By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Security Parrot - Cyber Security News, Insights and ReviewsSecurity Parrot - Cyber Security News, Insights and Reviews
Notification
Latest News
OpenAI may use Associated Press archive for AI training
July 14, 2023
EU users can hold conversations with Google Bard from training set
July 14, 2023
Aptos, the new default font for Microsoft Office
July 14, 2023
BlackLotus UEFI bootkit sources published on GitHub
July 14, 2023
Hackers from the XDSpy cyber-espionage group attacked Russian organizations on behalf of the Ministry of Emergency Situations
July 14, 2023
Aa
  • News
  • Tutorials
  • Security InsiderComing Soon
  • Expert InsightComing Soon
Reading: Hackers steal millions of dollars by spoofing thousands of mobile devices
Share
Security Parrot - Cyber Security News, Insights and ReviewsSecurity Parrot - Cyber Security News, Insights and Reviews
Aa
Search
  • News
  • Tutorials
  • Security InsiderComing Soon
  • Expert InsightComing Soon
Follow US
Security Parrot - Cyber Security News, Insights and Reviews > News > Hackers steal millions of dollars by spoofing thousands of mobile devices
spoofing
News

Hackers steal millions of dollars by spoofing thousands of mobile devices

Last updated: 2020/12/17 at 5:33 PM
Jim Koohyar Biniyaz Published December 17, 2020
Share
spoofing
SHARE

A group of cybercriminals have used mobile emulators to simulate thousands of mobile devices, allowing them to steal millions of dollars in a matter of days.

According to experts from IBM Security Trusteer, as part of a mobile banking scam targeting financial institutions in Europe and the United States, criminals used about 20 emulators to simulate more than 16,000 mobile devices and access hacked accounts. Mobile device IDs were used to mimic the phones of the account holders, but in some cases attackers set new IDs to make it appear as if the user was accessing the account from a new device. They also used credentials stolen from infected systems or through phishing attacks.

The attackers allegedly automated the valuation of accounts and the initiation of fraudulent money transactions, and tried to transfer small amounts so that their actions did not entail further verification by the bank.

“Once an attack has been carried out, attackers terminate the operation, erase their traces and prepare for the next attack,” the researchers explain.

Criminals could attack any financial application, even those that use codes sent in SMS messages or e-mail to confirm transactions.

The attackers also created specialized applications that mimic legitimate versions of targets and analyzed how programs react to connections from their fake devices.

“It is likely that behind this operation is an organized group with access to qualified technical developers of mobile malware and experts in the field of fraud and money laundering. Such characteristics are typical for such criminals as the operators of TrickBot or the Evil Corp, ”the experts noted.

Weekly Updates For Our Loyal Readers!

Jim Koohyar Biniyaz December 17, 2020
Share this Article
Facebook Twitter Email Copy Link Print

Archives

  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • February 2023
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020

You Might Also Like

News

OpenAI may use Associated Press archive for AI training

July 14, 2023
News

EU users can hold conversations with Google Bard from training set

July 14, 2023
News

Aptos, the new default font for Microsoft Office

July 14, 2023
News

BlackLotus UEFI bootkit sources published on GitHub

July 14, 2023

© 2022 Parrot Media Network. All Rights Reserved.

  • Home
  • Parrot Media Group
  • Privacy Policy
  • Terms and Conditions
Join Us!

Subscribe to our newsletter and never miss our latest news, podcasts etc..

Zero spam, Unsubscribe at any time.

Removed from reading list

Undo
Go to mobile version
Welcome Back!

Sign in to your account

Lost your password?