Friday, November 15, 2024
HomeCyber AttackLaw enforcement Officers Busted Phishing Group That Uses 40 Websites to Steal...

Law enforcement Officers Busted Phishing Group That Uses 40 Websites to Steal Credit Card Data

Published on

On 22nd February 2022, Ukrainian Police officials arrested a group of threat actors that were involved in a phishing campaign.

They used a mobile replenishment service as their disguise to conduct various scams involving 70,000 stolen victim data.

The Cyber Police department and the National police came together on this issue which seemed to have made a loss of five million hyrvnias (Ukrainian Currency).

- Advertisement - SIEM as a Service

The threat actors were a group of five people including an organizer who created and administered more than 40 phishing websites to obtain details about credit cards from victims. The phishing websites were similar to that of the mobile operator’s website which made the users enter their card details for topping up their account or making a bank transfer. 

Through phishing websites, the attacker has collected information from more than 70,000 people and used it to steal money from those accounts.

The police also stated that the organizer also used paid marketing and analytical resources to make SEO for the phishing websites and make it forefront the search results as well as on social media.

The group also involved three citizens to transfer their illegal funds as a result that they also receive a profit for each fraudulent operation.

The police also seized computer equipment, mobile phones, flash drives, bank cards and also confiscated 2 million hryvnias in cash.

Cyber police also remind the citizens to check on the URL before entering their sensitive information like bank details, CVV, PIN, and card expiry date.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Critical TP-Link DHCP Vulnerability Let Attackers Execute Arbitrary Code Remotely

A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious...

Chinese SilkSpecter Hackers Attacking Black Friday Shoppers

SilkSpecter, a Chinese financially motivated threat actor, launched a sophisticated phishing campaign targeting e-commerce...

Cybercriminals Launch SEO Poisoning Attack to Lure Shoppers to Fake Online Stores

The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to...

Black Basta Ransomware Leveraging Social Engineering For Malware Deployment

Black Basta, a prominent ransomware group, has rapidly gained notoriety since its emergence in...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Critical TP-Link DHCP Vulnerability Let Attackers Execute Arbitrary Code Remotely

A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious...

Chinese SilkSpecter Hackers Attacking Black Friday Shoppers

SilkSpecter, a Chinese financially motivated threat actor, launched a sophisticated phishing campaign targeting e-commerce...

Cybercriminals Launch SEO Poisoning Attack to Lure Shoppers to Fake Online Stores

The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to...