Sunday February 23, 2020
Home Lead Story Hackers Use D...

Hackers Use Data Protection Websites to Hack User Data: Study

In any possible scenario - be it the absence of the SSN or entering the correct existing SSN - the website alerts mistakes and offers to sell a temporary one for the $9 price

0
//
Hackers
Experts at cybersecurity firm Kaspersky detected this new online fraud scheme where Hackers urge users to buy 'temporary US social security numbers' worth around $9 each. Pixabay

In a unique online fraud, hackers are tricking people into thinking that they own compensation after being victims of personal data frauds, and under the pretext of offering them money, are fleecing them, a new report said on Monday.

Experts at cybersecurity firm Kaspersky detected this new online fraud scheme where scammers urge users to buy ‘temporary US social security numbers’ worth around $9 each.

Victims were found in Russia, Algeria, Egypt and the UAE as well as other countries.

The scheme involves a website allegedly owned by the Personal Data Protection Fund, founded by the US Trading Commission.

The fund issues compensation to those who may have been subject to a personal data leak and is available to citizens from any country in the world.

For those interested, the site offers to check whether user data has ever been leaked.

For this, one needs to provide their specific surname, first name, phone number, and social media accounts.

Once this has been done, an alert is shown indicating that the user has experienced a leak, which can include data such as photos, videos, and contact information, entitling the user to compensation of thousands of dollars.

Hackers
In a unique online fraud, hackers are tricking people into thinking that they own compensation after being victims of personal data frauds, and under the pretext of offering them money, are fleecing them. Pixabay

“However, fraudsters do not just ask for a user to enter a bank card number and wait for the payment to be credited; users inevitably need to offer their own social security numbers,” the report noted.

In any possible scenario – be it the absence of the SSN or entering the correct existing SSN – the website alerts mistakes and offers to sell a temporary one for the $9 price.

Upon agreement, the victim is redirected to this payment form in Russian or English with the purchase price specified in rubles or dollars, respectively. The specific form depends on the victim’s IP address, the experts noted.

“The scammers themselves are most likely Russian speakers, as suggested by the request for payments in rubles, plus the suspicious similarity of the scheme to other easy money offers that regularly tempt residents of Russia and the CIS (Commonwealth of Independent States),” said Tatyana Sidorina, Security expert at Kaspersky.

The e-bait in those schemes varies — giveaways, surveys, secret retirement savings, even a part-time job as a taxi dispatcher — but they tend to be in Russian (as are some of the preceding links).

The bottom line is always the same: the juicy promise of quite a bit of easy money, followed by a demand to pay for an inexpensive service, be it a commission, a ‘securing’ payment, or a temporary SSN.

Hackers
“However, Hackers do not just ask for a user to enter a bank card number and wait for the payment to be credited; users inevitably need to offer their own social security numbers,” the report noted. Pixabay

“The new scheme is quite a topical one and is related to offering compensation for data leaks. Once some organizations have started to pay users, fraudsters decided there is a monetary opportunity for them as well,” Sidorina added.

ALSO READ: People with Inadequate Food Access Likely to Die Prematurely: Study

In order to stay protected from the potential risks of online fraud, do not trust payment offers, use trusted resources and utilize a reliable security solution, said the researchers. (IANS)

Next Story

New Malware Can Fake Incoming Calls to Steal Banking Details: Kaspersky

A new banking trojan can insert fake text messages and obtain banking credentials

0
banking malware
A new version of the Ginp banking Trojan that can insert fake text messages into the Inbox of a regular SMS app in a bid to obtain banking credentials of unsuspecting users. Pixabay

Researchers at cybersecurity firm Kaspersky have identified a new version of the Ginp banking Trojan that can insert fake text messages into the Inbox of a regular SMS app in a bid to obtain banking credentials of unsuspecting users.

The malware urges victims to open their banking apps with SMS and push notifications, then overlays these apps and steals banking credentials.

These messages appear under the guise of reputable vendors informing users about an undesired event like blocked account access.

To prevent this, the user is requested to open the application. Once victims do that, the Trojan overlays the original window and asks them to input the credentials for a credit card or a bank account. As a result, their payment details are handed over to cybercriminals.

banking malware
The malware urges victims to open their banking apps with SMS and push notifications, then overlays these apps and steals banking credentials. Pixabay

“Ginp is simple, but efficient – and effective. And the rate at which it evolves and acquires new capabilities is concerning. While this attack has so far only been seen in Spain, based on our previous experience, this Trojan could begin to emerge in other countries as well; Android users need to be on alert,” Alexander Eremin, security expert at Kaspersky, said in a statement.

Having infiltrated a phone, most mobile banking Trojans try to gain access to SMS messages. They do so to intercept one-time confirmation codes from banks. Armed with such a code, the malware owners can make a payment or siphon off funds without the victim noticing.

At the same time, many mobile Trojans use text messages to infect more devices by sending the victim’s contacts a bad download link.

Also Read- Ways to Maintain Curly Hair

Some malicious apps are more creative, using SMS access to distribute other things in your name, such as offensive text messages.

The Ginp malware can even create incoming texts on the victim’s phone that no one actually sent, Eremin said. (IANS)