Technology

Hackers impersonate TechCrunch reporters to steal sensitive information - but you can always trust us

2025-11-25 19:34
685 views
Hackers impersonate TechCrunch reporters to steal sensitive information - but you can always trust us

Scammers impersonate TechCrunch employees to steal sensitive data, requiring verification and security measures.

  1. Pro
  2. Security
Hackers impersonate TechCrunch reporters to steal sensitive information - but you can always trust us News By Efosa Udinmwen published 25 November 2025

Even journalists are now being spoofed in rising wave of fraudulent outreach

Comments (0) ()

When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

Phone scammer (Image credit: Shutterstock)
  • Scammers impersonate TechCrunch reporters to gain access to sensitive corporate and operational information
  • Fake emails increasingly mimic real staff and credible newsroom communication patterns
  • Verification through the official staff page remains the simplest protective measure

Scammers are again posing as TechCrunch employees and contacting companies with messages crafted to extract confidential details in an elaborate phishing scam.

The recent surge involves fake reporters who build convincing requests that appear legitimate at first glance.

  • Amazon Black Friday deals are live: here are our picks!

Several firms have reported receiving emails that mirror genuine newsroom communication patterns, creating confusion for recipients who depend on fast decisions when dealing with press inquiries.

You may like
  • Fake email body Microsoft's branding power is being used by criminals to funnel victims to tech support scam centers - here's what you need to know
  • An iPhone with an Apple logo on a red background Scammers are targeting Apple users with this devilishly clever new trick
  • NCSC iPhone warning Lost your iPhone? Make sure you don't make things worse by falling for this evil phishing text giving you hope

How the impersonation attempts work

The schemes often begin with a message that looks like a routine request for information about a company’s products or internal operations.

Targets describe receiving detailed outreach that adopts the names of real TechCrunch staff while relying on email domains created specifically for deception.

Over time, these actors have refined their methods, adjusting their writing style and referencing current industry topics to appear credible.

Some victims say the messages escalate into calls where the impersonators push for deeper access to proprietary materials.

Are you a pro? Subscribe to our newsletterContact me with news and offers from other Future brandsReceive email from us on behalf of our trusted partners or sponsorsBy submitting your information you agree to the Terms & Conditions and Privacy Policy and are aged 16 or over.

Despite the surge in impersonation attempts, TechCrunch itself remains a reliable source of information.

It urges recipients to verify outreach by checking the organization’s staff page before responding to any request.

The directory allows anyone to confirm whether the person contacting them actually works there, and it provides direct channels to reach legitimate employees.

You may like
  • Fake email body Microsoft's branding power is being used by criminals to funnel victims to tech support scam centers - here's what you need to know
  • An iPhone with an Apple logo on a red background Scammers are targeting Apple users with this devilishly clever new trick
  • NCSC iPhone warning Lost your iPhone? Make sure you don't make things worse by falling for this evil phishing text giving you hope

Recipients are cautioned to compare job roles with the nature of the inquiry, since scammers frequently attach real names to requests that do not align with the responsibilities of those employees.

Verification remains important because attackers continue to evolve, creating email formats that closely resemble authentic ones.

Businesses targeted by these schemes are encouraged to monitor unfamiliar contacts and verify every detail before sharing sensitive information.

An antivirus software can help detect malicious attachments that sometimes accompany fraudulent messages.

Companies are also advised to watch for signs of social engineering, especially when a request seeks operational insight that would not normally be shared with external parties.

Identity theft protection software can also help organisations track misuse of employee names or email structures that resemble their own.

A well-configured firewall can further reduce exposure by blocking suspicious domains that impersonators rely on to deliver their messages.

Impersonators focus on established media outlets because they benefit from the perception of trust that accompanies well-known publications.

Their tactics mirror those used in broader attempts to gain initial access to corporate networks and harvest valuable information.

Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!

And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.

Efosa UdinmwenEfosa UdinmwenFreelance Journalist

Efosa has been writing about technology for over 7 years, initially driven by curiosity but now fueled by a strong passion for the field. He holds both a Master's and a PhD in sciences, which provided him with a solid foundation in analytical thinking.

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.

Logout Read more Fake email body Microsoft's branding power is being used by criminals to funnel victims to tech support scam centers - here's what you need to know    An iPhone with an Apple logo on a red background Scammers are targeting Apple users with this devilishly clever new trick    NCSC iPhone warning Lost your iPhone? Make sure you don't make things worse by falling for this evil phishing text giving you hope    Illustration of a hooked email hovering over a mobile phone New LinkedIn phishing scam targets executives with fake board positions    Facebook Business Suite platform Fake Facebook Business pages are bombarding users with phishing messages - so what can be done?    A person typing on a laptop with a deepfake graphic hovering above it AI impersonation scams are sky-rocketing in 2025, security experts warn – here’s how to stay safe    Latest in Security Logo of Harvard University on a window Harvard University reveals data breach hitting alumni and donors    Young couple browsing the internet on a laptop. Black Friday shopping scams are on the rise - experts warn many new domains could be dodgy, here's what to look for    Pirate skull cyber attack digital technology flag cyber on on computer CPU in background. Darknet and cybercrime banner cyberattack and espionage concept illustration. Windows Server flaw targeted by hackers to spread malware - here's what we know    Data breach Cox Enterprises hit by Oracle data breach - but it won't name who carried out the attack    airplane Iberia tells customers it was hit by a major security breach    Hands on a laptop with overlaid logos representing network security Google security experts say Gainsight hacks may have left hundreds of companies affected    Latest in News NordVPN on a mobile phone NordVPN just aced an independent lab evaluation, and the timing couldn't be better    Steam Steam's first-ever Black Friday sale has officially kicked off and these discounts are sure to make your wallet cry    Xbox x Crocs Xbox has teamed up with Crocs for a limited-edition collection inspired by the game maker's biggest hits    PC gamer looking confused at monitor AMD GPUs could get 10% price hike, so Black Friday might be the time to buy    Xbox Series S and Xbox Series X side by side Leaker claims Xbox Series X and Series S consoles could see another price hike due to global RAM shortage    Zorin OS 18 desktop shown on a monitor screen A Linux OS has got a million downloads since Windows 10 support ended    LATEST ARTICLES