Money heist’: Cyber criminals hack bank servers, transfer Rs 12 crore within minutes

The cyber crime wing of Hyderabad police registered a case and took up investigation on Monday after the bank officials lodged a complaint.

Some persons hacked into the servers of the bank and transferred the huge amounts to about 100 different bank accounts.

The bank officials lodged a complaint with the police after the fraud came to light during internal verification.

A police team visited the main branch of the bank to launch the probe. The team gathered details of the cyber security system of the bank.

In 2018, hackers had siphoned off Rs 94 crore from Pune-based Cosmos Bank, India’s second largest cooperative bank, by cloning thousands of credit cards.

Kausar city

Concept:- Ready to Move

Company Name:-Realex servicon pvt. Ltd

Location:- Tiluchak (Sundarpur)

Total area :- 11 bigha and above

Provided plots type:- Only Residential

On route:- AIIMS – BIKRAM NAHAR ROAD APPROAX DISTANCE(18KM) AND TIMING (20 MIN.)

BASIC AMINITIES:-

We provide a Muslim gated society that is the first invention in all over Bihar…

  1. Entry gate
  2. Park( 7200 sq/ft)
  3. Masjid (4131 sq.ft) = 81*51
  4. Kabristan(11340 sq.ft)
  5. Severage
  6. Security guard
  7. Water supply
  8. Electricity(street Light)
  9. Road ( 30ft and 20ft )
  10. Outer boundary wall

Price:- 900 sq.ft

Mauza:-Sundarpur

Plot sizes:- 600 sq.ft, 1200sq.ft,2400 sq.ft….

USP (Unique selling point):–

  1. Education:- sant Paul’s school(Approax 500m), cambridge school(Approax 5km..)
  2. Industry:- Ethnol plant(Naubatpur), Vijay Malya ka bear plant , Plastic industry(Naubatpur)
  3. Connectivity:- Ring Road benefits, Railway halt near Phulwari AIIMS
  4. Hospital:- Phulwari AIIMS, Ruban city(APPROAX 7 Bigha)
  5. Market:- Bikram Bazar(Approax 3km)
Phulwarisarif is already a Muslim society,  and this areas near by places covered by Muslim leagues so our company complete their requirement regarding Masjid(4131 sq.ft)Which is used by Every Areas Muslim leagues. And our company is the first type company which is only thinking about our Muslim society...

Kids won’t stop launching DDoS attacks against their schools

The cybercrime unit of the UK National Crime Agency (NCA) is stepping up a program designed to educate children about the ramifications of DDOS attacks.

According to the report, the volume of such attacks has risen sharply during the pandemic, presumably causing disruption to online training  activities.

Education is a key pillar in preventing crime and these messages highlight the risks and consequences of committing cyber offences, which can result in a criminal record,” said John Denley, Deputy Director of the NCA’s cybercrime unit.

“Law enforcement plays a critical role in tackling cybercrime and keeping the country safe. School outreach is important to educate a younger audience and this initiative will continue to help divert young people away from criminality.”

It’s great to see cooperation between law enforcement and the private sector in delivering important initiatives like this one to prevent students from getting involved in cybercrime.”

North Korean Hackers Stole Crypto Worth $400 Million in 2021

Cybercrime groups supported by the North Korean regime have increasingly been focusing on crypto markets, for several obvious reasons. Lazarus APT, in particular, has been a very technically skilled and well-funded threat group involved in carrying out attacks on the crypto industry.

The attacks on crypto markets

  • The attacks netted around $400 million in 2021, a whopping 40% increase as compared to the last year.
  • North Korea-supported attackers control $170 million in their crypto balances, collected from 49 attacks carried out between 2017 and 2021.
  • Attackers are using various methods, including phishing emails, malware, social engineering tricks, and code exploits to target their victims, mostly involving investment firms and crypto exchanges.

Exploring the money laundering

  • Before cashing out the money, they are laundered using software known as mixers. 
  • The mixers are used to hide the origins of their malicious cryptocurrencies while converting them into fiat currencies.

Exposed records exceeded 40 billion in 2021

According to a research by Tenable, at least 40,417,167,937 records were exposed worldwide in 2021, calculated by the analysis of 1,825 breach data incidents  publicly disclosed between November 2020 and October 2021. This is a considerable increase on the same period in 2020, which saw 730 publicly disclosed events with just over 22 billion records exposed.

  • Ransomware had a monumental impact on organizations in 2021, responsible for approximately 38% of all breaches.
  • 6% of breaches were the result of unsecured cloud databases.
  • Unpatched SSL VPNs continue to provide an ideal entry point for attackers to perform cyberespionage, exfiltrate sensitive and proprietary information as well as encrypt networks.
  • Threat groups, particularly ransomware, have increasingly exploited vulnerabilities and misconfigurations in Active Directory.
  • Software libraries and network stacks used commonly amongst OT devices often introduce additional risk when security controls and code audits are not in place.
  • Ransomware groups favored physical supply disruption as a tactic to extort payment while cyberespionage campaigns exploited the software supply chain to access sensitive data.
  • Healthcare and education experienced the greatest disruption from data breaches

Amazon fake crypto token investment scam steals Bitcoin from victims

A new cryptocurrency-related scam is abusing the Amazon brand to dupe would-be investors into handing over Bitcoin (BTC). 

Cryptocurrency and digital token scams have become a common threat facing investors and the general public today. 

Even though regulators worldwide are clamping down on fraud — through tax legislation, securities offering registration, tighter rules surrounding cryptocurrency adverts, and by keeping a close eye on initial coin offerings (ICOs), exit scams, rug pulls, and theft is still rampant. 

