A Worldwide Fraud Campaign Used Targeted Links to Rob Millions of Dollars

This article has been indexed from

CySecurity News – Latest Information Security and Hacking Incidents

 

Infrastructure overlaps tied to the TrickBot botnet can be seen in large-scale phishing activity employing hundreds of domains to steal information for Naver, a Google-like web platform in South Korea. The resources employed in this assault demonstrate the magnitude of the cybercriminal effort to gather login data to carry out attacks. 
Naver, like Google, offers a wide range of services, including web search, email, news, and the NAVER Knowledge iN online Q&A platform. Its credentials, in addition to granting access to regular user accounts, can also grant access to enterprise environments due to password reuse. 
Earlier this year, security researchers from cyber intelligence firm Prevailion began its inquiry using a domain name shared by Joe Sowik, mailmangecorp[.]us, which led to a “vast network of targeted phishing infrastructure designed to gather valid login credentials for Naver.” Additionally, PACT analysts discovered similarities with the WIZARD SPIDER [a.k.a. TrickBot] network while researching the hosting infrastructure utilized to serve the Naver-themed phishing pages. 
The fraudsters enticed victims with phoney surveys and incentives purporting to be from well-known brands, the lure was meant to help the criminals steal victims’ personal information and credit card information. Tens of millions of people in 91 countries, including the United States, Canada, South Korea, and Italy, were sh

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

Read the original article: