SlideShare a Scribd company logo
Severity:
HIGH
Copyright ©2019 CTM360® www.ctm360.com 1
UNLOCKING NEW DOORWAYS TO MULTI-
CHANNEL SCAMS
BY
SAMEER MOHAMMAD
ADNAN EBRAHIM
Reference: CTM-ADV-0719-01
Date: 7th July 2019
Category: Doorway Page
THREAT TARGETS:
● All levels of Government
● Public & Private Sector
POSSIBLE IMPACTS:
● Compromise of financial credentials &
confidential data
● Compromise of user data
● Financial, Reputational and Data loss
TARGET AUDIENCE FOR CIRCULATION:
● Administrators of internet facing
infrastructure services
● IT security team, Management & Staff
Threat Description
CTM360 has discovered a new wave of financial attacks where cybercriminals use fake ad campaigns/pages to
redirect users to fraudulent websites that have investment schemes, Bitcoin Ponzi schemes, fake survey websites,
and free goods/services, etc. with the intention to steal the victim's bank account and card details. Prominent
organizations, well-known personalities and members from royal families are used to market these bogus
campaigns. Scammers are carrying out such fraudulent activities under the radar without being noticed or blocked
by relevant authorities by pushing these scams mainly through the following two techniques:
1. Doorway Pages
2. Fake Ad Campaigns on Social media platform
Fig. 1: Diagrammatic explanation of the threat scenario
Severity:
HIGH
Copyright ©2019 CTM360® www.ctm360.com 2
Doorway pages
Doorway pages, also called as bridge pages are performing ‘Spamdexing’ on the search engines. This is the art of
having your website optimized or made attractive to the major search engines for optimal indexing.
CTM360 has discovered that 99% of these doorway pages are registered on free domains. Ad campaigns leveraging
free domains on ccTLDs such as .tk, .ga, .gq, .ml, .cf have been on the rise for the last few years. Fraudsters are
bulk registering such domains and using them to generate revenue.
Fig. 1: Doorway
pages using financial brands
2. Fake Ad campaigns on Social Media
Cybercriminals are using social media platforms like Facebook and Instagram to push ads to users globally. Facebook
adverts, which points to fraudulent websites, tend to attract users by using prominent institutions like ministries,
financial institutions, royal members and well-known personalities in the region and include fake quotes about their
earnings and extravagant lifestyle.
Facebook allows advertisers to use what is called ‘dark posts’. These are targeted ads on social media which unlike
boosted and organic posts don’t appear on your timeline and feed of your followers. Dark posts are more formally
known on Facebook as unpublished posts.
They instead show up as sponsored content in the feeds of users who are specifically targeted.
Severity:
HIGH
Copyright ©2019 CTM360® www.ctm360.com 3
Fig. 3: Prominent
personalities in the Middle East used in dark posts.
Dynamic URL redirect
Doorway pages/fake ads created and ingeniously placed by scammers online, redirect victims to a pool of different
landing pages via dynamic URL redirects. This means that when the doorway page is accessed, the users are taken to a
random landing page upon each visit. In some cases, users may also end up on different websites based on their search
preferences.
CTM360 have come across are listed below:
- Free Gift sites which give mobile phones, airline tickets, watches
- Free survey scam
- Free airline ticket
- Adult Websites
- Various Investment schemes like Binary options, Bitcoin, Gold, trading
=
Severity:
HIGH
Copyright ©2019 CTM360® www.ctm360.com 4
Fig 4. Fake Landing Page
Bogus Checkout page
Once a victim’s personal information is collected by the landing page, the user is taken to a bogus checkout page with a
fake payment gateway. The payment gateway collects all the necessary card details including card number, expiry date
and CVV.
Fig 5.
Bogus Payment gateway
Severity:
HIGH
Copyright ©2019 CTM360® www.ctm360.com 5
Conclusion
In summary, the goal of these malicious operations is to attain a victim’s bank card details. The card details
are captured by luring users to fake pages which the gets redirected (not accessible directly via URL) to bogus
payment platforms.
Once a victim’s card details have been collected, the criminals wait for a certain amount of time before any
operations are conducted with the stolen card details. This could be purchases, ATM bulk amount
withdrawals from different geolocations. This is usually carried out like a coordinated operation after enough
victims have been compromised. These operations are usually conducted during off hours, public holidays and
weekends to avoid any unnecessary detections.
While some of these doorway pages are poorly designed and obvious scams, others are sophisticated and
look very to the impersonated brand. Always look at website URL to make sure the site is legitimate before
initiating communications or making any kind of financial transaction.
CTM360's Cyber Blind Spot is actively monitoring these campaigns and other related threats and will continue
to update once further information is available.
Disclaimer
The information contained in this document is meant to provide general guidance and brief information to the intended recipient pertaining to the
incident and recommended action. Therefore, this information is provided "as is" without warranties of any kind, express or implied, including
accuracy, timeliness, and completeness. Consequently, under NO condition shall CTM360®, its related partners, directors, principals, agents or
employees be liable for any direct, indirect, accidental, special, exemplary, punitive, consequential or other damages or claims whatsoever including,
but not limited to: loss of data, loss in profits/business, network disruption…etc., arising out of or in connection with this advisory.
For more information:
Email: monitor@ctm360.com Tel: (+973) 77 360 360

