Facebook Messenger users hit by scammers in over 80 countries: Report ANI | Updated: Apr 20, 2021 18:56 IST
New Delhi [India], April 20 (ANI): Group-IB, a global threat hunting and adversary-centric cyber intelligence company have detected a large-scale scam campaign targeting Facebook Messenger users all over the world.
Group-IB Digital Risk Protection (DRP) analysts have found evidence proving that users in over 80 countries in Europe, Asia, the MEA region, North and South America might have been affected, the company said in a release. By distributing ads promoting an allegedly updated version of Facebook Messenger, cybercriminals harvested users login credentials, the company said.
The cyber intelligence company has discovered about 1,000 fake Facebook accounts distributing links to an allegedly updated version of Facebook Messenger. Users who followed the link would then be redirected to a fake Facebook Messenger website with a login
Group-IB unearths Facebook Messenger scam run using fake ads
Scamsters registered Facebook accounts with names mimicking the real app with minor spelling differences Messanger, Meseenger, Masssengar and using the Facebook Messenger official logo as their profile picture.
Synopsis
Cybercriminals harvested users’ login credentials by baiting them through ads that purportedly promoted a fake update for Facebook Messenger, Singapore-based cybersecurity firm Group-IB says.
Researchers at Singapore-based cybersecurity firm Group-IB say that cybercriminals harvested users’ login credentials by baiting them through ads that purportedly promoted a fake update for Facebook Messenger. In what it called a critical update, Group-IB revealed that this large-scale scam targeting millions of users from 84 countries, including India.
Lazarus E-Commerce Attackers Also Targeted Cryptocurrency
euroinfosec) • April 15, 2021 Get Permission
Fake payment form, which opens in an iFrame element, discovered in Magecart-style attacks attributed to Lazarus (Source: Group-IB)
Hackers with apparent ties to North Korea that hit e-commerce shops in 2019 and 2020 to steal payment card data also tested functionality for stealing cryptocurrency, according to the cybersecurity firm Group-IB.
Group-IB s new report builds on findings published in July 2020 by Dutch security firm Sansec, which reported that malicious infrastructure and in many cases also malware was being used for Magecart-style attack campaigns that had previously been attributed to the Lazarus Group.
Lazarus - aka Hidden Cobra, Dark Seoul, Guardians of Peace, APT38, Bluenoroff and a host of other names - refers to a group of hackers with apparent ties to the Pyongyang-based gov
Как Microsoft ловила известного русского пирата на педофилии cnews.ru - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from cnews.ru Daily Mail and Mail on Sunday newspapers.
Fresh affiliate programs helped ransomware-as-a-service operators achieve record profits in 2020. (Source: Group-IB)
Ransomware dominated the online-enabled crime landscape in 2020, some security experts say, thanks to the massive profits it s been generating and the relative ease of use for attackers - including support from a burgeoning cybercrime-as-a-service market.
Blockchain analysis firm Chainalysis this week reported that it s found just under $370 million in known 2020 ransomware profits - via ransoms that got paid - which represents a 336% increase over known 2019 earnings. The firm continues to update those estimates as it identifies previously unknown cryptocurrency wallets tied to gangs.
IBM Security X-Force, in its latest Threat Intelligence Index, says that of the incidents it investigated in 2020, 23% could be attributed to ransomware, up from 20% in 2019. The most-seen strains tied to attacks that it saw were Sodinokibi/REvil (in 22% of ransomware incidents), Nefi