• Gone Phishing
  • Posts
  • "Pig Butchering" Scams: U.S. Seizes $9 Million in Cybercrime Proceeds! ๐Ÿ’ป

"Pig Butchering" Scams: U.S. Seizes $9 Million in Cybercrime Proceeds! ๐Ÿ’ป

Gone Phishing Banner

Welcome to Gone Phishing, your daily cybersecurity newsletter that wishes you a merry #BlackFriday2023. Happy looting! ๐Ÿ™ˆ๐Ÿ’€๐Ÿ˜‚ Kidding, kidding! 

Itโ€™s Friday, folks, which can only mean one thingโ€ฆ Itโ€™s time for our weekly segment! 

It goes by many names. Patch of the Week, Tweak of the week. Okay, thatโ€™s it. 

Congrats, the cybercriminals are no matchโ€ฆ for your patch! ๐Ÿฉน๐Ÿฉน๐Ÿฉน 

Check out these freshly hatched patches ๐Ÿฃ๐Ÿฃ๐Ÿฃ

CISA: That's all folks! ๐Ÿ˜ 

๐Ÿšจ PATCH NOW: CISA Issues Warning on "Looney Tunables" Linux Vulnerability! ๐Ÿšจ  

CISA has directed all U.S. federal agencies to safeguard their systems against an exploited vulnerability affecting major Linux distributions.  

๐Ÿง Dubbed 'Looney Tunables' (CVE-2023-4911), the flaw stems from a buffer overflow in the GNU C Library's ld.so dynamic loader, impacting popular platforms like Fedora, Ubuntu, and Debian.  

Admins are urged to patch swiftly due to active exploits and online proof-of-concept releases. Qualys emphasises the risk of full root access on these platforms. CISA has added the flaw to its Known Exploited Vulnerabilities Catalog, mandating U.S. agencies to patch by December 12.  

All organisations are advised to prioritise patching! ๐Ÿ”’๐Ÿ›ก๏ธ๐ŸŒ 

Now, on to todayโ€™s hottest cybersecurity stories:  

  • ๐Ÿ‘ฎ American cops recoup $9m from โ€˜pig butcheringโ€™ scammers ๐Ÿท 

  • ๐Ÿ›๏ธ Fidelity National Financial shuts down after cyber-attack ๐Ÿ‘จโ€๐Ÿ’ป 

  • ๐Ÿš N. Korean โ€˜Diamond Sleetโ€™ trojanizes CyberLink software ๐Ÿ”—

Hackers: Alright, who squealed to the pigs? About the pigs. ๐Ÿท๐Ÿ˜‚๐Ÿ˜‚ 

๐Ÿ’ฐ "Pig Butchering" Scams: U.S. Seizes $9 Million in Cybercrime Proceeds! ๐Ÿ’ป 

In a significant crackdown, the U.S. has seized nearly $9 million derived from widespread "pig butchering" scams that targeted over 70 victims nationwide. ๐Ÿš” These scams, involving romance and fake crypto investments, lure victims into depositing money, which is then stolen. 

๐Ÿท How It Works ๐Ÿท 

The cybercriminals, operating as an organised group, created fake investment firms and crypto exchanges, convincing investors to deposit funds. The term "pig butchering" refers to fattening victims' accounts before extracting as much as possible. 

๐Ÿ’ธ Laundering Techniques ๐Ÿ’ธ 

To launder the stolen proceeds, the criminals employed chain hopping methods, complicating investigators' roles. They frequently switched cryptocurrency tokens and used "privacy coins" like Monero and Z-cash, making tracking more challenging than traditional tokens like Bitcoin and Ethereum. 

๐Ÿ•ต๏ธโ€โ™‚๏ธ Law Enforcement Actions ๐Ÿ•ต๏ธโ€โ™‚๏ธ 

Although no arrests or specific cybercriminal names were disclosed, the U.S. Secret Service San Francisco Field Office connected the laundering efforts to wallet addresses linked to the criminal organisation. The seizure was made possible through the collaboration of the Secret Service and the Justice Department. 

๐ŸŒ Evolution of Crypto Laundering ๐ŸŒ 

Analysts noted the shift from traditional methods like mixers and tumblers to emerging techniques such as coin swaps and cross-chain bridges. These methods provide decentralised and privacy-focused means for exchanging coins, both for legitimate purposes and money laundering. 

