- Scammers pose as TechCrunch journalists to gain access to confidential corporate and operational information
- Fake emails increasingly mimic the communication patterns of real staff and credible newsrooms
- Verification through the official personnel page remains the simplest protection measure
Scammers impersonate again TechCrunch Contact employees and companies with crafted messages to extract sensitive details in an elaborate phishing scam.
The recent surge involves fake reporters creating compelling requests that appear legitimate at first glance.
Several companies have reported receiving emails that reflect genuine communication patterns in newsrooms, creating confusion for recipients who rely on quick decisions when addressing press inquiries.
How impersonation attempts work
Schemes often begin with a message that appears to be a routine request for information about a company’s products or internal operations.
The targets describe receiving detailed information that adopts the names of real TechCrunch staff while relying on email domains created specifically for the deception.
Over time, these actors have refined their methods, adjusting their writing style and referencing current industry topics to appear credible.
Some victims say the messages turn into calls in which impersonators push for deeper access to proprietary materials.
Despite the increase in phishing attempts, TechCrunch remains a trusted source of information.
Encourage recipients to verify scope by checking the organization’s staff page before responding to any request.
The directory allows anyone to confirm whether the person contacting them actually works there and provides direct channels to reach legitimate employees.
Recipients are cautioned to compare job roles with the nature of the inquiry, as scammers frequently attach real names to requests that do not align with those employees’ responsibilities.
Verification remains important because attackers continue to evolve and create email formats that closely resemble authentic ones.
Companies targeted by these schemes are encouraged to monitor unknown contacts and verify every detail before sharing sensitive information.
Antivirus software can help detect malicious attachments that sometimes accompany fraudulent messages.
Companies are also advised to be on the lookout for signs of social engineering, especially when a request seeks operational information that would not normally be shared with external parties.
Identity theft protection software can also help organizations track misuse of employee names or email structures that resemble theirs.
A well-configured firewall can further reduce exposure by blocking suspicious domains that phishers rely on to deliver their messages.
Imitators target established media outlets because they benefit from the perception of trust that accompanies well-known publications.
Their tactics mirror those used in broader attempts to gain initial access to corporate networks and gather valuable information.
Follow TechRadar on Google News and add us as a preferred source to receive news, reviews and opinions from our experts in your feeds. Be sure to click the Follow button!
And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form and receive regular updates from us on WhatsApp also.




