Nigerian Scammers And Hackers Steal $3Billion Worldwide

According to experts, the Nigerians are able to carry out the heist by sending phishing emails to commercial organizations and industrial enterprises, which they later steal dry. .

The FBI estimates that these phishing attacks have cost companies over $3 billion. The number of affected companies exceeds 22,143. Kaspersky Labs, an internet security company, said it has found over 500 companies that are under attack in at least 50 countries. .

READ ALSO :  How 18 Year Old Girl Tries To Commit Suicide After Boyfriend Dumped Her (VIDEO)

Those under attack are mostly industrial enterprises and large transportation and logistics corporations, based in Germany, UAE, Russia and India.

READ ALSO :  2023: What Buhari said about my Presidential Ambition – Tinubu opens up

Researchers said that all indications are that these were business email compromise (BEC) attacks that have come to be associated with Nigerian cyber-criminals.

Emails received by victims looked authentic enough to fool people. .

Some had attachments with names such as “Energy & Industrial Solutions W.L.L_pdf”, “Woodeck Specifications best Prices Quote.uue” and “Saudi Aramco Quotation Request for October 2016”. .

READ ALSO :  This Must Be Madness, Imagin This Girl Spotted Exposing Her Thing In A Restaurant

These are well crafted emails that look legitimate and are crafted to make the victim open the malicious attachment. The emails ask the recipients to check information as soon as possible, clarify product pricing or receive goods specified in the delivery note attached.

READ ALSO :  Nollywood actor, Okwy Chukwujekwu has died

The malicious attachments contain RTF files with an exploit for the CVE-2015-1641 vulnerabiliy

They may also contain archives of different formats containing malicious executable files or macros and OLE objects designed to download malicious executable files.

Kaspersky discovered that the malicious files are intended to steal confidential data and install stealthy remote administration tools on infected systems. .

READ ALSO :  A MUST READ! How This Woman Sells Daughter’s Baby For N150,000 In Abia

Using Whois services, Kaspersky found that the domains used to host the malware were registered to residents of Nigeria. Once in, the hackers compromise a legitimate email and change the banking account details.

Leave a Reply