โš–๏ธ Ongoing Investigation โš–๏ธ 

The Justice Department's Computer Crime Division, the National Cryptocurrency Enforcement Team, and assistant U.S. attorneys are actively handling the case in the Northern District of California. 

๐Ÿ”„ Asset Transfer ๐Ÿ”„ 

The seized proceeds were returned in the form of the U.S. dollar-tied stablecoin Tether, with the Justice Department acknowledging Tether's role in facilitating the asset transfer. 

๐Ÿšจ Combating Cyber-Enabled Financial Fraud ๐Ÿšจ 

The U.S. Secret Service emphasised its commitment to protecting the financial infrastructure, thanking the Justice Department for collaboration in this case. 

๐Ÿ’Œ Stay Informed ๐Ÿ’Œ 

As law enforcement continues to target cybercriminals, it's crucial to stay vigilant against evolving scams. Report any suspicious activity to cybercrime reporting portals. ๐Ÿ’”๐Ÿ“‰ ๐ŸŒ 

Cybersecurity is more important than ever, and your Mac or PC are no exception. Over time, your Mac or PC can accumulate junk files, malware, and other threats that can slow it down and make it vulnerable to attack.

That's where MacPaw comes in. MacPaw offers a suite of easy-to-use apps that can help you clean, optimize, and secure your Mac. With MacPaw, you can:

  • Remove junk files and malware to free up space and improve performance

  • Protect your privacy by erasing sensitive data

  • Optimize your startup settings to speed up boot times

  • Manage your extensions and apps to keep your Mac or PC running smoothly

Since 2008 MacPaw is trusted by over 30 million users worldwide, and it's the perfect solution for keeping your Mac or PC safe and secure.

Hackers: TIme for a littleโ€ฆ Infidelity mwahahaha ๐Ÿ’€๐Ÿ˜ˆ๐Ÿ˜ฌ 

๐Ÿšจ FNF Cybersecurity Incident Update! ๐Ÿšจ  

Fortune 500 company Fidelity National Financial (FNF), a major player in title insurance and settlement services, reported a cybersecurity incident impacting certain systems. ๐Ÿ ๐Ÿ”’  

โ˜ ๏ธ DefCon 1 โ˜ ๏ธ 

The company launched an investigation, enlisted experts, alerted law enforcement, and implemented measures to assess and contain the breach. As part of containment, access to some systems was blocked, causing disruptions in services related to title insurance, escrow, and mortgage transactions. ๐Ÿ›‘๐Ÿ˜Ÿ  

โ›“๏ธ Breaking The Chain โ›“๏ธ 

FNF disclosed that an unauthorised third party accessed systems and acquired credentials, with the investigation ongoing. Real Estate News noted that the breach halted scheduled closings, leaving agents and homebuyers in a scramble. ๐Ÿก๐Ÿ’ป  

FNF has not commented on the situation. If you have info on the breach, contact Gone Phishing securely. Stay tuned for updates as the investigation unfolds. ๐Ÿ•ต๏ธโ€โ™‚๏ธ๐Ÿ”๐ŸŒ 

๐ŸŽฃ Catch of the Day!! ๐ŸŒŠ๐ŸŸ๐Ÿฆž

Our new segment where we pick out some cool sites we like, reply to the mail and let us know what you think.

๐Ÿƒ The Motley Fool: โ€œFool me once, shame on โ€” shame on you. Fool me โ€” you can't get fooled again.โ€ Good olโ€™ George Dubya ๐Ÿ˜‚ Let us tell whoโ€™s not fooling around though; thatโ€™s the Crรผe ๐Ÿ‘€ at Motley Fool. Youโ€™d be a fool (alright, enough already! ๐Ÿ™ˆ) not to check out their Share Tips from time to time so your savings can one day emerge from their cocoon as a beautiful butterfly! ๐Ÿ› Kidding aside, if you check out their website theyโ€™ve actually got a ton of great content with a wide variety of different investment ideas to suit most budgets ๐Ÿค‘ (LINK)

๐Ÿšต Wander: Find your happy place. Cue Happy Gilmore flashback ๐ŸŒ๏ธโ›ณ๐ŸŒˆ๐Ÿ•Š๏ธ Mmmm Happy Placeโ€ฆ ๐Ÿ˜‡ So, weโ€™ve noticed a lot of you guys are interested in travel. As are we! We stumbled upon this cool company that offers a range of breath-taking spots around the United States and, honestly, the website alone is worth a gander. When all you see about the Land of the free and the home of the brave is news of rioting, looting and school shootings, itโ€™s easy to forget how beautiful some parts of it are. The awe-inspiring locations along with the innovative architecture of the hotels sets Wander apart from your run of the mill American getaway ๐Ÿž๏ธ๐Ÿ˜ (LINK)