More Related Content

What's hot

Internet fraud #scichallenge2017
Internet fraud #scichallenge2017Internet fraud #scichallenge2017
Internet fraud #scichallenge2017N F
 
Holiday Season Fraud Forecast
Holiday Season Fraud ForecastHoliday Season Fraud Forecast
Holiday Season Fraud ForecastZachary Shaw
 
What are the negative and lasting effects of identity theft
What are the negative and lasting effects of identity theftWhat are the negative and lasting effects of identity theft
What are the negative and lasting effects of identity theftcFirst
 
Phishing website method
Phishing website methodPhishing website method
Phishing website methodarelyf_7
 
Fraud An International Perspective
Fraud   An International PerspectiveFraud   An International Perspective
Fraud An International PerspectiveSteve Mitchinson
 
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfMoney 2Conf
 
Anatomy of and Enterprise Social Media Cyber Attack: Customer Scams
Anatomy of and Enterprise Social Media Cyber Attack: Customer ScamsAnatomy of and Enterprise Social Media Cyber Attack: Customer Scams
Anatomy of and Enterprise Social Media Cyber Attack: Customer ScamsZeroFOX
 
The Phishing Ecosystem
The Phishing EcosystemThe Phishing Ecosystem
The Phishing Ecosystemamiable_indian
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentationmbachnak
 
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-ThreatsThe Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats- Mark - Fullbright
 
10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet Fraud10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet FraudGoose & Gander
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraudRadiant Minds
 
2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS Breach2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS BreachEMC
 

What's hot (19)

Internet fraud #scichallenge2017
Internet fraud #scichallenge2017Internet fraud #scichallenge2017
Internet fraud #scichallenge2017
 
Holiday Season Fraud Forecast
Holiday Season Fraud ForecastHoliday Season Fraud Forecast
Holiday Season Fraud Forecast
 
ELECTRONIC FRAUD TACTICS
ELECTRONIC FRAUD TACTICS ELECTRONIC FRAUD TACTICS
ELECTRONIC FRAUD TACTICS
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
What are the negative and lasting effects of identity theft
What are the negative and lasting effects of identity theftWhat are the negative and lasting effects of identity theft
What are the negative and lasting effects of identity theft
 
Phishing website method
Phishing website methodPhishing website method
Phishing website method
 
Phishing attack till now
Phishing attack till nowPhishing attack till now
Phishing attack till now
 
Fraud An International Perspective
Fraud   An International PerspectiveFraud   An International Perspective
Fraud An International Perspective
 