Generating panic and encouraging victims to make a rash decision are common tactics used in various scams, and this is no exception. In the Amazon scheme, the fraudsters have imposed a ‘time-sensitive’ lure to make individuals feel like they could be losing out on a lucrative investment opportunity.

The campaign began by publishing fake social media posts in groups that are interested in the cryptocurrency space. If users clicked on a post, they were directed to a fake “CNBC Decoded” news website that included an article on the soon-to-be-released ‘Amazon crypto token.’

The cyberattackers gave visitors roughly 30 seconds to read the fake release before they were automatically redirected to a domain that offered pre-sale tokens. The website in question was fully functional and required signing up email account confirmation and user profile creation. 

In total, most of the visitors to the fake token landing pages were using mobile devices (98%). The distribution of mobile operating systems in use is fairly even but leans toward Android handsets (56%), followed by Apple iOS (42%). 

The majority of victims are located in North America, South America, and Asia.  

“Based on our research, we predict that crypto scams will continue to drive many nefarious activities throughout the 2022 threat landscape,” the researchers commented. 

QR codes can eat your lunch, FBI warns

QR codes are among the few “winners” of the coronavirus pandemic, the joke goes, because restaurants and other businesses have deployed them in far greater numbers over the past few years, in an effort to make more interactions contactless.

The FBI is warning, however, that scammers love them, too.

The bureau’s Internet Crime Complaint Center (IC3), issued a general alert Tuesday about “malicious” QR codes that reroute unsuspecting consumers to the world of cybercrime.

“[C]ybercriminals are taking advantage of this technology by directing QR code scans to malicious sites to steal victim data, embedding malware to gain access to the victim’s device, and redirecting payment for cybercriminal use,” the announcement says.

The FBI’s warning is the latest in a long string of advisories from cybersecurity researchers or government agencies about the threat posed by QR codes. Last week, Ars Technica reported on fake QR codes that were stuck on parking meters in Texas cities, with the goal of intercepting payments.

In October 2021, scammers were spotted using them as as part of a phishing attack. Earlier last year, the U.S. Army issued. Other alerts pointed to bitcoin scams, And at least one barcode scanner app became notorious  for carrying malware itself.

The FBI’s release didn’t cite any examples of such activity, but said the trickery usually comes through QR codes that have been altered, either onscreen or on a printed page.

“A victim scans what they think to be a legitimate code but the tampered code directs victims to a malicious site, which prompts them to enter login and financial information,” the FBI said. The bureau did not respond to a request from CyberScoop to provide more detail.

The bureau is warning consumers to double-check any URL generated by a QR code, and to be cautious about using them in general, especially for making payments.

Singapore monetary authority threatens action on bank over widespread phishing scam

The Monetary Authority of Singapore says it is considering supervisory action against Southeast Asia’s second largest bank, Oversea-Chinese Banking Corporation (OCBC), which was criticised for its incident response to a widespread phishing scheme across the island nation.

“Monetary Authority Singapore (MAS) takes a serious view of the recent phishing scams involving OCBC Bank. They have significantly impacted several customers. OCBC has acknowledged that its incident response and customer service should have been better. MAS has been following up with the bank on these and broader issues relating to the incident,” said MAS deputy managing director Ms Ho Hern Shin in a statement to The Register.

The phishing scheme first appeared at the start of December 2021 and became more aggressive through the holiday period. By the end of the month, the Singapore Police Department reported the scam had affected 469 customers and taken over SG$8.5m (US$6.3m/ £$4.62m).

Victims receive an unsolicited SMS that appears to be from the bank and asks the account holder to click a link to resolve account issues. Once that link is clicked, victims are redirected to a fake bank website where they provide their login details. They won’t know they’ve been scammed until they receive a notification of unauthorized transaction charged to their account.

“Once the funds have been fraudulently transferred out of the victim’s bank account, it would be challenging and difficult to recover the stolen monies,” said the police in a canned statement .

Aditya Birla Fashion confirms data breach, but says no sensitive info was compromised

Aditya Birla Fashion today addressed the data breach on its portal and sought to assure its customers that no sensitive information was compromised.

On Monday, it was reported that the company’s database was hacked into and information was made public by a hacker group. Initial reports had claimed that the information leaked included customer information including names, phone numbers, addresses, dates of birth, order histories, credit card details, and passwords, and details of employees, including salary details, religion, and marital status.

In a letter to its customers, the company sought assure its customers that no sensitive information was leaked and advised them to change their passwords. The company said there was an “information security incident entailing illegal access to customer (data)base and profile Info of some customers (was) released In some cyber forums”.The company stated that no “financially sensitive information, with respect to payment modalities” was compromised.The company, which reported a revenue of Rs 5,181.14 crore in in the previous financial year, claims to be the country’s largest “pure-play fashion powerhouse with an elegant bouquet of leading fashion brands and retail formats”.

RED HAT HACKER

A red hat hacker is a hacker who takes aggressive steps to stop black hat hackers. While red hat hackers are not inherently evil, they do everything they can to stop the bad guys, including taking matters into their own hands. They go to the lengths of launching full-scale attacks to take down cybercriminals’ or cyber attackers’ servers and destroy their resources.

Tools and Tactics Red Hat Hackers Use

Since red hats often hack black hats back, they use the same tools and tactics that black hats do, including:

  • Malware
  • Vulnerability exploits
  • Botnets for DDoS attacks

A red hat hacker targets Linux systems. Rather than hand a black hat over to the authorities, red hats will launch attacks against them to bring them down. Sometimes they are doing that illegal and sometimes legal.

Red hats are motivated by a desire to end black hat hackers but do not want to play by society’s rules.

Design a site like this with WordPress.com
Get started