Cyber Affairs
No Result
View All Result
  • Login
  • Register
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers
Home News

Beware of Ramadan & Eid Fitr Online Scams Steal Financial Data

admin by admin
Mar 25, 2024
in News
0 0
A A
0
FacebookTwitterLinkedIn

As the holy month of Ramadan approaches, bringing a surge in online shopping and charitable giving, cybercriminals are ramping up their efforts to exploit the festive spirit.

A recent study by Security has highlighted an increase in fraudulent activities targeting consumers in the Middle East, particularly in the Kingdom of Saudi Arabia (KSA), where consumer spending has topped $16 billion.

This article delves into the sophisticated tactics these cyber criminals employ and offers advice on staying safe online.

The Rise of Cyber Fraud During Festive Seasons

During Ramadan and Eid Fitr, there’s a notable spike in retail and online transactions. Unfortunately, this increase in activity also attracts cybercriminals looking to exploit the situation.

Document

Free Webinar : Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

:

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

AcuRisQ, which helps you to quantify risk accurately:


Resecurity’s findings indicate that the financial impact of these fraudulent activities ranges between $70 and $100 million, affecting expatriates, residents, and foreign visitors alike.

Sophisticated Scams Targeting Consumers

Cybercriminals are employing increasingly complex methods to defraud individuals.

These include the “Smishing Triad,” a tactic previously identified by Resecurity, which has been used to target consumers not only in the Middle East but also in the U.S., U.K., various European Union countries, and the UAE.

The most common types of fraudulent activities observed include:

  • Gift/charity/donations fraud
  • Employment-based fraud (job scams)
  • Money mules recruitment activity (financial fraud)
  • Fake point of sales (PoS)
  • Impersonation of logistics and postal providers
  • Romance scams/blackmail
  • Phishing/smishing activity
  • Loan/investment fraud
  • Cryptocurrency scams
Fraudulent activities (source: Resecurity)
Fraudulent activities (source: Resecurity)

Impersonation of Trusted Logistics Providers

A rising trend in scams involves bogus notifications from reputable shipping companies like Aramex, SMSA Express, and Zajil Express.

Example of a fraudulent website impersonating Zajil Express
Example of a fraudulent website impersonating Zajil Express

These messages falsely claim that a parcel delivery is pending due to unpaid fees, urging recipients to make immediate payments.

This method tricks individuals into believing they owe money for a delivery, prompting a quick response.

Abuse of SADAD and MUSANED Platforms

Cybercriminals have also targeted the SADAD and MUSANED platforms, creating fake websites to intercept two-factor authentication (2FA) or one-time passcode (OTP) codes.

This sophisticated phishing approach aims to bypass security measures and gain unauthorized access to victims’ accounts.

  • Original SADAD website: https://www.sadad.com/
  • Phishing SADAD website: https://sadad14c.softr.app/
  • Original Musaned website: https://musaned.com.sa/home
  • Phishing Musaned website: https://musaned2comsa3.softr.app/

Money Mules Recruitment Via Ajeer and Rental Scams Via Ejar Platform

Fraudsters are exploiting platforms like Ajeer and Ejar to offer non-existing jobs and properties, respectively.

These scams not only aim to profit from illicit activity but also to exploit workers and renters illegally.

  • Original Ajeer website: https://ajeer.qiwa.sa/
  • Phishing Ajeer website: https://sites.google.com/view/iger-1
  • Original Ejar website: https://www.ejar.sa/
  • Phishing Ejar website: https://ejar-sa-ar.netlify.app

With over 320 fraudulent sites and platforms blocked by Resecurity in the Middle East, it’s clear that cybercriminals are aggressively exploiting trusted platforms to deceive internet users.

Consumers are strongly advised to refrain from sharing personal and payment information on questionable sites or with individuals posing as bank or government employees.

Reporting suspicious resources to local law enforcement and designated contacts in these organizations is crucial in helping to prevent potential fraud risks.

As we navigate the festive season, staying informed and vigilant is our best defense against these sophisticated online scams.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.



Read the full article here

ShareTweetSharePinShareShareSend

Related Articles

Understanding the Implications & Guarding Privacy- Axios Security Group
News

Understanding the Implications & Guarding Privacy- Axios Security Group

Hackers Actively Using Pupy RAT to Attack Linux Systems
News

Hackers Actively Using Pupy RAT to Attack Linux Systems

Buckle Up_ BEC and VEC Attacks Target Automotive Industry
News

Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Chinese Chipmaker Nexperia: Gigabytes of Data Stolen
News

Chinese Chipmaker Nexperia: Gigabytes of Data Stolen

Popular VPN Software Flaw Let Attackers Crash the Systems
News

Popular VPN Software Flaw Let Attackers Crash the Systems

Hackers Customize LockBit 3.0 Ransomware To Attack Orgs Worldwide
News

Hackers Customize LockBit 3.0 Ransomware To Attack Orgs Worldwide

What Security Leaders Need to Know
News

What Security Leaders Need to Know

Iran launched a Cyberattack Against Critical Infrastructure in Israel
News

Iran launched a Cyberattack Against Critical Infrastructure in Israel

PuTTY Client Vulnerability Lets Attackers Recover Private Keys
News

PuTTY Client Vulnerability Lets Attackers Recover Private Keys

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended Stories

PoC Released For Critical Zero-Click Windows Vulnerability

PoC Released For Critical Zero-Click Windows Vulnerability

Developer Of Hive RAT Arrested By Authorities

Developer Of Hive RAT Arrested By Authorities

DuckDuckGo Launches Privacy Pro : 3-In-1 Service With VPN

DuckDuckGo Launches Privacy Pro : 3-In-1 Service With VPN

Palo Alto Networks PAN-OS Zero-day Under Active Attack

Palo Alto Networks PAN-OS Zero-day Under Active Attack

Match Systems publishes report on the consequences of CBDC implementation

Match Systems publishes report on the consequences of CBDC implementation

The most important cyber news and events of the day

Be the first to know latest important news & events directly to your inbox.

By signing up, I agree to our TOS and Privacy Policy.

Popular Stories

  • Fortinet Vulnerability Exploited To Deploy RMM Tools & Backdoor

    Fortinet Vulnerability Exploited To Deploy RMM Tools & Backdoor

    0 shares
    Share 0 Tweet 0
  • Malware Trends 2024 – Top Malware Families and Types

    0 shares
    Share 0 Tweet 0
  • French Football Club Ticketing System Targeted in Cyber Attack

    0 shares
    Share 0 Tweet 0
  • Singha Durbar server continues to face cyberattacks

    0 shares
    Share 0 Tweet 0
  • Argentina – Global Investigations Review

    0 shares
    Share 0 Tweet 0
Cyber Affairs

Cyber Affairs is your one-stop news website for the latest cyber crime, cyber warfare, and all cyber related news and updates, follow us to get the news that matters to you.

LEARN MORE »

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

The most important cyber news and events of the day

Be the first to know latest important news & events directly to your inbox.

By signing up, I agree to our TOS and Privacy Policy.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.