Friday, January 10, 2025
HomeCyber CrimeHackers Targeting Users Who Lodged Complaints On Government portal To Steal Credit...

Hackers Targeting Users Who Lodged Complaints On Government portal To Steal Credit Card Data

Published on

Fraudsters in the Middle East are exploiting a vulnerability in the government services portal. By impersonating government officials, they target individuals who have filed commercial complaints. 

Using Remote Access Software, the fraudsters can then steal credit card information and conduct unauthorized transactions that circumvent traditional OTP-based security measures, highlighting the evolving nature of cybercrime and the need for enhanced user education and more robust security protocols.

Multiple customers reported fraudulent activities initiated through phone calls. In each case, callers posing as government officials instructed victims to download legitimate government applications and the remote access software AnyDesk. 

This unauthorized access enabled the perpetrators to execute unauthorized financial transactions, including credit card withdrawals and bank account deductions, without the victims’ explicit consent or knowledge.

A diagram of how an impersonation and remote access scam is carried out.
A diagram of how an impersonation and remote access scam is carried out.

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

A stealer’s malware infects a consumer’s device, exfiltrating their personal information, including contact details, which are then leaked onto the dark web. 

Fraudsters exploit this data to impersonate government officials, offering assistance with a fabricated consumer complaint where they socially engineer the victim into installing a legitimate government application and a remote access tool. 

Leveraging screen sharing, the scammers guide the victim to upload their credit card photo and intercept incoming OTPs, enabling them to complete unauthorized online transactions using the stolen information.

RedLine Stealer, a prevalent malware, exploits vulnerabilities to infiltrate systems and targets sensitive data like passwords, cookies, and cryptocurrency wallets, often distributed through phishing and infected software. 

Its user-friendly interface and accessibility on underground forums empower both novice and experienced cybercriminals, posing a significant threat to individuals and organizations.

The sophisticated fraud scheme, likely orchestrated by organized criminal groups in the Middle East, targets victims through social engineering tactics, including impersonating government officials. 

By using remote access tools (RATs), attackers gain control of victims’ devices, intercepting One-Time Passwords (OTPs) to authorize fraudulent transactions, which include high-value purchases from online stores and e-wallet top-ups, facilitating rapid cash-out through mule accounts. 

Attackers employ advanced techniques like VPNs and dedicated IP ranges to mask their origin and pose significant financial risks, with average losses per transaction exceeding US$1,300 and the potential for substantial individual losses.

The scheme leverages compromised government portals to obtain user data, enabling fraudsters to impersonate officials and socially engineer victims into divulging card details. 

To mitigate this, government agencies must enhance account security and implement robust ATO defenses that involve integrating threat intelligence, monitoring user behavior, and implementing robust anti-fraud processes, including 3DS authentication with enhanced behavioral analysis. 

According to Group-IB, users must prioritize digital hygiene, avoid sharing sensitive information, and be wary of unsolicited calls or requests for software installations.

Find this News Interesting! Follow us on Google NewsLinkedIn, and X to Get Instant Updates!

Latest articles

QSC: Multi-Plugin Malware Framework Installs Backdoor on Windows

The QSC Loader service DLL named "loader.dll" leverages two distinct methods to obtain the...

Weaponized LDAP Exploit Deploys Information-Stealing Malware

Cybercriminals are exploiting the recent critical LDAP vulnerabilities (CVE-2024-49112 and CVE-2024-49113) by distributing fake...

New NonEuclid RAT Evades Antivirus and Encrypts Critical Files

A NonEuclid sophisticated C# Remote Access Trojan (RAT) designed for the.NET Framework 4.8 has...

Juniper Networks Vulnerability Let Remote Attacker Execute Network Attacks

Juniper Networks has disclosed a significant vulnerability affecting its Junos OS and Junos OS...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

QSC: Multi-Plugin Malware Framework Installs Backdoor on Windows

The QSC Loader service DLL named "loader.dll" leverages two distinct methods to obtain the...

Weaponized LDAP Exploit Deploys Information-Stealing Malware

Cybercriminals are exploiting the recent critical LDAP vulnerabilities (CVE-2024-49112 and CVE-2024-49113) by distributing fake...

New NonEuclid RAT Evades Antivirus and Encrypts Critical Files

A NonEuclid sophisticated C# Remote Access Trojan (RAT) designed for the.NET Framework 4.8 has...