• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Advanced Phishing Scams Target Middle East and Impersonate UAE Ministry of Human Resources

You are here: Home / General Cyber Security News / Advanced Phishing Scams Target Middle East and Impersonate UAE Ministry of Human Resources
July 5, 2022

CloudSEK researchers have recognized an considerable phishing marketing campaign in which danger actors (TA) were impersonating the Ministry of Human Resources of the UAE authorities.

Spotted through the company’s synthetic intelligence (AI) digital risk monitoring platform XVigil, the new risk would goal several government and company entities throughout the finance, vacation, clinic, lawful, oil and gasoline and session industries.

“The actors developed a bogus web page […] that resembles the legit area […] to defraud people,” CloudSEK wrote in an advisory.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The security experts’ investigation indicates this is a substantial-scale phishing marketing campaign, largely qualified at personal work seekers and businesses and exposing them to 419 and BEC scams.

“Upon observing the sample of the email handle used to register the domains, area identify, and hosting infrastructure, it can be inferred that a solitary menace actor or a danger actor team owns all these phishing domains and internet websites,” CloudSEK reported.

Further investigation of the email handle also led to the discovery of 43 domains that shared the similar registrant details.

“During the program of our investigation into the phony domain, CloudSEK scientists found many other domains on the Open up Source Internet (OSINT) that have been claimed on websites […] as frauds, targeting job seekers.”

In accordance to the security industry experts, the earlier mentioned phishing tasks could also be utilized by other threat actors to concentrate on particular consumers and steal their passwords, files, crypto wallets and other sensitive data.

To mitigate the effect of these attacks, CloudSEK claimed businesses and men and women must stay clear of downloading suspicious files from unfamiliar resources or clicking on suspicious backlinks.

Further, the business stated the visibility of file extensions really should be enabled (on Windows units) to location data files with not known file extensions ahead of downloading them.

Ultimately, CloudSEK concluded that equally multi-factor authentication (MFA) and the use of up-to-date antivirus and anomaly detection resources could also help cut down the influence of these state-of-the-art phishing cons.


Some components of this report are sourced from:
www.infosecurity-journal.com

Previous Post: «researchers uncover malicious npm packages stealing data from apps and Researchers Uncover Malicious NPM Packages Stealing Data from Apps and Web Forms
Next Post: NIST Acknowledges First Four Quantum-Resistant Encryption Tools Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.