Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Iran’s state TV is driven in the middle of his brother amid geopolitical tensions; 90 million dollars stole in the cry

June 20, 2025

A massive DDOS attack 7.3 TBPS provides 37.4 TV in 45 seconds, focusing on the hosting provider

June 20, 2025

6 Steps to 24/7 Internal Success SoC

June 20, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » New Investment Scam Uses Artificial Intelligence and Social Media Ads to Target Victims Worldwide
Global Security

New Investment Scam Uses Artificial Intelligence and Social Media Ads to Target Victims Worldwide

AdminBy AdminDecember 16, 2024No Comments4 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


December 16, 2024Ravi LakshmananCryptocurrency / Phishing Attack

Cybersecurity researchers are drawing attention to a new type of investment fraud that uses a combination of malicious social media advertising, company-branded messages, and artificial intelligence (AI)-based video recommendations featuring celebrities, ultimately leading to financial and data loss. .

“The main goal of fraudsters is to lead victims to phishing websites and forms that collect their personal information,” ESET noted in its Threat report for the second half of 2024 shared with The Hacker News.

A Slovak cyber security company is tracking a threat called Nomania play on the phrase “no money”. It says that fraud increased by more than 335% from the first half of 2024 to the second half of 2024, with an average of more than 100 new URLs detected every day between May and November 2024.

The attacks are carried out through deceptive advertising on social media platforms, in some cases targeting people who have previously been scammed, using lures linked to Europol and Interpol to contact them for help or to receive compensation for stolen money by clicking on a link.

Cyber ​​security

These ads are posted from a mix of fake and stolen legitimate profiles associated with small businesses, government organizations, and micro-influencers with tens of thousands of followers. Other distribution channels include sharing these messages on Messenger and Threads, and sharing deceptively positive reviews on Google.

“Another large group of accounts that frequently distribute Nomani ads are newly created profiles with forgettable names, few followers, and very few posts,” ESET noted.

The linked websites were found to be asking for their contact information and visually impersonating local media; misuse logos and brands of specific organizations; or claim to advertise cryptocurrency management solutions with ever-changing names such as Quantum Bumex, Immediate Mator or Bitcoin Trader.

In the next step, cybercriminals use data collected from phishing domains to call victims directly and manipulate them into investing in non-existent investment products that falsely show phenomenal returns. In some cases, victims are tricked into taking loans or installing remote access programs on their devices.

“When these victim ‘investors’ request payment of the promised returns, the scammers force them to pay additional fees and provide additional personal information such as ID and credit card information,” ESET said. “In the end, fraudsters take both money and data and disappear – according to the usual rules pig slaughter scam.”

There is evidence that Nomani is the work of Russian-speaking threat actors, given the presence of comments on the source code in Cyrillic and the use of Yandex visitor tracking tools.

Cyber ​​security

Similar to major scams, for example telecopyingit is suspected that there are different groups responsible for managing each aspect of the attack chain: Theft, creation and abuse of meta accounts and adscreation of phishing infrastructure and management of call centers.

“Using social engineering techniques and building trust with victims, fraudsters often outsmart even the authorization mechanisms and phone verification calls that banks use to prevent fraud,” ESET said.

It comes after South Korean law enforcement officials said they busted a large-scale fraud ring that stole nearly $6.3 million from victims using fake online trading platforms in an operation dubbed MIDAS. More than 20 servers used by the fraudsters were seized and 32 people involved in the scheme were arrested.

Apart from luring victims with text messages and phone calls, users of illegal home trading system (HTS) programs tended to invest their funds by watching YouTube videos and joining KakaoTalk chat rooms.

“The program interacts with the servers of real brokerage firms to obtain real-time stock price information and uses publicly available chart libraries to create visual representations,” said the Financial Security Institute (K-FSI) said in a presentation at the Black Hat Europe conference last week.

“However, no actual stock trading takes place. Rather, the program’s primary function, the screen capture feature, is being used to spy on users’ screens, collect unauthorized information, and deny refunds.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Iran’s state TV is driven in the middle of his brother amid geopolitical tensions; 90 million dollars stole in the cry

June 20, 2025

A massive DDOS attack 7.3 TBPS provides 37.4 TV in 45 seconds, focusing on the hosting provider

June 20, 2025

6 Steps to 24/7 Internal Success SoC

June 20, 2025

67 Trojanized GitHub repository found in the company, orientation on gamers and developers

June 20, 2025

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Iran’s state TV is driven in the middle of his brother amid geopolitical tensions; 90 million dollars stole in the cry

June 20, 2025

A massive DDOS attack 7.3 TBPS provides 37.4 TV in 45 seconds, focusing on the hosting provider

June 20, 2025

6 Steps to 24/7 Internal Success SoC

June 20, 2025

67 Trojanized GitHub repository found in the company, orientation on gamers and developers

June 20, 2025

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Iran’s state TV is driven in the middle of his brother amid geopolitical tensions; 90 million dollars stole in the cry

June 20, 2025

A massive DDOS attack 7.3 TBPS provides 37.4 TV in 45 seconds, focusing on the hosting provider

June 20, 2025

6 Steps to 24/7 Internal Success SoC

June 20, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.