You are currently viewing How cybercriminals stole $15 million from an American company

How cybercriminals stole $15 million from an American company

How cybercriminals stole $15 million from an American company

The aggressors didn’t utilize malware, they “just” took email credentials. Experienced cybercriminals stole $15 million from an American company in a painstakingly made fake activity that went on for two months.

According to the BleepingComputer portal, the cyberattack can be confidently called a piece of jewelry. First, the attackers gained access to e-mails about the transfer of funds. And then infiltrated negotiations and redirected payments to fake accounts. At the same time, they managed to hide the fact of theft for a long time. And manage to withdraw the stolen money.

Although Mitiga investigators only examined this specific case, they found evidence. That the list of victims of cybercriminals includes dozens of enterprises, including architectural firms. Financial organizations and law firms.

According to experts, no malicious software was found in the networks of the affected company. But the fact of compromising e-mail credentials was revealed. However, access to an email account was not enough for cybercriminals, since they could lose it at any time. In this regard, cybercriminals created rules for forwarding. Letters in order to receive all incoming letters from the desired mailbox.

ALSO,

Cybercriminals used the Microsoft Office 365 email service to spoof the domains of two parties involved in the transaction. Using Microsoft Office 365 has allowed them to make emails unsuspecting and able to bypass security solutions. In addition, the attackers registered two domains through the domain registrar GoDaddy, very similar to domains belonging to real companies.

For four weeks, the cybercriminals methodically followed the plan, using information gathered from intercepted. Emails from the attacked company’s top management. When it came to discussing the transfer of money, they “wedged in” the conversation from a fake domain. Similar to the domain of one of the parties to the negotiations, and provided fake bank details.

Banks can block money transactions if funds are transferred to the wrong account, and cybercriminals prepared for this in advance. In order to hide the theft, they transferred money to accounts in foreign banks and confused the trail. The cybercriminals also created filtering rules, according to which messages from certain email addresses were sent to a hidden folder. Therefore, the legitimate owners of e-mail boxes have not seen letters discussing the transfer of money. Thus, the attackers “earned” $ 15 million in two weeks.

Henceforth, WE WISH TO ANNOUNCE THAT OUR SERVICES ARE NOT AVAILABLE TO PEOPLE FROM NIGERIA AND INDIA. THESE ARE USELESS TIME WASTERS AND THIEVES TRYING TO BEG OR SCAM US OF OUR PRODUCTS. OUR SERVICES ARE NOT FREE AND PAYMENT IS UPFRONT

A LOT OF FOOLS FROM NIGERIA AND INDIA. on the off chance that YOU DON’T TRUST TO USE OUR SERVICES, DON’T CONTACT US AS WE HAVE NO FREE SERVICE

CONTACT US FOR PURCHASE/INQUIRIES, WE RESPOND ALMOST INSTANTLY 

HI BUYERS, WE ARE A PROFESSIONAL CARDING AND HACKING TEAM. HOVATOOLS HAS BEEN AROUND SINCE THE TIME OF EVO MARKET, ALPHABAY, WALLSTREET MARKET AND MORE. WE REMAIN STRONG AND RELIABLE IN THE INDUSTRY, ALWAYS PROVIDING YOU WITH THE BEST QUALITY TOOLS TO HELP YOU MAKE MONEY AND MAXIMIZE PROFIT IN THE FRAUD GAME.

TO GET STARTED, YOU CAN VISIT OUR ONLINE SHOP/STORE TO BUY EVERYTHING YOU NEED TO START CASHING OUT.  AT THE SHOP YOU GET Accounts & Bank Drops CVV & CARDS DUMPS PERSONAL INFORMATION & SCAN.

BANK HACKING SOFTWARE – WIRE/ACH DARKWEB MONEY TRANSFER HACKERS

Buy Fresh Credit Cards for Carding, BIN LIST Buy Bank Login, RDP, Buy Hacked Paypal accounts. Contact us to buy all tools and carding software. CLICK HERE TO VISIT OUR SHOP
Buy Socks 5, Email Leads, Buy Latest CC to Bitcoin Cashout Guide, Buy Hacked Zelle transfer, Western Union Money Transfer Hack, Buy Hacked Money Transfer service to your bank account.
Enroll for Paid private Carding Class.

Admin

The enigmatic hacking blogger who unravels the digital mysteries through his captivating blog. With relentless curiosity and a nimble touch on the keyboard, I explore the intricate web of cyberspace, exposing vulnerabilities and advocating for responsible digital citizenship. My poetic and insightful articles paint vivid pictures of the ethical dilemmas surrounding privacy, encryption, and the convergence of technology and humanity. Join me on an exhilarating journey through the labyrinth of hacking and cybersecurity as he empowers readers to become guardians of their online identities.

Leave a Reply