Connect with us

Cyber Security

Wonka Scams: The Golden Ticket You Don’t Want to Open

Published

on

With the worldwide premiere of the new movie about Willy Wonka taking place this December, Kaspersky’s experts have uncovered cybercriminals using the popularity and buzz around the film to distribute online phishing scams. Preying on unsuspecting movie buffs, instead of sweet delights, Wonka fans are being tricked into handing over their sensitive personal data and money.

Offering free streaming of the timeless movie story ahead of the worldwide general release, scammers are using the survey site SurveyMonkey to lure fans of the mystical chocolatier with an offer to watch Wonka. A few moments after clicking on the link to the fake site, rather than seeing a world of pure imagination and a film that has not yet been released, users are greeted with what appears to be a harmless request to register to watch the full film.

The site directs unsuspecting fans to a pop-up screen, supposedly to create an account, asking for a bank card and personal identification number, as well as details like name, address, phone number, and other sensitive data. This is a red flag that enables the unauthorized creation of difficult-to-cancel debits from the users’ accounts.

In addition to the financial risks of sending their money and private data directly to fraudsters, unsuspecting Wonka fans also face the prospect of their stolen information potentially being sold on the Dark Web.

“Like the bad guys in Wonka, sinister scammers have wasted no time in exploiting people’s passion for Willy Wonka’s fairytale magical world for their sinister motives. To ensure this make-believe world stays just that, it’s important that people remain alert follow basic online safety rules and don’t overlook risks. We’re urging chocolate film fans to practice safe online habits so they can enjoy Wonka and other movie premiers whilst protecting themselves and their privacy from cyber criminals,” comments Egor Bubnov, Senior Web Content Analyst at Kaspersky.

To stay safe while enjoying the excitement surrounding movie premieres, Kaspersky experts recommend:

  1. Be cautious of phishing scams: Beware of suspicious emails, messages, or websites offering exclusive deals or freebies. Double-check the authenticity of the source before sharing any personal information or making online transactions.
  2. Verify website security: When purchasing merchandise or accessing related content online, ensure that the website has a secure connection. Look for “https://” in the URL and a padlock symbol in the address bar to indicate a secure website.
  3. Use security solutions: Use a reliable security solution that identifies malicious attachments and blocks phishing sites.
  4. Be mindful of sharing personal information: Be careful when providing personal information online, especially sensitive details like your address, phone number, or financial information. Only share this type of information on trusted and secure platforms.
  5. Trust reliable sources: Rely on official websites, authorized retailers, and reputable sources for purchasing merchandise, accessing movie content, or obtaining information related to the premiere. Avoid unofficial or suspicious sources that may try to exploit your enthusiasm.
Continue Reading

Cyber Security

ESET Research Uncovers Iran-Aligned BladedFeline Spying on Iraqi, Kurdish Officials

Published

on

The Iran-aligned threat group BladedFeline has targeted Kurdish and Iraqi government officials in a recent cyber-espionage campaign, according to ESET researchers. The group deployed a range of malicious tools discovered within the compromised systems, indicating a continued effort to maintain and expand access to high-ranking officials and government organizations in Iraq and the Kurdish region. The latest campaign highlights BladedFeline’s evolving capabilities, featuring two tunneling tools (Laret and Pinar), various supplementary tools, and, most notably, a custom backdoor Whisper and a malicious Internet Information Services (IIS) module PrimeCache, both identified and named by ESET.

Whisper logs into a compromised webmail account on a Microsoft Exchange server and uses it to communicate with the attackers via email attachments. PrimeCache also serves as a backdoor: it is a malicious IIS module. PrimeCache also bears similarities to the RDAT backdoor used by OilRig Advanced Persistent Threat (APT) group.

Based on these code similarities, as well as on further evidence presented in this blogpost, ESET assesses that BladedFeline is a very likely subgroup of OilRig, an Iran-aligned APT group going after governments and businesses in the Middle East. The initial implants in the latest campaign can be traced back to OilRig. These tools reflect the group’s strategic focus on persistence and stealth within targeted networks.

BladedFeline has consistently worked to maintain illicit access to Kurdish diplomatic officials, while simultaneously exploiting a regional telecommunications provider in Uzbekistan, and developing and maintaining access to officials in the government of Iraq.

ESET Research assesses that BladedFeline is targeting the Kurdish and Iraqi governments for cyberespionage purposes, with an eye toward maintaining strategic access to the computers of high-ranking officials in both governmental entities. The Kurdish diplomatic relationship with Western nations, coupled with the oil reserves in the Kurdistan region, makes it an enticing target for Iran-aligned threat actors to spy on and potentially manipulate. In Iraq, these threat actors are most probably trying to counter the influence of Western governments following the US invasion and occupation of the country.

In 2023, ESET Research discovered that BladedFeline targeted Kurdish diplomatic officials with the Shahmaran backdoor, and previously reported on its activities in ESET APT Activity reports. The group has been active since at least 2017, when it compromised officials within the Kurdistan Regional Government, but is not the only subgroup of OilRig that ESET Research is monitoring. ESET has been tracking Lyceum, also known as HEXANE or Storm-0133, as another OilRig subgroup. Lyceum focuses on targeting various Israeli organizations, including governmental and local governmental entities and organizations in healthcare.

ESET expects that BladedFeline will persist with implant development in order to maintain and expand access within its compromised victim set for cyberespionage.

Continue Reading

Cloud

SentinelOne Simplifies Secure Cloud Migrations on AWS

Published

on

SentinelOne today announced its participation in the Amazon Web Services (AWS) Independent Software Vendor (ISV) Workload Migration Program. This initiative supports AWS Partner Network (APN) members with SaaS offerings on AWS to accelerate and streamline workload migrations.

Through the program, SentinelOne will provide AWS customers with accelerated, secure cloud migration support, leveraging modern AI-powered CNAPP capabilities to ensure rapid and protected transitions. With access to AWS funding, technical resources, and go-to-market support, SentinelOne will help organizations reduce migration timelines and costs while maintaining robust security.

SentinelOne’s Singularity Cloud Security delivers real-time visibility and protection throughout the migration journey—whether from on-premises or another cloud—enabling a secure, seamless transition to AWS.

“Through our participation in the AWS ISV Workload Migration Program, SentinelOne is helping customers accelerate secure cloud migrations with end-to-end protection and visibility,” said Ric Smith, President of Product, Technology, and Operations at SentinelOne. “Whether moving from on-prem or another cloud to AWS, organizations can count on us to deliver the security they need throughout their journey—realizing the performance, speed, agility, and cost benefits of the cloud.”

Singularity Cloud Security combines agentless and agent-based protection for deep visibility, continuous posture management, and real-time threat detection across hybrid and multi-cloud environments. By collaborating with AWS and ecosystem partners, SentinelOne ensures seamless integration into migration projects, helping customers move faster, reduce risk, and scale confidently in the cloud.

Availability: SentinelOne’s solutions are available globally.

Continue Reading

Cyber Security

Beyond Blocklists: How Behavioural Intent Analysis Can Safeguard Middle East Businesses from Rising AI-Driven Bot Threats

Published

on

The Middle East is facing an unprecedented surge in AI-driven bot attacks, with malicious automation now outpacing traditional defenses. Mohammad Ismail, Vice President for EMEA at Cequence Security, warns that legacy tools like IP blocklists and rate limiting are no match for today’s sophisticated threats (more…)

Continue Reading
Advertisement

Follow Us

Trending

Copyright © 2021 Security Review Magazine. Rysha Media LLC. All Rights Reserved.