Hackers impersonate TechCrunch reporters to steal sensitive information - but you can always trust us

Phone scammer
(Image credit: Shutterstock)

  • Scammers impersonate TechCrunch reporters to gain access to sensitive corporate and operational information
  • Fake emails increasingly mimic real staff and credible newsroom communication patterns
  • Verification through the official staff page remains the simplest protective measure

Scammers are again posing as TechCrunch employees and contacting companies with messages crafted to extract confidential details in an elaborate phishing scam.

The recent surge involves fake reporters who build convincing requests that appear legitimate at first glance.

Several firms have reported receiving emails that mirror genuine newsroom communication patterns, creating confusion for recipients who depend on fast decisions when dealing with press inquiries.

How the impersonation attempts work

The schemes often begin with a message that looks like a routine request for information about a company’s products or internal operations.

Targets describe receiving detailed outreach that adopts the names of real TechCrunch staff while relying on email domains created specifically for deception.

Over time, these actors have refined their methods, adjusting their writing style and referencing current industry topics to appear credible.

Some victims say the messages escalate into calls where the impersonators push for deeper access to proprietary materials.

Despite the surge in impersonation attempts, TechCrunch itself remains a reliable source of information.

It urges recipients to verify outreach by checking the organization’s staff page before responding to any request.

The directory allows anyone to confirm whether the person contacting them actually works there, and it provides direct channels to reach legitimate employees.

Recipients are cautioned to compare job roles with the nature of the inquiry, since scammers frequently attach real names to requests that do not align with the responsibilities of those employees.

Verification remains important because attackers continue to evolve, creating email formats that closely resemble authentic ones.

Businesses targeted by these schemes are encouraged to monitor unfamiliar contacts and verify every detail before sharing sensitive information.

An antivirus software can help detect malicious attachments that sometimes accompany fraudulent messages.

Companies are also advised to watch for signs of social engineering, especially when a request seeks operational insight that would not normally be shared with external parties.

Identity theft protection software can also help organisations track misuse of employee names or email structures that resemble their own.

A well-configured firewall can further reduce exposure by blocking suspicious domains that impersonators rely on to deliver their messages.

Impersonators focus on established media outlets because they benefit from the perception of trust that accompanies well-known publications.

Their tactics mirror those used in broader attempts to gain initial access to corporate networks and harvest valuable information.


Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!

And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.

Efosa Udinmwen
Freelance Journalist

Efosa has been writing about technology for over 7 years, initially driven by curiosity but now fueled by a strong passion for the field. He holds both a Master's and a PhD in sciences, which provided him with a solid foundation in analytical thinking.

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.