The SVB collapse is being exploited by scammers

Person typing
(Image credit: Shutterstock)

The collapse of the Silicon Valley Bank (SVB), which has rocked the financial world, is now inevitably being exploited by cybercriminals. 

Threat actors are clamoring to gain from the downfall, with fake domains being registered resembling SVB, phishing pages created and attacks on business email addresses.

The aim is to steal money directly, or otherwise to steal valuable data and spread malware that will eventually lead to financial rewards for criminals via dark web sales or by blackmailing victims in a similar vain to ransomware

Multiple scams

SVB, once the 16th largest bank in the US and depended upon by almost half of all venture-back tech startups, collapsed on March 10 after customers withdrew their funds at an unsustainable rate. The move was triggered by the poor economic conditions that forced tech firms to shore up their finances.

It is the second-largest bank failure in US history, and has affected those in many industries, including those in tech, healthcare, private equity and even the wine industry.

In a report by Johannes Ullrich, Dean of Research for SANS Technology Institute, numerous suspicious domains have been registered in the wake of the incident, such as login-svb.com and svbbailout.com.

Cyber intelligence firm Cyble also found in its report the domains svbdebt.com and svbclaims.net, among others. These were registered on the very same day SVB went down, and are perpetrating cryptocurrency scams by falsely claiming that SVB is reimbursing its customers with USDC pay-outs. 

Other crypto scams are pretending to be affiliated with Circle, the payments firm that manages USDC payments and had $3.3 billion in SVB, taking advantage of the uncertainty over the firms liquidity now. 

Domains such as redeemed-circle.com and circle-reserves.com have been created, and are merely out to steal wallets and sensitive data. 

Ullrich also warned that threat actors will likely attempt to contact those affected by the collapse, under the guise of offering support, legal services, loans or similar. 

An attack type that has already taken place is called a business email compromise (BEC). Scammers are pretending to be former SVB customers and telling their customers in turn that they need to send any payments that may be incoming to a new bank account, which is actually controlled by the threat actor.

Phishing scams are also being run, with the domain cash4svb.com asking for SVB customer contact info under the pretense of being an investment group and offering cash to them.

The advice to SVB customers is to look out for suspicious emails and domains related to SVB, especially those mentioned changes in bank details. Confirm payment changes by phone if possible rather than email, as email accounts can be hijacked by threat actors. 

The FDIC and US Treasury have also issued advice to those affected by the SVB collapse.

TOPICS
Lewis Maddison
Reviews Writer

Lewis Maddison is a Reviews Writer for TechRadar. He previously worked as a Staff Writer for our business section, TechRadar Pro, where he had experience with productivity-enhancing hardware, ranging from keyboards to standing desks. His area of expertise lies in computer peripherals and audio hardware, having spent over a decade exploring the murky depths of both PC building and music production. He also revels in picking up on the finest details and niggles that ultimately make a big difference to the user experience.

Read more
Shopping scams
New wave of sextortion scams uses personal details and images to intimidate targets while bypassing traditional security measures
Shadowed hands on a digital background reaching for a login prompt.
A flaw in Google OAuth system is exposing millions of users via abandoned accounts
Best email services: image of email with one unread message alert
Over 400 million unwanted and malicious emails were received by businesses in 2024
Fraude en ligne phishing
Google forced to step up phishing defenses following ‘most sophisticated attack’ it has ever seen
Malware worm
Coordinated global mobile malware campaign targets banking apps and cryptocurrency platforms
Paper craft illustration of a suspicious email that contains a snake
How to spot a phishing email
Latest in Security
cybersecurity
Chinese government hackers allegedly spent years undetected in foreign phone networks
Data leak
A major Keenetic router data leak could put a million households at risk
Code Skull
Interpol operation arrests 300 suspects linked to African cybercrime rings
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
Multiple routers hit by new critical severity remote command injection vulnerability, with no fix in sight
Code Skull
This dangerous new ransomware is hitting Windows, ARM, ESXi systems
An abstract image of a lock against a digital background, denoting cybersecurity.
Critical security flaw in Next.js could spell big trouble for JavaScript users
Latest in News
Open AI
OpenAI unveiled image generation for 4o – here's everything you need to know about the ChatGPT upgrade
Apple WWDC 2025 announced
Apple just announced WWDC 2025 starts on June 9, and we'll all be watching the opening event
Hornet swings their weapon in mid air
Hollow Knight: Silksong gets new Steam metadata changes, convincing everyone and their mother that the game is finally releasing this year
OpenAI logo
OpenAI just launched a free ChatGPT bible that will help you master the AI chatbot and Sora
NetSuite EVP Evan Goldberg at SuiteConnect London 2025
"It's our job to deliver constant innovation” - NetSuite head on why it wants to be the operating system for your whole business
Monster Hunter Wilds
Monster Hunter Wilds Title Update 1 launches in early April, adding new monsters and some of the best-looking armor sets I need to add to my collection