• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
cybercriminals using novel dns hijacking technique for investment scams

Cybercriminals Using Novel DNS Hijacking Technique for Investment Scams

You are here: Home / General Cyber Security News / Cybercriminals Using Novel DNS Hijacking Technique for Investment Scams
March 5, 2024

A new DNS menace actor dubbed Savvy Seahorse is leveraging refined procedures to entice targets into fake investment decision platforms and steal funds.

“Savvy Seahorse is a DNS menace actor who convinces victims to create accounts on fake financial commitment platforms, make deposits to a own account, and then transfers individuals deposits to a lender in Russia,” Infoblox stated in a report posted past week.

Targets of the campaigns include things like Russian, Polish, Italian, German, Czech, Turkish, French, Spanish, and English speakers, indicating that the risk actors are casting a large net in their attacks.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Consumers are lured by means of advertisements on social media platforms like Fb, although also tricking them into parting with their own data in return for alleged large-return investment alternatives through bogus ChatGPT and WhatsApp bots.

Cybersecurity

The economic fraud campaigns are noteworthy for making use of DNS canonical title (CNAME) records to build a targeted visitors distribution method (TDS), thereby allowing for danger actors to evade detection considering the fact that at least August 2021.

A CNAME record is made use of to map a domain or subdomain to yet another domain (i.e., an alias) in its place of pointing to an IP tackle. A person benefit with this tactic is that when the IP address of the host alterations, only the DNS A document for the root domain wants to be up to date.

Savvy Seahorse leverages this strategy to its edge by registering quite a few shorter-lived subdomains that share a CNAME record (and hence an IP handle). These particular subdomains are developed working with a area generation algorithm (DGA) and are associated with the key campaign domain.

The at any time-changing character of the domains and IP addresses also tends to make the infrastructure resistant to takedown endeavours, making it possible for the danger actors to continuously create new domains or alter their CNAME data to a different IP handle as their phishing websites are disrupted.

Although danger actors like VexTrio have employed DNS as a TDS, the discovery marks the 1st time CNAME information have been employed for such applications.

Cybersecurity

Victims who stop up clicking the links embedded on Facebook adverts are urged to present their names, email addresses, and phone quantities, after which they are redirected to the bogus investing system for introducing resources to their wallets.

“An vital element to notice is the actor validates the user’s facts to exclude site visitors from a predefined checklist of nations, which include Ukraine, India, Fiji, Tonga, Zambia, Afghanistan, and Moldova, though their reasoning for deciding upon these distinct nations around the world is unclear,” Infoblox pointed out.

The enhancement comes as Guardio Labs revealed that hundreds of domains belonging to reputable brands and establishments have been hijacked applying a system known as CNAME takeover to propagate spam strategies.

Observed this report attention-grabbing? Follow us on Twitter  and LinkedIn to examine far more distinctive written content we post.


Some pieces of this post are sourced from:
thehackernews.com

Previous Post: «over 225,000 compromised chatgpt credentials up for sale on dark Over 225,000 Compromised ChatGPT Credentials Up for Sale on Dark Web Markets
Next Post: What is Exposure Management and How Does it Differ from ASM? what is exposure management and how does it differ from»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month
  • Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion
  • CTEM is the New SOC: Shifting from Monitoring Alerts to Measuring Risk
  • Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware
  • WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network
  • New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
  • AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar
  • Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
  • Non-Human Identities: How to Address the Expanding Security Risk
  • ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks

Copyright © TheCyberSecurity.News, All Rights Reserved.