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2Conf
 
Anatomy of and Enterprise Social Media Cyber Attack: Customer Scams
Anatomy of and Enterprise Social Media Cyber Attack: Customer ScamsAnatomy of and Enterprise Social Media Cyber Attack: Customer Scams
Anatomy of and Enterprise Social Media Cyber Attack: Customer Scams
 
The Phishing Ecosystem
The Phishing EcosystemThe Phishing Ecosystem
The Phishing Ecosystem
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
 
Online Scams and Frauds
Online Scams and FraudsOnline Scams and Frauds
Online Scams and Frauds
 
Phishing
PhishingPhishing
Phishing
 
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-ThreatsThe Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats
 
10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet Fraud10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet Fraud
 
Compilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacksCompilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacks
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
 
2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS Breach2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS Breach
 

Similar to Unlocking New Doorways to Multi-channel Scams

Whitepaper - Fraudsters Love Digital_FINAL
Whitepaper - Fraudsters Love Digital_FINALWhitepaper - Fraudsters Love Digital_FINAL
Whitepaper - Fraudsters Love Digital_FINALDavid Hartley
 
Insurance Application Scam | Money 2.0 Conference’s (Money2Conf) Advice To Av...
Insurance Application Scam | Money 2.0 Conference’s (Money2Conf) Advice To Av...Insurance Application Scam | Money 2.0 Conference’s (Money2Conf) Advice To Av...
Insurance Application Scam | Money 2.0 Conference’s (Money2Conf) Advice To Av...Money 2Conf
 
CRC Alert November 2019 Final.pdf
CRC Alert November 2019 Final.pdfCRC Alert November 2019 Final.pdf
CRC Alert November 2019 Final.pdfssuser7464571
 
Adam Bulava GCC 2019
Adam Bulava GCC 2019Adam Bulava GCC 2019
Adam Bulava GCC 2019ImekDesign
 
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10seadeloitte
 
Product Case Competition.pdf
Product Case Competition.pdfProduct Case Competition.pdf
Product Case Competition.pdfhimanshu102850
 
Article global it systems are now even more vulnerable - paul wright
Article  global it systems are now even more vulnerable - paul wrightArticle  global it systems are now even more vulnerable - paul wright
Article global it systems are now even more vulnerable - paul wrightPaul Wright MSc
 
CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925
CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925
CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925CYVA Research Corporation
 
CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925
CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925
CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925CYVA Research Corporation
 
EMEA_UK_Why Invest in Fraud Management_Brochure
EMEA_UK_Why Invest in Fraud Management_BrochureEMEA_UK_Why Invest in Fraud Management_Brochure
EMEA_UK_Why Invest in Fraud Management_BrochureRYAN ORTON
 
Types of cyber crime
Types of cyber crimeTypes of cyber crime
Types of cyber crimeInshaLakhani
 
Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?tommy2tone44
 
Top Fraud Events & Scandals in The Payment Industry
Top Fraud Events & Scandals in The Payment IndustryTop Fraud Events & Scandals in The Payment Industry
Top Fraud Events & Scandals in The Payment Industryitio Innovex Pvt Ltv
 
Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)
Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)
Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)CR Group
 
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...Elizabeth Dimit
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docxwlynn1
 
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...Internet 2Conf
 

Similar to Unlocking New Doorways to Multi-channel Scams (20)

Whitepaper - Fraudsters Love Digital_FINAL
Whitepaper - Fraudsters Love Digital_FINALWhitepaper - Fraudsters Love Digital_FINAL
Whitepaper - Fraudsters Love Digital_FINAL
 
Insurance Application Scam | Money 2.0 Conference’s (Money2Conf) Advice To Av...
Insurance Application Scam | Money 2.0 Conference’s (Money2Conf) Advice To Av...Insurance Application Scam | Money 2.0 Conference’s (Money2Conf) Advice To Av...
Insurance Application Scam | Money 2.0 Conference’s (Money2Conf) Advice To Av...
 
