• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
u.s. authorities seize domains used in 'pig butchering' cryptocurrency scams

U.S. Authorities Seize Domains Used in ‘Pig butchering’ Cryptocurrency Scams

You are here: Home / General Cyber Security News / U.S. Authorities Seize Domains Used in ‘Pig butchering’ Cryptocurrency Scams
November 22, 2022

The U.S. Justice Department (DoJ) on Monday announced the takedown of seven area names in link to a “pig butchering” cryptocurrency fraud. The fraudulent scheme, which operated from May to August 2022, netted the actors over $10 million from 5 victims, the DoJ claimed.

Pig butchering, also known as Sha Zhu Pan, is a type of fraud in which swindlers lure unsuspecting traders into sending their crypto assets. The criminals face prospective victims on dating applications, social media internet sites, and SMS messages.

These folks initiate phony interactions in an attempt to make believe in, only to trick them into producing a cryptocurrency investment decision on a bogus system.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“As soon as the revenue is despatched to the pretend expenditure app, the scammer vanishes, having all the revenue with them, often ensuing in important losses for the target,” the DoJ said.

The seven seized portals all mimicked the Singapore International Monetary Exchange (SIMEX), the agency pointed out.

But after the resources ended up transferred into wallet addresses supposedly provided by these domains, the digital currencies are mentioned to have been straight away moved as a result of an array of personal wallets and swapping expert services to conceal the path.

“Pig Butchering fraud highlights the lengths actors will go to socially engineer a goal into falling victim to criminal offense perpetuated by massive cybercrime ecosystems,” Sherrod DeGrippo, vice president of threat study and detection at Proofpoint, previously explained to The Hacker Information.

“The emotional manipulation, helpful tone, and sheer length of the pre-exploitation period will allow authentic thoughts to produce, and the actor exploits that emotion for economic attain, to the decline of sometimes thousands and thousands of pounds.”

An advisory produced by the U.S. Federal Bureau of Investigation (FBI) previous month famous how when the victims attempted to withdraw their investments, they were requested to shell out extra taxes or penalties, top to extra loss.

The intelligence company, in April, revealed it acquired a lot more than 4,300 complaints associated to crypto-romance cons, resulting in a lot more than $429 million in losses.

A modern report from Proofpoint also detailed some of the other strategies adopted by the fraudsters, such as suggesting shifting the discussion to Telegram or WhatsApp for a “much more private chat” and encouraging the victims to ship compromising photographs.

“In addition to cryptocurrency-centered lures, these prison enterprises have made use of gold, foreign exchange, stocks, and other subjects to exploit their victims,” scientists Tim Kromphardt and Genina Po said.

“This kind of strategies are successful thanks to the intimate nature of the discussions main up to the ‘slaughter.’ Creating disgrace and embarrassment are critical ambitions for menace actors that leverage this type of social engineering to exploit victims, equivalent to romance fraud.”

Observed this article intriguing? Comply with THN on Fb, Twitter  and LinkedIn to study more special material we post.


Some parts of this report are sourced from:
thehackernews.com

Previous Post: «Cyber Security News Google Wins Legal Battle Against Glupteba Botnet
Next Post: Credential Stuffers Steal $300K from DraftKings Customers Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New Variant of Banking Trojan BBTok Targets Over 40 Latin American Banks
  • How to Interpret the 2023 MITRE ATT&CK Evaluation Results
  • Iranian Nation-State Actor OilRig Targets Israeli Organizations
  • High-Severity Flaws Uncovered in Atlassian Products and ISC BIND Server
  • Apple Rushes to Patch 3 New Zero-Day Flaws: iOS, macOS, Safari, and More Vulnerable
  • Mysterious ‘Sandman’ Threat Actor Targets Telecom Providers Across Three Continents
  • Researchers Raise Red Flag on P2PInfect Malware with 600x Activity Surge
  • The Rise of the Malicious App
  • China Accuses U.S. of Decade-Long Cyber Espionage Campaign Against Huawei Servers
  • Cyber Group ‘Gold Melody’ Selling Compromised Access to Ransomware Attackers

Copyright © TheCyberSecurity.News, All Rights Reserved.