Cybercriminals target UAE residents, visitors in new info-stealing campaign

Jason Macuray
A group of hackers in recent months has attempted to steal personal and financial information from residents and visitors of the United Arab Emirates in a new text-based phishing campaign, according to new research.

A group of hackers in recent months has attempted to steal personal and financial information from residents and visitors of the United Arab Emirates in a new text-based phishing campaign, according to new research.

The cybercriminals — called the Smishing Triad gang — sent malicious text messages purportedly from UAE authorities, luring victims into providing data such as home addresses, phone numbers, and credit card information.

The messages, targeting both Apple iOS and Google Android mobile devices, contained a link to a fake website that looked almost identical to the one of the UAE state agency responsible for residency and foreign affairs, according to researchers at Resecurity.

Before launching the attacks, the hackers likely obtained information about UAE residents and foreigners living in or visiting the country through third-party data breaches, business email compromises or databases purchased on the dark web, researchers said.

Some of their victims included people who had recently updated their residence visas and could be more prone to respond to fake “information requests,” according to the report.

The hackers even added a message on the malicious website, cautioning those redirected to it that some of their personal data “is missing” from the state registry. If not provided, these individuals would be “restricted from leaving the UAE” and fined almost $14,000.

To make their targeting more precise, the hackers used geolocation filters. This ensured that the phishing website would only appear when accessed from UAE IP addresses and mobile devices.

In their previous campaigns, Smishing Triad hackers posed as U.S., U.K., and European postal providers. The criminals sent malicious links to victims through SMS or iMessage, and used URL-shortening services like bit.ly to randomize the links.

The researchers didn’t attribute this campaign to a specific country but said that one of the hackers’ critical domain names was registered via a China-based organization. Resecurity said it notified UAE law enforcement and cybersecurity agencies about the campaign.

Just last week, the UAE was targeted by a different kind of attack coming from politically motivated hackers. They replaced the original TV broadcast with graphic footage from the war between Israel and Hamas.

BriefsCybercrime
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk
is a freelance reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post

Ukraine’s partners launch Tallinn Mechanism to amplify cyber support

Next Post

Nearly 3 million affected by ransomware attack on medical software firm

Related Posts

State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage

A new malware campaign leveraged two zero-day flaws in Cisco networking gear to deliver custom malware and facilitate covert data collection on target environments. Cisco Talos, which dubbed the activity ArcaneDoor, attributing it as the handiwork of a previously undocumented sophisticated state-sponsored actor it tracks under the name UAT4356 (aka Storm-1849 by Microsoft). "
Avatar
Read More

New Guide: How to Scale Your vCISO Services Profitably

Cybersecurity and compliance guidance are in high demand among SMEs. However, many of them cannot afford to hire a full-time CISO. A vCISO can answer this need by offering on-demand access to top-tier cybersecurity expertise. This is also an opportunity for MSPs and MSSPs to grow their business and bottom line. MSPs and MSSPs that expand their offerings and provide vCISO services
Avatar
Read More