- Scammers impersonate TechCrunch reporters to access sensitive company and operational information
- Fake e-mails are increasingly mimicking real staff and credible newsroom communication patterns
- Verification through the official staff page remains the simplest safeguard
Scammers again pose as TechCrunch employees and contact businesses with messages designed to extract confidential details in an elaborate phishing scam.
The latest increase involves fake journalists building convincing requests that seem legitimate at first glance.
Several companies have reported receiving emails that mirror real newsroom communication patterns, creating confusion for recipients who rely on quick decisions when handling press inquiries.
How the imitation attempts work
The schemes often begin with a message that looks like a routine request for information about a company’s products or internal operations.
Target describes receiving detailed outreach that adopts the names of real TechCrunch employees while relying on email domains created specifically for deception.
Over time, these players have refined their methods, adjusted their writing style and referenced current industry topics to appear credible.
Some victims say the messages escalate into calls where the impersonators push for deeper access to proprietary material.
Despite the rise in copycat attempts, TechCrunch itself remains a reliable source of information.
It urges recipients to verify outreach by checking the organization’s staff page before responding to a request.
The phone book allows anyone to verify if the person contacting them actually works there and provides direct channels to reach out to legitimate employees.
Recipients are cautioned to match job roles with the nature of the request, as scammers often attach real names to requests that do not match the responsibilities of those employees.
Authentication remains important because attackers continue to evolve and create email formats that closely resemble authentic ones.
Companies targeted by these schemes are encouraged to monitor unknown contacts and verify all details before sharing sensitive information.
An antivirus software can help detect malicious attachments that sometimes accompany fraudulent messages.
Companies are also advised to watch for signs of social engineering, particularly when a request seeks operational insight that would not normally be shared with external parties.
Identity theft protection software can also help organizations track misuse of employee names or email structures similar to their own.
A well-configured firewall can further reduce exposure by blocking suspicious domains that impersonators rely on to deliver their messages.
Copycats focus on established media because they benefit from the perception of trust that comes with well-known publications.
Their tactics mirror those used in broader attempts to gain initial access to corporate networks and harvest valuable information.
Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews and opinions in your feeds. Be sure to click the Follow button!
And of course you can too follow TechRadar on TikTok for news, reviews, video unboxings, and get regular updates from us on WhatsApp also.



