European Banks Targeted in Phishing Scam

Jun 07 2024

.bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
.bh__table_cell { padding: 5px; background-color: #FFFFFF; }
.bh__table_cell p { color: #2D2D2D; font-family: ‘Helvetica’,Arial,sans-serif !important; overflow-wrap: break-word; }
.bh__table_header { padding: 5px; background-color:#F1F1F1; }
.bh__table_header p { color: #2A2A2A; font-family:’Trebuchet MS’,’Lucida Grande’,Tahoma,sans-serif !important; overflow-wrap: break-word; }

Gone Phishing Banner

Welcome to Gone Phishing, your daily cybersecurity newsletter that’s got Rishi praying for StArmageddon πŸ™ƒπŸ™ƒπŸ™ƒ

It’s Friday, folks, which can only mean one thing… It’s time for our weekly segment!

It goes by many names. Patch of the Week, Tweak of the week. Okay, that’s it.

Congrats, the cybercriminals are no match… for your patch! 🩹🩹🩹

See you in Zyxel 😈πŸ”₯πŸ’€

🚨 Urgent Update: Critical Security Flaws in Zyxel NAS Devices πŸ“±

Zyxel has released updates to address critical vulnerabilities in two of its end-of-life (EoL) network-attached storage (NAS) devices. Exploiting three of these flaws could allow unauthenticated attackers to execute OS commands and arbitrary code. πŸ›‘οΈ

Impacted Models πŸ’₯

  • NAS326 (versions V5.21(AAZF.16)C0 and earlier)

  • NAS542 (versions V5.21(ABAG.13)C0 and earlier)

Resolved in βœ”οΈ

  • NAS326: Version V5.21(AAZF.17)C0

  • NAS542: Version V5.21(ABAG.14)C0

Key Vulnerabilities πŸ”‘

  • CVE-2024-29972: Command injection via "remote_help-cgi" allowing OS command execution.

  • CVE-2024-29973: Command injection via 'setCookie' parameter.

  • CVE-2024-29974: Remote code execution via "file_upload-cgi" by uploading a crafted configuration file.

  • CVE-2024-29975: Privilege management flaw in SUID binary enabling local root command execution.

  • CVE-2024-29976: Flaw in 'show_allsessions' command exposing admin session information.

Top Tips πŸ›‘οΈ

Update immediately to the latest firmware versions to ensure your devices are protected. Note that two privilege escalation flaws requiring authentication remain unpatched. No evidence suggests these flaws have been exploited in the wild, but updating ensures optimal protection.

Now, on to today’s hottest cybersecurity news stories:

  • 🎣 Phishing kits bypass MFA to target European banks 🏦

  • 🏑 Work from homers, watch out! Scammers abound! πŸ‘¨β€πŸ’»

  • πŸ‘€ Let’s ChatGPSee about that… plugin flaws galore πŸ”Œ

Hackers: Go Phish, MFAs πŸŽ£πŸ‘€πŸ’€

🚨 Cybercriminals Strike Again! European Banks Targeted 🎯

Cybercriminals are using a new phishing-as-a-service platform called V3B to target European banking clients. Priced between $130 and $450 monthly, this kit enables fraudsters to bypass multi factor authentication (MFA) with ease. Resecurity researchers found V3B has been operational since March 2023, allowing fraudsters to mimic over 50 financial institutions.

πŸ” Advanced Features and Social Engineering

V3B uses social engineering and spoofing to trick victims into revealing sensitive information. It supports real-time interactions, evading MFA through methods like SMS codes, QR Codes, and PhotoTAN, a common second-factor app in Germany and Switzerland. The kit also boasts advanced obfuscation and anti-bot measures, making detection challenging.

πŸ’¬ Promoted by "Vssrtje"

A threat actor named "Vssrtje" promotes V3B on Telegram and dark web communities, with the associated Telegram channel having over 1,255 members. Hundreds of cybercriminals are estimated to use this kit, leading to significant financial losses for European banks.

πŸ’³ Interception of Credit Card Data

V3B isn't limited to banks; it also targets credit card data, recently adding support for International Card Services with Dutch templates. The kit's multi country targeting, encrypted code, and live chat with victims make it a formidable tool for fraudsters.

🌍 European Banks at High Risk

With the European Union’s substantial economy and mature financial system, phishing attacks like these pose a serious threat, causing considerable financial losses. Stay vigilant and secure your banking information!

It’s a Work From Homing missile πŸš€πŸš€πŸš€

🚨 Beware of Fake Work-From-Home Job Scams! 🏑

Scammers are posing as legitimate businesses, like staffing or recruiting agencies, to offer fake work-from-home jobs. These jobs often involve simple tasks, such as rating restaurants or "optimising" services by clicking buttons. The catch? Victims must make cryptocurrency payments to earn more money or unlock tasks, with all payments going straight to the scammers.

