• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Phishing Scam Targets Military Families

You are here: Home / General Cyber Security News / Phishing Scam Targets Military Families
December 2, 2021

Threat scientists at Lookout are supporting to choose down a phishing marketing campaign that has been targeting customers of the United States navy and their families. 

The scammers driving the very long-working campaign impersonate armed forces help corporations and staff to dedicate progress charge fraud, thieving sensitive individual and money data for financial achieve.

“Based on our examination, it is distinct that the menace actor is wanting to steal sensitive data from victims these as their photo identification, financial institution account data, identify, deal with and phone variety,” wrote Lookout’s researchers in a blog post on the fraud printed these days. 

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“With this information, the actor could very easily steal the victim’s id, vacant their bank account and impersonate the specific on the internet.”

The campaign’s spine is a series of internet websites that have been built to look as even though they are affiliated with the navy. To bring an added touch of authenticity to the web-sites, the operators insert adverts for Department of Protection products and services to their destructive articles.

The web-sites offer you costly services that are in no way shipped, or trick end users into considering that they are in a romantic relationship with a member of the military services. Pretend solutions supplied consist of treatment deals, depart programs, and interaction permits.

Infrastructure indicators coupled with open up-sourced intelligence point to Nigeria as the scammers’ operational foundation. 

“The internet websites were being mainly hosted by Nigerian vendors that are offshore or disregard the Digital Millennium Copyright Act (DMCA),” wrote researchers.

“We had been able to further more verify the operator’s location from a phone selection 1 of the web builders accidentally still left on the draft version of the web-site. The state code of the variety is from Nigeria.”

So much, researchers have discovered 50 military services fraud web sites tied to this danger campaign, which further investigation showed was joined to other cyber-felony exercise.

“We have been also able to backlink this team to numerous other cons advertising phony shipping and delivery solutions, crypto-currency buying and selling, banking companies and even online pet revenue,” wrote scientists.

The researchers at Lookout mentioned that they are not the only folks who are actively working to battle this particular campaign and expressed their many thanks to all people who is performing to quit the scammers.


Some pieces of this report are sourced from:
www.infosecurity-magazine.com

Previous Post: «Cyber Security News Cyber-attack on Planned Parenthood
Next Post: CISA Warns of Actively Exploited Critical Zoho ManageEngine ServiceDesk Vulnerability cisa warns of actively exploited critical zoho manageengine servicedesk vulnerability»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Connecticut Becomes Fifth US State to Enact Consumer Privacy Law
  • New Unpatched Horde Webmail Bug Lets Hackers Take Over Server by Sending Email
  • FluBot Android Spyware Taken Down by Global Law Enforcement Operation
  • YODA Tool Found ~47,000 Malicious WordPress Plugins Installed in Over 24,000 Sites
  • Twice as Many Healthcare Organizations Now Pay Ransom
  • WithSecure CTO: Industry needs to do a better job of targeting ransomware supply chains
  • GitHub Enterprise Server 3.5 is equipped with a horde of new security protections
  • Microsoft Releases Workaround for ‘One-Click’ 0Day Under Active Attack
  • New XLoader Botnet Version Using Probability Theory to Hide its C&C Servers
  • Chinese hackers exploit Microsoft zero-day as list of vulnerable Office products grows

Copyright © TheCyberSecurity.News, All Rights Reserved.