HomeCII/OTDubai Police Attracts Wave of UAE Mobile Attacks

Dubai Police Attracts Wave of UAE Mobile Attacks

Published on

spot_img

The recent surge in phishing attacks targeting unsuspecting mobile users in the United Arab Emirates (UAE) has shed light on the increasing sophistication of cybercriminal tactics, with the Dubai Police being the latest victim of impersonation by fraudsters. These fraudsters are sending thousands of text messages, purporting to represent the law enforcement agency, in an attempt to trick recipients into clicking on malicious URLs and divulging sensitive information such as bank details and personal identification information.

Researchers at BforeAI have noted that the phishing campaign utilizes well-crafted lures with official branding, indicating a level of sophistication in the execution of the attacks. Despite the tailored nature of the lures to UAE citizens, the methodology employed resembles a ‘spray-and-pray’ model due to its broad reach.

Abu Qureshi, lead for threat intelligence and mitigation at BforeAI, highlighted the calculated misuse of Dubai Police branding by the cybercriminals to establish credibility and deceive victims. He emphasized the use of social engineering techniques and psychological manipulation to exploit fear and trust in law enforcement, which is particularly effective given the importance of law enforcement in the UAE.

The cybercrime campaigns targeting organizations and individuals in Dubai and other parts of the UAE have been on the rise, according to research conducted earlier this year. With 87% of companies in the UAE having faced some form of cyber incident in the past two years, the region has become a high-value target for cybercriminals due to its affluent population, high Internet penetration, and reliance on digital services.

Cybercriminals are increasingly focusing on wealthy regions and individuals to maximize financial gain, as well as exploiting regional geopolitical interests and economic dynamics. The rapid digital transformation and IT modernization in the region have provided cybercriminals with vulnerabilities to target, stemming from the quick adoption of advanced technologies without sufficient security measures in place.

The cyberattackers behind the Dubai Police impersonation campaign are believed to have used an automated domain generation algorithm or bulk registration to cycle through different domains quickly. Most of these domains originated from Tencent servers based in Singapore, a strategic location with robust digital infrastructure that cybercriminals are leveraging for malicious activities.

Qureshi noted that the presence of malicious activity on Tencent servers could be due to the exploitation of legitimate services, and the jurisdictional complexity may pose challenges for law enforcement in addressing the abuse of these platforms by cybercriminals. While some registrants were traced back to India and Dubai, the cyberattackers have managed to keep their identities largely anonymous.

To protect against cyber fraud, organizations in the Middle East are advised to enhance monitoring, conduct awareness programs on phishing recognition, collaborate with CERTs and law enforcement, develop incident response plans, report phishing messages to relevant authorities, and maintain continuous vigilance to safeguard brand reputation and customer trust.

Overall, the Dubai Police impersonation campaign underscores the globalized nature of cybercrime and the importance of cross-border cooperation and threat intelligence sharing to combat evolving cyber threats. By staying ahead of cybercriminal tactics through proactive cybersecurity measures and information sharing, organizations can mitigate the risks posed by sophisticated phishing campaigns like the one targeting the Dubai Police in the UAE.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...