πŸ”΄ Red Flags to Watch Out For

  • You’re asked to make cryptocurrency payments to your employer.

  • Job tasks are simple and include terms like "optimization."

  • No references are required during the hiring process.

πŸ›‘οΈ Top Tips

Be wary of unsolicited job offers and avoid clicking on links, downloading files, or opening attachments in these messages.

  • Never send money to an alleged employer.

  • Do not pay for services claiming to recover lost cryptocurrency funds.

  • Avoid sharing financial or personal information with unsolicited job offers.

πŸ“’ Report It!

If you encounter these scams, report them to the FBI IC3 at www.ic3.gov. Include any transaction information related to the scam. For more details, see prior IC3 PSA Alert Number I-082423-PSA.

Stay safe and protect your financial well-being! πŸ’ΌπŸ”’

🎣 Catch of the Day!! 🌊🐟🦞

Stay ahead of the curve with Presspool.ai! πŸš€ Subscribe to their newsletter for the latest buzz in the information technology space, with a special focus on AI. Their slogan says it all: "Actionable marketing insights for the visionary AI executive." πŸ€“πŸ’‘ That’s us, alright! 🀡 How about you? Visionary AI executive, much? πŸ‘€

And if the newsletter gets your motor running then you can take a butchers at their cool AI marketing product too which is sure to help you make the most of our new artificial overlords and put them to work for your business πŸ€–πŸ‘©β€πŸ’»πŸŒ

Rest assured, the process is very straightforward.

You simply:

πŸ†• Sign Up & Create Campaign

πŸ“Š Define your audience, budget, and message to captivate your audience.

πŸš€ Launch your campaign, as Presspool’s AI matches it with ideal newsletter audiences for optimal reach and conversions. 🎯

πŸ•΅οΈ Finally, you leverage real-time analytics to track performance and refine future strategies. πŸ“ˆ Elevate your marketing game and stay informed with Presspool.ai! 🌟 Simples! 🦦

Presspool.aiΒ πŸ“°πŸŠπŸ€– may just have what you need to succeed. And if the product isn’t for you, the newsletter alone is a gamechanger. And we know newsletters πŸ˜‰

Well, that’s ChatGPT πŸ€·β€β™‚οΈπŸ€·β€β™‚οΈπŸ€·β€β™‚οΈ

🚨 Secure Your Enterprise from ChatGPT Plugin Risks! πŸ”Œ

ChatGPT is revolutionising businesses with over a thousand third-party plugins available. While these plugins boost productivity, they also introduce significant security challenges. Here’s what you need to know to stay safe.

⚠️ Top Security Risks with ChatGPT Plugins

Data Privacy & Confidentiality

ChatGPT plugins can expose confidential enterprise information. Ensure sensitive data is protected from unauthorised access by plugin developers or third parties.

Compliance Risks

Using these plugins might breach regulations like GDPR or HIPAA, leading to legal and financial consequences.

Dependency & Reliability

Relying on external plugins for critical operations poses risks, such as service disruptions and unreliable vendor support.

New Security Vulnerabilities

Plugins can introduce new bugs or flaws. For example, a security flaw allowed attackers to intercept and replace approval codes during plugin installation, leading to unauthorised access.

πŸ’‘ Mitigation Strategies

Risk Assessments

Regularly conduct risk assessments and monitor plugins for vulnerabilities. Block risky plugins and keep an updated inventory.

Data Privacy Policies

Ensure plugins comply with your company’s data policies. Exercise data deletion rights for noncompliance.

User Training

Include ChatGPT plugin security in your training programs. Keep sessions brief and impactful to maintain user awareness.

Behavioural Monitoring

Track data usage and access through plugins. Implement policies to identify and control the use of tools like ChatGPT.

Stay Vigilant! πŸ“’

While ChatGPT plugins can enhance your business, they come with security risks that need careful management. Adopt a strategic approach to integrate these tools safely into your workflows.

Stay safe and secure! πŸ’ΌπŸ”’

πŸ—žοΈ Extra, Extra! Read all about it! πŸ—žοΈ

Every few weeks, we carefully select three hot newsletters to show you. Reputation is everything, so any links we share come from personal recommendation or carefully researched businesses at the time of posting. Enjoy!

  • πŸ›‘οΈ Tl;dr sec: Join 30,000+ security professionals getting the best tools, blog posts, talks, and resources right in their inbox for free every Thursday πŸ“…

  • πŸ’΅Β Crypto Pragmatist: Crypto made simple. Actionable alpha in 5 minutes, 3x a week. Join 47,000+ investors and insiders, for πŸ†“

  • πŸ“ˆΒ Bitcoin Breakdown: The best in Bitcoin, carefully curated by an alien from the future πŸ‘Ύ

Let us know what you think.

So long and thanks for reading all the phish!

footer graphic cyber security newsletter

Recent articles