Nigerian Scammers And Hackers Steal $3Billion Worldwide

According to experts, the Nigerians are able to carry out the heist by sending phishing emails to commercial organizations and industrial enterprises, which they later steal dry. .

The FBI estimates that these phishing attacks have cost companies over $3 billion. The number of affected companies exceeds 22,143. Kaspersky Labs, an internet security company, said it has found over 500 companies that are under attack in at least 50 countries. .

READ ALSO :  Timaya Reveals He Didn’t Promise His Baby Mama Marriage, But She’ll Be The Only Mother Of His Kids

Those under attack are mostly industrial enterprises and large transportation and logistics corporations, based in Germany, UAE, Russia and India.

READ ALSO :  Notorious Nigerian Kidnapper, Chukwudubem Onwuamadike & His Gang Members Paraded With Their Weapons

Researchers said that all indications are that these were business email compromise (BEC) attacks that have come to be associated with Nigerian cyber-criminals.

Emails received by victims looked authentic enough to fool people. .

Some had attachments with names such as “Energy & Industrial Solutions W.L.L_pdf”, “Woodeck Specifications best Prices Quote.uue” and “Saudi Aramco Quotation Request for October 2016”. .

READ ALSO :  IPOB Declares May 18th, 26th Sit-At-Home In South-East

These are well crafted emails that look legitimate and are crafted to make the victim open the malicious attachment. The emails ask the recipients to check information as soon as possible, clarify product pricing or receive goods specified in the delivery note attached.

READ ALSO :  How A Man Kills His Girlfriend In A Hotel Room Over Alleged Gonorrhea Infection

The malicious attachments contain RTF files with an exploit for the CVE-2015-1641 vulnerabiliy

They may also contain archives of different formats containing malicious executable files or macros and OLE objects designed to download malicious executable files.

Kaspersky discovered that the malicious files are intended to steal confidential data and install stealthy remote administration tools on infected systems. .

READ ALSO :  Don’t Wish Your Leaders Dead - Apostle Suleman Speaks on Buhari’s Health

Using Whois services, Kaspersky found that the domains used to host the malware were registered to residents of Nigeria. Once in, the hackers compromise a legitimate email and change the banking account details.

Leave a Reply