HomeCyber BalkansHackers are Targeting Users who Filed Complaints on Government Portal to Steal...

Hackers are Targeting Users who Filed Complaints on Government Portal to Steal Credit Card Information

Published on

spot_img

Fraudsters in the Middle East have been taking advantage of a vulnerability in the government services portal, utilizing sophisticated tactics to target individuals who have lodged commercial complaints, according to recent reports.

By impersonating government officials, these cybercriminals are able to manipulate unsuspecting victims into falling for their schemes, ultimately leading to unauthorized financial transactions that bypass traditional security measures, such as One-Time Passwords (OTPs). This highlights the ever-evolving landscape of cybercrime and underscores the critical need for enhanced user education and more robust security protocols.

Numerous customers have fallen victim to these fraudulent activities, reporting incidents initiated through deceptive phone calls. In each case, the scammers posed as government representatives and urged the victims to download legitimate government applications along with remote access software, namely AnyDesk.

With this unauthorized access to the victims’ devices, the fraudsters have been able to carry out illicit financial transactions, including unauthorized credit card withdrawals and unauthorized deductions from bank accounts, all without the victims’ explicit consent or knowledge.

The modus operandi of the fraudsters involves infecting consumers’ devices with stealer’s malware, which then pilfers their personal details, including contact information, and leaks them onto the dark web. Armed with this sensitive information, the cybercriminals are able to pose as government officials and lend a helping hand in a fictitious consumer complaint scenario, eventually coercing the victims into installing a genuine government application and a remote access tool.

Through the use of screen sharing, the scammers guide the victims to upload photos of their credit cards and intercept incoming OTPs, thereby enabling them to execute unauthorized online transactions using the stolen data.

One notorious malware strain known as RedLine Stealer has been identified as a key player in this fraudulent operation, exploiting vulnerabilities to infiltrate systems and target critical data such as passwords, cookies, and cryptocurrency wallets. This malware is often disseminated through phishing campaigns and infected software, making it a potent threat to individuals and organizations alike.

It is believed that the intricate fraud scheme is orchestrated by organized criminal groups based in the Middle East, utilizing advanced social engineering tactics to ensnare victims. By leveraging remote access tools, the attackers commandeer the victims’ devices and intercept OTPs to greenlight fraudulent transactions, encompassing high-value purchases from online retailers and e-wallet top-ups, thereby facilitating quick cash-outs through intermediary accounts.

To mask their tracks, the attackers employ sophisticated techniques like VPNs and dedicated IP ranges, posing substantial financial risks to their victims, with average losses per transaction exceeding US$1,300 and the potential for significant individual losses.

The scheme relies on compromised government portals to harvest user data, enabling the fraudsters to masquerade as officials and deceive victims into revealing their card details. To combat this threat, government agencies must bolster their account security measures and implement robust Account Takeover (ATO) defenses, which entail incorporating threat intelligence, monitoring user behavior, and instating stringent anti-fraud procedures, including 3DS authentication with refined behavioral analysis.

Group-IB, a renowned cybersecurity firm, stresses the importance of digital hygiene among users, advising against sharing sensitive information and advocating vigilance against unsolicited calls or requests for software installations. By staying informed and adopting best practices in cybersecurity, individuals can protect themselves against such sophisticated cyber threats.

In conclusion, the evolving nature of cybercrime necessitates a proactive approach to cybersecurity, including user education and the implementation of stringent security measures. By remaining vigilant and adopting best practices, individuals and organizations can safeguard themselves against the crafty tactics employed by cybercriminals in the Middle East and beyond.

Source link

Latest articles

Hackers Target Education Sector, Take Over Microsoft Accounts

A recent phishing campaign has been discovered by researchers from Abnormal Security, which is...

8×8 Pricing Guide 2025

8x8, a leading provider of cloud communications services, has recently launched new Unified Communications...

Hacker Conversations: David Kennedy – A Unique Hacker – SecurityWeek

In a recent interview conducted by SecurityWeek, the renowned hacker David Kennedy was portrayed...

Adding Fingerprint Authentication to Your Windows 11 Computer – Source: www.techrepublic.com

In the modern world of technology, the need for enhanced security measures is paramount....

More like this

Hackers Target Education Sector, Take Over Microsoft Accounts

A recent phishing campaign has been discovered by researchers from Abnormal Security, which is...

8×8 Pricing Guide 2025

8x8, a leading provider of cloud communications services, has recently launched new Unified Communications...

Hacker Conversations: David Kennedy – A Unique Hacker – SecurityWeek

In a recent interview conducted by SecurityWeek, the renowned hacker David Kennedy was portrayed...