Skip to main content

Crooks steal $28M in crypto using Google Adwords & spoofed domains

Authorities arrested six suspects including five males and one female in simultaneous raids carried out in a joint operation. The raids and subsequent arrests were carried out to trace $28 million worth of stolen Bitcoin. 
The raids were conducted as part of a 14-month long, large-scale, global police investigation involving European law enforcement agencies including Europol, European intelligence agency, and Europol’s Joint Cybercrime Action Taskforce, Eurojust, along with the South West Regional Cyber Crime Unit of UK, and Dutch police department Politie.
According to the police, the arrested individuals, aged between 19 and 37, created replica websites for popular cryptocurrency exchanges including Blockchain.com. Using fake exchange sites, scammers managed to trap unsuspecting users into visiting them. Furthermore, they created fraudulent Google Adwords buys so that Google search users are redirected to the replica sites. Through the fake cryptocurrency exchange site Blockchain.com, the individuals stole login credentials and emptied the digital wallets of at least 4,000 victims using typosquatting technique to create a fake replica of the desired platform. 
Typosquatting is a technique in which fraudsters create fake domain names that are a spoofed version of the actual/original that’s being replicated. 
As for the raids, three of the male suspects were arrested from Somerset and Wiltshire counties while two Dutch suspects were arrested from Rotterdam and Amsterdam while the rest were captured from Bath and Charlcombe. The accused are charged with money laundering and misusing computer.
“As part of today’s operation, we’ve seized a large number of devices, equipment, and valuable assets with huge support from our colleagues in Avon and Somerset Police, Wiltshire Police, Tarian and the South East ROCU. Devon and Cornwall and the Metropolitan Police also provided vital help in the form of their two cyber dogs, who played key roles in searching suspects’ homes,” the Police said.It is worth mentioning that the gang was arrested on Tuesday from their homes. During the raids, authorities confiscated electronic equipment and devices and two specially trained dogs were used for sniffing gadgets like computers and storage devices.
Our @swrccu investigation into a £22m cyber fraud has led to 6 arrests today.
Estimated 4k victims targeted. More here https://bit.ly/2XEpkle  Great joint effort including @Europol @Eurojust @NCA_UK and support from @ASPolice @wiltshirepolice @SouthEastROCU

20 people are talking about this

The investigation started after a victim based in Wiltshire reported about stolen bitcoin worth £17k and so far the number of victims reporting similar crime has grown astoundingly while the scope of attack also expanded to 12 countries.

Comments

Popular posts from this blog

List Of Sql Infected Sites-HACKEREAD

SQL injection  is a  code injection  technique, used to  attack  data-driven applications, in which malicious  SQL  statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker).  SQL injection must exploit a  security vulnerability  in an application's software, for example, when user input is either incorrectly filtered for  string literal   escape characters  embedded in SQL statements or user input is not  strongly typed  and unexpectedly executed. SQL injection is mostly known as an attack  vector  for websites but can be used to attack any type of SQL database. List of SQL Infected sites:  http://www.genhound.co.uk/source.php?id=477 http://www.lcoastpress.com/journal.php?id=8 http://www.travellers-tales.co.uk/travelJournal.php?id=42 http://www.arrowvalves.co.uk/content.php?id=8 http://www.reaplasrack.co.uk/content.php?id=129 http://www.arrowval...

Google dork list for XSS (Cross- site scripting)-2020

GOOGLE DORK LIST FOR Cross-site scripting -2020 Google Dorks  its also known as google query ,List “Google Hacking” is mainly referred to pull the sensitive information from Google using advanced search terms that help users to search the index of a specific website, specific file type and some interesting information from unsecured Websites. Google Dorks list  2020 can uncover some incredible information such as email addresses and lists, login credentials, sensitive files, website vulnerabilities, and even financial information (e.g. payment card data). Here you can see an example to understand how  Google Darks   password  used by hackers to gain sensitive information from specific websites. You can also use for Exploit DB site to give you according to you Search state. https://www.exploit-db.com/ “ inurl: domain/ ” “ additional dorks A hacker would simply use in the desired parameters as follows: inurl = the URL of a site you want...

Popular Android Zombie game phish users to steal Gmail credentials

The app made its way to Google Play Store was also found phishing users for Facebook credentials. Scary Granny ZOMBY Mod: The Horror Game 2019 is the latest game on Google Play Store that is condemned by the digital security fraternity for sneakily stealing personal data from unsuspecting users. The game, which has been downloaded for over 50,000 times, was available for Android devices making Android users its primary target. The malicious app attempts to collect sensitive information such as Facebook and Gmail login credentials. The malicious activities of Scary Granny ZOMBY Mod were detected by the mobile security firm Wandera. The company found out that the app asks users to enter their Gmail or other Google account credentials, which are then used for collecting private data of the user by hijacking the account –  All of this happens, unsurprisingly, without alerting the user. Gmail phishing page on the supposed gaming app (Screenshot: Wandera) Rese...