CRC Alert November 2019 Final.pdf
CRC Alert November 2019 Final.pdfCRC Alert November 2019 Final.pdf
CRC Alert November 2019 Final.pdf
 
Adam Bulava GCC 2019
Adam Bulava GCC 2019Adam Bulava GCC 2019
Adam Bulava GCC 2019
 
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10
 
Product Case Competition.pdf
Product Case Competition.pdfProduct Case Competition.pdf
Product Case Competition.pdf
 
Article global it systems are now even more vulnerable - paul wright
Article  global it systems are now even more vulnerable - paul wrightArticle  global it systems are now even more vulnerable - paul wright
Article global it systems are now even more vulnerable - paul wright
 
CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925
CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925
CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925
 
CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925
CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925
CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925
 
EMEA_UK_Why Invest in Fraud Management_Brochure
EMEA_UK_Why Invest in Fraud Management_BrochureEMEA_UK_Why Invest in Fraud Management_Brochure
EMEA_UK_Why Invest in Fraud Management_Brochure
 
Digital ad fraud is a Major Economic Crime
Digital ad fraud is a Major Economic CrimeDigital ad fraud is a Major Economic Crime
Digital ad fraud is a Major Economic Crime
 
Types of cyber crime
Types of cyber crimeTypes of cyber crime
Types of cyber crime
 
Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?
 
Digital Ad Fraud Is Not Illegal Yet
Digital Ad Fraud Is Not Illegal YetDigital Ad Fraud Is Not Illegal Yet
Digital Ad Fraud Is Not Illegal Yet
 
Top Fraud Events & Scandals in The Payment Industry
Top Fraud Events & Scandals in The Payment IndustryTop Fraud Events & Scandals in The Payment Industry
Top Fraud Events & Scandals in The Payment Industry
 
Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)
Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)
Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)
 
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
 
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...
 
Credit Card Fraud PPT - Reena Prajapati.pptx
Credit Card Fraud PPT - Reena Prajapati.pptxCredit Card Fraud PPT - Reena Prajapati.pptx
Credit Card Fraud PPT - Reena Prajapati.pptx
 

More from CTM360

Secure web conferencing for c level executives
Secure web conferencing for c level executivesSecure web conferencing for c level executives
Secure web conferencing for c level executivesCTM360
 
CTM360 Advisory: Remote Work Guidelines
CTM360 Advisory: Remote Work GuidelinesCTM360 Advisory: Remote Work Guidelines
CTM360 Advisory: Remote Work GuidelinesCTM360
 
Cyber Threat Advisory: Coronavirus Related Scams
Cyber Threat Advisory: Coronavirus Related ScamsCyber Threat Advisory: Coronavirus Related Scams
Cyber Threat Advisory: Coronavirus Related ScamsCTM360
 
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDETWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDECTM360
 
The Spread of Fake News - CTM360 - GI December 2017
The Spread of Fake News - CTM360 - GI December 2017The Spread of Fake News - CTM360 - GI December 2017
The Spread of Fake News - CTM360 - GI December 2017CTM360
 
Cyber Warrior - Business in Gulf 2017
Cyber Warrior - Business in Gulf  2017Cyber Warrior - Business in Gulf  2017
Cyber Warrior - Business in Gulf 2017CTM360
 
NME IT Security Survey 2016
NME IT Security Survey 2016 NME IT Security Survey 2016
NME IT Security Survey 2016 CTM360
 
TRAP10 Cyber Scam Targeting Unaware GCC Residents
TRAP10 Cyber Scam Targeting Unaware GCC Residents TRAP10 Cyber Scam Targeting Unaware GCC Residents
TRAP10 Cyber Scam Targeting Unaware GCC Residents CTM360
 
XSS, LFI & CSRF vulnerabilities
XSS, LFI & CSRF vulnerabilitiesXSS, LFI & CSRF vulnerabilities
XSS, LFI & CSRF vulnerabilitiesCTM360
 
DMARC Implementation across all domains
DMARC Implementation across all domainsDMARC Implementation across all domains
DMARC Implementation across all domainsCTM360
 
