"Fraudulent calls are a common type of crime in the digital environment.

Sharing knowledge to enhance japan database performance and growth.
Post Reply
tanjimajuha20
Posts: 435
Joined: Thu Jan 02, 2025 7:51 am

"Fraudulent calls are a common type of crime in the digital environment.

Post by tanjimajuha20 »

"Post Lukatsky" Alexey Lukatsky, citing subscribers. The attack itself, according to the expert, looks like this: "Fraudsters call former employees (starting with general directors and accountants, whose data is openly stored in the Unified State Register of Legal Entities) of companies with foreign participation and, hiding behind service in law enforcement agencies and threatening with criminal cases under foreign agent articles and treason, demand, for example, accounting belize whatsapp resource documents. As a modification of the scheme, a message may arrive from your "former general director", who will request various things, allegedly as part of investigative actions, or ask for assistance."
Criminals use various fraudulent schemes, improving them taking into account current realities," confirmed a representative of the press service of Roskomnadzor. - One of the schemes popular with criminals: a person receives a message from a "manager" via messenger that a law enforcement officer will call the employee, who must be listened to and act as he says. After that, the citizen is called or written by a fraudster and receives the necessary information from him. The scheme with calling former employees of companies with foreign participation is a modernized version of this model of fraudsters' behavior. You can find other popular models of fraudsters' behavior and recommendations on how to avoid cyber fraud by following the links in the Roskomnadzor Telegram ch

Yaroslav Kargalev, head of the cybersecurity center at Trust LLC (FACCT - formerly the Russian branch of Group-IB), said that the most likely goal of the attackers is collecting data for use in other attacks: "Information obtained at the stage of such reconnaissance, when attackers try to obtain various documents, can be used to develop targeted social engineering. For a potential victim, for example, the recipient of a letter, it will seem as legitimate as possible and will not arouse suspicion. The use of topics related to finance and accounting issues in this scheme may indicate that the further development of the attack will be aimed at employees of the financial sector. In this case, attackers can use well-prepared phishing letters with a malicious payload, where their goal will be to infect a work device and gain access to the data stored on it - for example, credentials that allow access to remote banking services. Another vector of attacks on accountants can be fraudulent letters of the BEC (invoice fraud, or corporate email compromise) type, when pre-prepared (thanks to intelligence) the scammers will try to enter into correspondence with a current employee of the company, posing as a person whom the victim will trust. And in general, we see how fan mailings acquire attributes of targeting - a well-developed legend of the phishing letter, which increases the likelihood that the recipient-victim will perform the required actions: follow the link, launch the attachment, transfer money."
Post Reply