๐ŸŒŠ Digital Ocean: If you build it they will come. Nope, weโ€™re not talking about a baseball field for ghosts โšพ๐Ÿ‘ป๐Ÿฟ (Great movie, to be fair ๐Ÿ™ˆ). This is the Digital Ocean whoโ€™ve got a really cool platform for building and hosting pretty much anything you can think of. If you check out their website youโ€™ll find yourself catching the buzz even if you canโ€™t code (guilty ๐Ÿ˜‘). But if you can and youโ€™re looking for somewhere to test things out or launch something new or simply enhance what youโ€™ve got, weโ€™d recommend checking out their services foโ€™ sho ๐Ÿ˜‰ And how can you not love their slogan: Dream it. Build it. Grow it. Right on, brother! ๐ŸŒฟ (LINK)

Diamond in the Sleet ๐Ÿ’Ž๐ŸŒจ๏ธ๐Ÿ‘พ๐Ÿ’ปโ˜ ๏ธ  

๐Ÿ›‘ North Korean Threat Actor Unleashes Trojanized Supply Chain Attack! ๐ŸŒ 

Microsoft's Threat Intelligence team has uncovered a state-sponsored threat, Diamond Sleet, linked to North Korea, orchestrating a supply chain attack.  

The attackers are distributing a trojanized version of a legitimate application by CyberLink, a Taiwanese multimedia software developer. The modified installer includes malicious code that downloads a second-stage payload, impacting over 100 devices across Japan, Taiwan, Canada, and the U.S. 

๐Ÿ” Modus Operandi ๐Ÿ” 

The poisoned file is hosted on CyberLink's update infrastructure, featuring checks to evade security products. The second-stage payload establishes connections with compromised command-and-control servers. Notably, Diamond Sleet has a history of targeting government, defence, telecom, and financial institutions since at least 2013. 

๐Ÿ’ป Tech Tactics ๐Ÿ’ป 

Microsoft observed the use of trojanized open-source and proprietary software by the threat actor. Despite the supply chain attack, no hands-on-keyboard activity was detected on target environments post-installation of the tampered installer, named LambLoad. 

๐Ÿšซ Evading Detection ๐Ÿšซ 

The weaponised downloader inspects for security software and fetches a disguised payload, masquerading as a PNG file. Upon execution, the malware contacts a legitimate-but-compromised domain for additional payloads. 

๐ŸŒ Global Impact ๐ŸŒ 

This revelation follows recent North Korean campaigns revealed by Palo Alto Networks Unit 42. Microsoft previously tied Diamond Sleet to the exploitation of a critical security flaw in JetBrains TeamCity. Stay vigilant, update security measures, and monitor for any unusual activity. ๐Ÿ›ก๏ธ  

Have a good weekend yโ€™all, and of course, Happy Holidays to our American readers! ๐Ÿฝ๏ธ๐Ÿฆƒ๐Ÿ‘๐ŸŒฝ๐ŸŒฐ๐Ÿฅ‚๐Ÿป And do yourselves a favour and donโ€™t bother with the Black Friday sales and stay in with your families instead ๐Ÿ˜‚ Just a suggestion, mind โค๏ธ  

๐Ÿ—ž๏ธ Extra, Extra! Read all about it! ๐Ÿ—ž๏ธ

Every few weeks, we carefully select three hot newsletters to show you. Reputation is everything, so any links we share come from personal recommendation or carefully researched businesses at the time of posting. Enjoy!

  • The GeekAI: A daily 3 min newsletter on what matters in AI, with all the new AI things coming to market its good to stay ahead of the curve.

  • Libby Copa: The Rebel Newsletter helps writers strengthen their writing and creative practice, navigate the publishing world, and turn their art into an act of rebellion.

  • Techspresso: Receive a daily summary of the most important AI and Tech news, selected from 50+ media outlets (The Verge, Wired, Tech Crunch etc)

Let us know what you think.

So long and thanks for reading all the phish!

Give us a rating?

Login or Subscribe to participate in polls.

footer graphic cyber security newsletter