Thursday, May 15, 2025
HomeCyber CrimeRussian Hackers Registering Domains Targeting US Tech Brands

Russian Hackers Registering Domains Targeting US Tech Brands

Published on

SIEM as a Service

Follow Us on Google News

Researchers are tracking a Russian threat actor deploying domains involved in crypto scams targeting the US Presidential Election and tech brands.

The scams offer double crypto returns for deposits and are designed to deceive users into sending coins to attacker-controlled wallets.

The research identified numerous websites promoting fraudulent giveaways featuring high-profile US individuals and brands, using counterfeit legal letters to enhance their credibility. 

- Advertisement - Google News

These websites targeted prominent figures like Donald Trump, Kamala Harris, Tim Cook, and others, falsely associating them with the scams.

During a separate investigation, threat analysts discovered IOFA domains registered to a Russian email address (ek1991@internet.ru), suggesting a link to potential scam activities.  

Apple spoofing page @ https://apple-event2024[.]com
Apple spoofing page @ https://apple-event2024[.]com

They identified a cluster of live scam domains sharing key attributes: registration by ek1991@internet.ru, Cloudflare protection, and similar content themes (cryptocurrency, US finance/tech, 2024 election) with identical body text, which employ CAPTCHAs and some even include chat functionality.

No organizations or individuals are directly involved in the spoofing of any websites, including cryptologic.online, which features content written in Russian. 

Instead, it appears to be a platform for discussing and analyzing cryptographic techniques and related topics, potentially serving as a resource for individuals interested in cryptology.

Free Webinar on How to Protect Small Businesses Against Advanced Cyberthreats -> Free Registration

Fake FTC letter @ debate[.]gives
Fake FTC letter @ debate[.]gives

The cluster hosts some domains that spoof well-known US politicians and business leaders, likely being used for phishing or other malicious activities.

The chat function on some domains provides step-by-step instructions for transferring cryptocurrency, often requiring the victim to send a specific amount of cryptocurrency before receiving a promised payout. 

This method leads victims to believe that they are sending money without receiving anything in return.

chat functionality
chat functionality

The fraudulent footer content in debate[.]gives included fake legal letters from US regulatory bodies, falsely legitimizing the proposed giveaways, which claimed that the giveaways were sanctioned by the SEC, FTC, and DOJ, which is untrue.

Analysts are creating a silent push IOFA feed of scam domains for enterprise users to integrate into their security systems.

This feed will enhance detection capabilities and enable investigation of related attacker infrastructure using the Silent Push Console and Feed Analytics screen.

Analyse AnySuspicious Links Using ANY.RUN's New Safe Browsing Tool: Try It for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Nucor Steel Manufacturer Halts Production After Cyberattack

Nucor Corporation, one of North America’s largest steel producers, has temporarily halted production at...

Customer Data Compromised in Dior Cyber Attack

Luxury fashion house Dior experienced a significant security incident when unauthorized external actors breached...

Enisa Launched New European Vulnerability Database to Strengthen Cybersecurity

European Union Agency for Cybersecurity (ENISA) has officially launched the European Vulnerability Database (EUVD),...

Xanthorox Emerging BlackHat AI Tool Empowering Hackers in Phishing and Malware Campaigns

Artificial intelligence platform named Xanthorox has emerged as a potent new tool for cybercriminals,...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Nucor Steel Manufacturer Halts Production After Cyberattack

Nucor Corporation, one of North America’s largest steel producers, has temporarily halted production at...

Customer Data Compromised in Dior Cyber Attack

Luxury fashion house Dior experienced a significant security incident when unauthorized external actors breached...

Enisa Launched New European Vulnerability Database to Strengthen Cybersecurity

European Union Agency for Cybersecurity (ENISA) has officially launched the European Vulnerability Database (EUVD),...