- Fraudsters pretend to be TechCrunch journalists to have access to sensitive information about the company and operations
- Fake emails increasingly mimic real newsroom staff and credible communication patterns.
- Verification via the official personnel page remains the simplest protection measure
Fraudsters are once again pretending to be TechCrunch employees and contact companies with messages designed to extract confidential details as part of an elaborate phishing scam.
The recent wave involves fake journalists crafting compelling claims that appear legitimate on the surface.
Several companies have reported receiving emails that reflect true newsroom communication patterns, creating confusion for recipients who depend on quick decisions when handling press inquiries.
How identity theft attempts work
Programs often begin with a message that resembles a routine request for information about a company’s products or internal operations.
The targets describe receiving detailed outreach that adopts the names of real TechCrunch staff while relying on email domains created specifically for the deception.
Over time, these actors have refined their methods, adjusting their writing style and referencing current industry topics to appear credible.
Some victims say the messages turn into calls during which the impersonators request deeper access to proprietary documents.
Despite the increase in identity theft attempts, TechCrunch itself remains a reliable source of information.
He urges recipients to check awareness by checking the organization’s staff page before responding to any requests.
The directory allows anyone to confirm whether the person contacting them actually works there and provides direct channels to reach legitimate employees.
Recipients are advised to compare their job duties with the nature of the request, as fraudsters often attach real names to requests that do not match the responsibilities of these employees.
Verification remains important as attackers continue to evolve, creating email formats that closely resemble authentic formats.
Companies targeted by these programs are encouraged to monitor unknown contacts and verify every detail before sharing sensitive information.
Antivirus software can help detect malicious attachments that sometimes accompany scam messages.
Businesses are also advised to watch for signs of social engineering, particularly when a request is for operational information that would not normally be shared with external parties.
Identity theft protection software can also help organizations detect any misuse of employee names or email structures that resemble their own.
A well-configured firewall can further reduce exposure by blocking suspicious domains that identity thieves rely on to deliver their messages.
Identity thieves focus on established media outlets because they benefit from the perception of trust that comes with well-known publications.
Their tactics mirror those used in broader attempts to gain first access to corporate networks and harvest valuable information.
Follow TechRadar on Google News And add us as your favorite source to get our news, reviews and expert opinions in your feeds. Make sure to click the Follow button!
And of course you can too follow TechRadar on TikTok for news, reviews, unboxings in video form and receive regular updates from us on WhatsApp Also.




