24, 2025
⚡ THN Weekly Recap: New Attacks, Old Tricks, Bigger Impact

⚡ THN Weekly Recap: New Attacks, Old Tricks, Bigger Impact

March 10, 2025
Bloody Wolf Targets Uzbekistan, Russia Using NetSupport RAT in Spear-Phishing Campaign

Bloody Wolf Targets Uzbekistan, Russia Using NetSupport RAT in Spear-Phishing Campaign

February 9, 2026
Passwd: A walkthrough of the Google Workspace Password Manager

Passwd: A walkthrough of the Google Workspace Password Manager

December 23, 2025

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio