Cyber Affairs
No Result
View All Result
  • Login
  • Register
[gtranslate]
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
Social icon element need JNews Essential plugin to be activated.
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Beware Of New Money Laundering Attack Targeting UPI Users

admin by admin
Mar 7, 2024
in News
A A
0

Threat actors target UPI users as UPI offers a convenient platform for transferring money, often with less severe security than traditional banking systems. 

Due to fewer security measures, threat actors exploit user behavior and transaction process vulnerabilities to commit fraud, steal sensitive information, and carry out financial scams.

Cybersecurity researchers at CloudSEK recently discovered that the widespread use and relatively lower security measures of UPI attract threat actors to perform money laundering attacks to target UPI users. 

Successful exploitation allows threat actors to illicitly transfer funds, leveraging UPI transactions’ anonymity and ease of use.

UPI Money Laundering Alert

A money mule is crucial in facilitating financial crimes, like cyber fraud or money laundering, by receiving and transferring funds obtained through fraud. 

CloudSEK uncovered a significant loophole in India’s banking system in October 2023. 

Chinese threat actors actively exploited this flaw to run a massive money laundering scheme by utilizing a vast network of compromised “money mule” accounts to channel illicit funds through fraudulent payment channels.

Document

Integrate ANY.RUN in your company for Effective Malware Analysis

Malware analysis can be fast and simple. Just let us show you the way to:

  • Interact with malware safely
  • Set up virtual machine in Linux and all Windows OS versions
  • Work in a team
  • Get detailed reports with maximum data
  • If you want to test all these features now with completely free access to the sandbox: ..

With the help of this illicit method, threat actors ultimately send back the funds to China.

Scam Operations Weaponizing Money Mules (Source – CloudSEK)

CloudSEK’s TI team discovered a network of money mules endangering India’s banking system. This report focuses on a harmful mobile app (APK) used to recruit and control these mules. 

Researchers exposed the APK’s functions and the vulnerabilities it exploits, which also revealed the mechanics of the threat actor’s operation.

XHelper, a sophisticated app crafted by threat actors, efficiently manages money mules and acts as the tech backbone for fake payment gateways in scams like Pig Butchering, Task scams, Loan scams, E-Commerce scams, and Illegal gambling apps.

Xhelper dashboard (Source – CloudSEK)

Besides this, under the guise of “Money Transfer Business,” it’s distributed through websites posing as legitimate businesses.

Threat actors convert Mule-transferred funds into cryptocurrencies, which then pay scammers in USDT after deducting their commission. 

XHelper provides mules with features like earnings tracking and competition ranking and a support system via Telegram accounts bound to the app.

Statistics (Source – CloudSEK)

Threat actors get attracted to the XHelper app, as it offers a user-friendly design, simplifies illegal transactions, and streamlined payout/collection processes.

Working of Xhelper App (Source – CloudSEK)

Money mules input net banking and UPI details in the app, which allows direct fund transfers to their UPI accounts.

Initial steps for Money mules for onboarding on the app (Source – CloudSEK)

Money mules are recruited by “Agents” via Telegram channels. Agents masquerade as businesses needing fund managers, and the recruitment is often done through personal connections.

The app lets new mules start with 2 banks, and leveling up boosts the limits, unlocking more rewards. Agents and mules prefer corporate accounts for higher transaction limits that enable larger sums for illicit activities.

Impact On Banks

Here below, we have mentioned the impact on banks:-

  • Financial Losses
  • Operational Strain
  • Technological Risks
  • Customer Trust
  • Legal and Compliance Issues
  • Transaction Monitoring Costs
  • Resource Allocation
  • International Compliance Challenges

Security Measures

Here below, we have mentioned all the security measures offered by the security researchers:-

  • Enhance Merchant Account Opening Procedures
  • Bolster Netbanking Security Measures
  • Address Victim Information Sharing
  • Leverage External Data for Risk Assessment
  • Integrate Payment Red Flags in Faster Payments
  • Explore Payment Delays for High-Risk Users

With Perimeter81 malware protection, you can block malware, including Trojans, ransomware, spyware, rootkits, worms, and zero-day exploits. All are incredibly harmful and can wreak havoc on your network.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.



Read the full article here

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

[mc4wp_form id=”387″]

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

[mc4wp_form id=”387″]

Social icon element need JNews Essential plugin to be activated.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.