CTM360 adv-0317-01 dns messenger
CTM360 adv-0317-01 dns messengerCTM360 adv-0317-01 dns messenger
CTM360 adv-0317-01 dns messengerCTM360
 

More from CTM360 (11)

Secure web conferencing for c level executives
Secure web conferencing for c level executivesSecure web conferencing for c level executives
Secure web conferencing for c level executives
 
CTM360 Advisory: Remote Work Guidelines
CTM360 Advisory: Remote Work GuidelinesCTM360 Advisory: Remote Work Guidelines
CTM360 Advisory: Remote Work Guidelines
 
Cyber Threat Advisory: Coronavirus Related Scams
Cyber Threat Advisory: Coronavirus Related ScamsCyber Threat Advisory: Coronavirus Related Scams
Cyber Threat Advisory: Coronavirus Related Scams
 
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDETWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
 
The Spread of Fake News - CTM360 - GI December 2017
The Spread of Fake News - CTM360 - GI December 2017The Spread of Fake News - CTM360 - GI December 2017
The Spread of Fake News - CTM360 - GI December 2017
 
Cyber Warrior - Business in Gulf 2017
Cyber Warrior - Business in Gulf  2017Cyber Warrior - Business in Gulf  2017
Cyber Warrior - Business in Gulf 2017
 
NME IT Security Survey 2016
NME IT Security Survey 2016 NME IT Security Survey 2016
NME IT Security Survey 2016
 
TRAP10 Cyber Scam Targeting Unaware GCC Residents
TRAP10 Cyber Scam Targeting Unaware GCC Residents TRAP10 Cyber Scam Targeting Unaware GCC Residents
TRAP10 Cyber Scam Targeting Unaware GCC Residents
 
XSS, LFI & CSRF vulnerabilities
XSS, LFI & CSRF vulnerabilitiesXSS, LFI & CSRF vulnerabilities
XSS, LFI & CSRF vulnerabilities
 
DMARC Implementation across all domains
DMARC Implementation across all domainsDMARC Implementation across all domains
DMARC Implementation across all domains
 
CTM360 adv-0317-01 dns messenger
CTM360 adv-0317-01 dns messengerCTM360 adv-0317-01 dns messenger
CTM360 adv-0317-01 dns messenger
 

Recently uploaded

From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...Product School
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekCzechDreamin
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...CzechDreamin
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsExpeed Software
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationZilliz
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCzechDreamin
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...Product School
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀DianaGray10
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...Product School
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxAbida Shariff
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoTAnalytics
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupCatarinaPereira64715
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxJennifer Lim
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2DianaGray10
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1DianaGray10
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaCzechDreamin
 

Recently uploaded (20)

