Tech and AIImpersonators are (still) targeting companies with fake TechCrunch outreach

Impersonators are (still) targeting companies with fake TechCrunch outreach

-


Hi, thanks as always for reading TechCrunch. We want to talk with you quickly about something important.

A growing number of scammers are impersonating TechCrunch reporters and event leads and reaching out to companies, pretending to be our staff when they absolutely are not. These bad actors are using our name and reputation to try to dupe unsuspecting businesses. It drives us crazy and infuriates us on your behalf. It ebbs and flows. Judging by the increased number of emails we’re receiving, asking, “Does this person really work for you?” it appears to be happening more actively at the moment.

Anecdotally, this isn’t just happening to us; fraudsters are exploiting the trust that comes with established news brands to get their foot in the door with companies across the media industry.

Here’s an example of the most common scheme we’ve been tracking: Impostors impersonating our reporters to extract sensitive business information from unsuspecting targets. In several cases we know about, scammers have adopted the identity of actual staff members, crafting what looks like a standard media inquiry about a company’s products and requesting an introductory call.

Sharp-eyed recipients sometimes catch discrepancies in email addresses that don’t match our real employees’ credentials (see a list of bogus email addresses below). But these schemes evolve quickly; bad actors keep refining their tactics, mimicking reporters’ writing styles, and referencing startup trends to make their pitches increasingly convincing. Equally troubling, victims who agree to phone interviews tell us the fraudsters use those exchanges to dig for even more proprietary details. A PR rep told Axios that someone posing as a TechCrunch reporter raised suspicions when they shared a scheduling link.

Why are they doing this? We don’t know, though a reasonable guess is that these are groups looking for initial access to a network or other sensitive information. In fact, former colleagues at Yahoo say these attempts align with a persistent threat actor they’ve been tracking who has historically engaged in TechCrunch impersonation to facilitate account takeover (ATO) and data theft, targeting cryptocurrency, cloud, and other tech companies using various pretexts.

As for what to do about it, if someone reaches out claiming to be from TechCrunch and you have even the slightest doubt about whether they’re legitimate, please don’t just take their word for it. We’ve made it easy for you to verify.

Start by checking our TechCrunch staff page. It’s the quickest way to see if the person contacting you actually works here. If the individual’s name isn’t on our roster, you’ve got your answer right there.

If you do see someone’s name on our staff page, but our employee’s job description doesn’t square with the request you are receiving (e.g., a TechCrunch copy editor is suddenly very interested in learning about your business!), a bad actor may be trying to con you.

If it sounds like a legitimate request but you want to make doubly certain, you should also feel free to contact us directly and just ask. You can learn how to reach each writer, editor, sales executive, marketing guru, and events team member in our bios.

We know it’s frustrating to have to double-check media inquiries, but these groups are counting on you not taking that extra step. By being vigilant about verification, you’re not just protecting your own company — you’re also helping preserve the trust that legitimate journalists depend on to do their jobs.

Thank you. And for your future reference, here’s a list of some of the TechCrunch impersonating domains that we’ve seen created within the last few months:

email-techcrunch[.]com
hr-techcrunch[.]com
interview-techcrunch[.]com
mail-techcrunch[.]com
media-techcrunch[.]com
noreply-tc-techcrunch[.]com
noreply-techcrunch[.]com
pr-techcrunch[.]com
techcrunch-outreach[.]com
techcrunch-startups[.]info
techcrunch-team[.]com
techcrunch[.]ai
techcrunch[.]biz[.]id
techcrunch[.]bz
techcrunch[.]cc
techcrunch[.]ch
techcrunch[.]com[.]pl
techcrunch[.]gl
techcrunch[.]gs
techcrunch[.]id
techcrunch[.]it
techcrunch[.]la
techcrunch[.]lt
techcrunch[.]net[.]cn
techcrunch1[.]com



Source link

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest news

Heroic Daughter of Bitcoin Millionaire Thwarts Chinese Gangsters: Escapes Crypto Torture Home Invasion

A Bitcoin Millionaire family in British Columbia discovered that crypto wealth can bring danger in the worst way....

Michael Saylor diluted MSTR by $735.2 million after saying he wouldn’t

Since revoking his promise not to dilute MSTR to buy BTC between 1-2.5X mNAV, Michael Saylor has diluted...

Altman describes OpenAI’s forthcoming AI device as more peaceful and calm than the iPhone

“When people see it, they say, ‘that’s it?… It’s so simple.’” That’s how OpenAI CEO Sam Altman describes how...

Is Crypto a Security? (Introduction)

Law and Ledger is a news segment focusing on crypto legal news, brought to you by Kelman Law...

Advertisement

Analysts See Major Bull Run Ahead Despite Market Meltdown

Crypto market analysts remain bullish for the coming months despite the trillion-dollar market meltdown. Crypto markets have hemorrhaged around...

Crypto.com deletes Chinese checkers post after antisemitic response

Crypto.com was forced to delete a post featuring a crypto-themed Chinese checkers board after users began comparing it...

Must read

Heroic Daughter of Bitcoin Millionaire Thwarts Chinese Gangsters: Escapes Crypto Torture Home Invasion

A Bitcoin Millionaire family in British Columbia discovered...

Michael Saylor diluted MSTR by $735.2 million after saying he wouldn’t

Since revoking his promise not to dilute MSTR...

You might also likeRELATED
Recommended to you