Tuesday, December 17, 2024
HomeCyber AttackLaw enforcement Officers Busted Phishing Group That Uses 40 Websites to Steal...

Law enforcement Officers Busted Phishing Group That Uses 40 Websites to Steal Credit Card Data

Published on

SIEM as a Service

On 22nd February 2022, Ukrainian Police officials arrested a group of threat actors that were involved in a phishing campaign.

They used a mobile replenishment service as their disguise to conduct various scams involving 70,000 stolen victim data.

The Cyber Police department and the National police came together on this issue which seemed to have made a loss of five million hyrvnias (Ukrainian Currency).

- Advertisement - SIEM as a Service

The threat actors were a group of five people including an organizer who created and administered more than 40 phishing websites to obtain details about credit cards from victims. The phishing websites were similar to that of the mobile operator’s website which made the users enter their card details for topping up their account or making a bank transfer. 

Through phishing websites, the attacker has collected information from more than 70,000 people and used it to steal money from those accounts.

The police also stated that the organizer also used paid marketing and analytical resources to make SEO for the phishing websites and make it forefront the search results as well as on social media.

The group also involved three citizens to transfer their illegal funds as a result that they also receive a profit for each fraudulent operation.

The police also seized computer equipment, mobile phones, flash drives, bank cards and also confiscated 2 million hryvnias in cash.

Cyber police also remind the citizens to check on the URL before entering their sensitive information like bank details, CVV, PIN, and card expiry date.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Cyber Criminals Exploit Windows Management Console to Deliver Backdoor Payloads

A recent campaign dubbed FLUX#CONSOLE has come to light, leveraging Microsoft Common Console Document (.MSC) files...

Texas Tech Systems Breach, Hackers Accessed System Folders & Files

The Texas Tech University Health Sciences Center (TTUHSC) and Texas Tech University Health Sciences...

Beware of Malicious Ads on Captcha Pages that Deliver Password Stealers

Malicious actors have taken cybercrime to new heights by exploiting captcha verification pages, a...

Hitachi Authentication Bypass Vulnerability Allows Attackers to Hack the System Remotely

Critical Authentication Bypass Vulnerability Identified in Hitachi Infrastructure Analytics Advisor and Ops Center Analyzer.A...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Cyber Criminals Exploit Windows Management Console to Deliver Backdoor Payloads

A recent campaign dubbed FLUX#CONSOLE has come to light, leveraging Microsoft Common Console Document (.MSC) files...

Texas Tech Systems Breach, Hackers Accessed System Folders & Files

The Texas Tech University Health Sciences Center (TTUHSC) and Texas Tech University Health Sciences...

Beware of Malicious Ads on Captcha Pages that Deliver Password Stealers

Malicious actors have taken cybercrime to new heights by exploiting captcha verification pages, a...