From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 

Unlocking New Doorways to Multi-channel Scams

  • 1. Severity: HIGH Copyright ©2019 CTM360® www.ctm360.com 1 UNLOCKING NEW DOORWAYS TO MULTI- CHANNEL SCAMS BY SAMEER MOHAMMAD ADNAN EBRAHIM Reference: CTM-ADV-0719-01 Date: 7th July 2019 Category: Doorway Page THREAT TARGETS: ● All levels of Government ● Public & Private Sector POSSIBLE IMPACTS: ● Compromise of financial credentials & confidential data ● Compromise of user data ● Financial, Reputational and Data loss TARGET AUDIENCE FOR CIRCULATION: ● Administrators of internet facing infrastructure services ● IT security team, Management & Staff Threat Description CTM360 has discovered a new wave of financial attacks where cybercriminals use fake ad campaigns/pages to redirect users to fraudulent websites that have investment schemes, Bitcoin Ponzi schemes, fake survey websites, and free goods/services, etc. with the intention to steal the victim's bank account and card details. Prominent organizations, well-known personalities and members from royal families are used to market these bogus campaigns. Scammers are carrying out such fraudulent activities under the radar without being noticed or blocked by relevant authorities by pushing these scams mainly through the following two techniques: 1. Doorway Pages 2. Fake Ad Campaigns on Social media platform Fig. 1: Diagrammatic explanation of the threat scenario
  • 2. Severity: HIGH Copyright ©2019 CTM360® www.ctm360.com 2 Doorway pages Doorway pages, also called as bridge pages are performing ‘Spamdexing’ on the search engines. This is the art of having your website optimized or made attractive to the major search engines for optimal indexing. CTM360 has discovered that 99% of these doorway pages are registered on free domains. Ad campaigns leveraging free domains on ccTLDs such as .tk, .ga, .gq, .ml, .cf have been on the rise for the last few years. Fraudsters are bulk registering such domains and using them to generate revenue. Fig. 1: Doorway pages using financial brands 2. Fake Ad campaigns on Social Media Cybercriminals are using social media platforms like Facebook and Instagram to push ads to users globally. Facebook adverts, which points to fraudulent websites, tend to attract users by using prominent institutions like ministries, financial institutions, royal members and well-known personalities in the region and include fake quotes about their earnings and extravagant lifestyle. Facebook allows advertisers to use what is called ‘dark posts’. These are targeted ads on social media which unlike boosted and organic posts don’t appear on your timeline and feed of your followers. Dark posts are more formally known on Facebook as unpublished posts. They instead show up as sponsored content in the feeds of users who are specifically targeted.
  • 3. Severity: HIGH Copyright ©2019 CTM360® www.ctm360.com 3 Fig. 3: Prominent personalities in the Middle East used in dark posts. Dynamic URL redirect Doorway pages/fake ads created and ingeniously placed by scammers online, redirect victims to a pool of different landing pages via dynamic URL redirects. This means that when the doorway page is accessed, the users are taken to a random landing page upon each visit. In some cases, users may also end up on different websites based on their search preferences. CTM360 have come across are listed below: - Free Gift sites which give mobile phones, airline tickets, watches - Free survey scam - Free airline ticket - Adult Websites - Various Investment schemes like Binary options, Bitcoin, Gold, trading =
  • 4. Severity: HIGH Copyright ©2019 CTM360® www.ctm360.com 4 Fig 4. Fake Landing Page Bogus Checkout page Once a victim’s personal information is collected by the landing page, the user is taken to a bogus checkout page with a fake payment gateway. The payment gateway collects all the necessary card details including card number, expiry date and CVV. Fig 5. Bogus Payment gateway
  • 5. Severity: HIGH Copyright ©2019 CTM360® www.ctm360.com 5 Conclusion In summary, the goal of these malicious operations is to attain a victim’s bank card details. The card details are captured by luring users to fake pages which the gets redirected (not accessible directly via URL) to bogus payment platforms. Once a victim’s card details have been collected, the criminals wait for a certain amount of time before any operations are conducted with the stolen card details. This could be purchases, ATM bulk amount withdrawals from different geolocations. This is usually carried out like a coordinated operation after enough victims have been compromised. These operations are usually conducted during off hours, public holidays and weekends to avoid any unnecessary detections. While some of these doorway pages are poorly designed and obvious scams, others are sophisticated and look very to the impersonated brand. Always look at website URL to make sure the site is legitimate before initiating communications or making any kind of financial transaction. CTM360's Cyber Blind Spot is actively monitoring these campaigns and other related threats and will continue to update once further information is available. Disclaimer The information contained in this document is meant to provide general guidance and brief information to the intended recipient pertaining to the incident and recommended action. Therefore, this information is provided "as is" without warranties of any kind, express or implied, including accuracy, timeliness, and completeness. Consequently, under NO condition shall CTM360®, its related partners, directors, principals, agents or employees be liable for any direct, indirect, accidental, special, exemplary, punitive, consequential or other damages or claims whatsoever including, but not limited to: loss of data, loss in profits/business, network disruption…etc., arising out of or in connection with this advisory. For more information: Email: monitor@ctm360.com Tel: (+973) 77 360 360