BforeAI has revealed that its researchers observed a recent surge in phishing attacks leveraging alleged communications from the Dubai Police, an integral part of the Dubai government and a frequent target of cybercriminals.
The campaign is primarily being relayed via SMS texts, and URLs redirect users to a malicious domain. BforeAI analyzed 268 domains based on keyword matches from September 17 through November 22 to uncover specific patterns and trends involving the mention of Dubai Police.
Most domains originated from servers based in Singapore and have a history of malicious activity, including spam, phishing, and botnets. Over two dozen of these domains have already expired, with some registered as recently as November, indicating short-lived campaigns.
Two of the registrants were found to be from India and Dubai itself, and their suspicious names suggested that they originated from a legitimate company. In other cases, the threat actors have managed to keep their identities anonymous.
You can read the full research here.
Like this:
Like Loading...
Related
This entry was posted on December 12, 2024 at 8:05 am and is filed under Commentary with tags BforeAI. You can follow any responses to this entry through the RSS 2.0 feed.
You can leave a response, or trackback from your own site.
New Dubai Police Scam Alert Reveals Recent Surge in Phishing Attacks Targeting An Integral Part of Government
BforeAI has revealed that its researchers observed a recent surge in phishing attacks leveraging alleged communications from the Dubai Police, an integral part of the Dubai government and a frequent target of cybercriminals.
The campaign is primarily being relayed via SMS texts, and URLs redirect users to a malicious domain. BforeAI analyzed 268 domains based on keyword matches from September 17 through November 22 to uncover specific patterns and trends involving the mention of Dubai Police.
Most domains originated from servers based in Singapore and have a history of malicious activity, including spam, phishing, and botnets. Over two dozen of these domains have already expired, with some registered as recently as November, indicating short-lived campaigns.
Two of the registrants were found to be from India and Dubai itself, and their suspicious names suggested that they originated from a legitimate company. In other cases, the threat actors have managed to keep their identities anonymous.
You can read the full research here.
Share this:
Like this:
Related
This entry was posted on December 12, 2024 at 8:05 am and is filed under Commentary with tags BforeAI. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.