The recent surge in phishing attacks targeting unsuspecting mobile users in the United Arab Emirates (UAE) has shed light on the increasing sophistication of cybercriminal tactics, with the Dubai Police being the latest victim of impersonation by fraudsters. These fraudsters are sending thousands of text messages, purporting to represent the law enforcement agency, in an attempt to trick recipients into clicking on malicious URLs and divulging sensitive information such as bank details and personal identification information.
Researchers at BforeAI have noted that the phishing campaign utilizes well-crafted lures with official branding, indicating a level of sophistication in the execution of the attacks. Despite the tailored nature of the lures to UAE citizens, the methodology employed resembles a ‘spray-and-pray’ model due to its broad reach.
Abu Qureshi, lead for threat intelligence and mitigation at BforeAI, highlighted the calculated misuse of Dubai Police branding by the cybercriminals to establish credibility and deceive victims. He emphasized the use of social engineering techniques and psychological manipulation to exploit fear and trust in law enforcement, which is particularly effective given the importance of law enforcement in the UAE.
The cybercrime campaigns targeting organizations and individuals in Dubai and other parts of the UAE have been on the rise, according to research conducted earlier this year. With 87% of companies in the UAE having faced some form of cyber incident in the past two years, the region has become a high-value target for cybercriminals due to its affluent population, high Internet penetration, and reliance on digital services.
Cybercriminals are increasingly focusing on wealthy regions and individuals to maximize financial gain, as well as exploiting regional geopolitical interests and economic dynamics. The rapid digital transformation and IT modernization in the region have provided cybercriminals with vulnerabilities to target, stemming from the quick adoption of advanced technologies without sufficient security measures in place.
The cyberattackers behind the Dubai Police impersonation campaign are believed to have used an automated domain generation algorithm or bulk registration to cycle through different domains quickly. Most of these domains originated from Tencent servers based in Singapore, a strategic location with robust digital infrastructure that cybercriminals are leveraging for malicious activities.
Qureshi noted that the presence of malicious activity on Tencent servers could be due to the exploitation of legitimate services, and the jurisdictional complexity may pose challenges for law enforcement in addressing the abuse of these platforms by cybercriminals. While some registrants were traced back to India and Dubai, the cyberattackers have managed to keep their identities largely anonymous.
To protect against cyber fraud, organizations in the Middle East are advised to enhance monitoring, conduct awareness programs on phishing recognition, collaborate with CERTs and law enforcement, develop incident response plans, report phishing messages to relevant authorities, and maintain continuous vigilance to safeguard brand reputation and customer trust.
Overall, the Dubai Police impersonation campaign underscores the globalized nature of cybercrime and the importance of cross-border cooperation and threat intelligence sharing to combat evolving cyber threats. By staying ahead of cybercriminal tactics through proactive cybersecurity measures and information sharing, organizations can mitigate the risks posed by sophisticated phishing campaigns like the one targeting the Dubai Police in the UAE.
