- Gone Phishing
- Posts
- "Pig Butchering" Scams: U.S. Seizes $9 Million in Cybercrime Proceeds! ๐ป
"Pig Butchering" Scams: U.S. Seizes $9 Million in Cybercrime Proceeds! ๐ป

Welcome to Gone Phishing, your daily cybersecurity newsletter that wishes you a merry #BlackFriday2023. Happy looting! ๐๐๐ Kidding, kidding!
Itโs Friday, folks, which can only mean one thingโฆ Itโs time for our weekly segment!
It goes by many names. Patch of the Week, Tweak of the week. Okay, thatโs it.
Congrats, the cybercriminals are no matchโฆ for your patch! ๐ฉน๐ฉน๐ฉน

Check out these freshly hatched patches ๐ฃ๐ฃ๐ฃ
CISA: That's all folks! ๐
๐จ PATCH NOW: CISA Issues Warning on "Looney Tunables" Linux Vulnerability! ๐จ
CISA has directed all U.S. federal agencies to safeguard their systems against an exploited vulnerability affecting major Linux distributions.
๐ง Dubbed 'Looney Tunables' (CVE-2023-4911), the flaw stems from a buffer overflow in the GNU C Library's ld.so dynamic loader, impacting popular platforms like Fedora, Ubuntu, and Debian.
Admins are urged to patch swiftly due to active exploits and online proof-of-concept releases. Qualys emphasises the risk of full root access on these platforms. CISA has added the flaw to its Known Exploited Vulnerabilities Catalog, mandating U.S. agencies to patch by December 12.
All organisations are advised to prioritise patching! ๐๐ก๏ธ๐

Now, on to todayโs hottest cybersecurity stories:
๐ฎ American cops recoup $9m from โpig butcheringโ scammers ๐ท
๐๏ธ Fidelity National Financial shuts down after cyber-attack ๐จโ๐ป
๐ N. Korean โDiamond Sleetโ trojanizes CyberLink software ๐
Hackers: Alright, who squealed to the pigs? About the pigs. ๐ท๐๐
๐ฐ "Pig Butchering" Scams: U.S. Seizes $9 Million in Cybercrime Proceeds! ๐ป
In a significant crackdown, the U.S. has seized nearly $9 million derived from widespread "pig butchering" scams that targeted over 70 victims nationwide. ๐ These scams, involving romance and fake crypto investments, lure victims into depositing money, which is then stolen.
๐ท How It Works ๐ท
The cybercriminals, operating as an organised group, created fake investment firms and crypto exchanges, convincing investors to deposit funds. The term "pig butchering" refers to fattening victims' accounts before extracting as much as possible.
๐ธ Laundering Techniques ๐ธ
To launder the stolen proceeds, the criminals employed chain hopping methods, complicating investigators' roles. They frequently switched cryptocurrency tokens and used "privacy coins" like Monero and Z-cash, making tracking more challenging than traditional tokens like Bitcoin and Ethereum.
๐ต๏ธโโ๏ธ Law Enforcement Actions ๐ต๏ธโโ๏ธ
Although no arrests or specific cybercriminal names were disclosed, the U.S. Secret Service San Francisco Field Office connected the laundering efforts to wallet addresses linked to the criminal organisation. The seizure was made possible through the collaboration of the Secret Service and the Justice Department.
๐ Evolution of Crypto Laundering ๐
Analysts noted the shift from traditional methods like mixers and tumblers to emerging techniques such as coin swaps and cross-chain bridges. These methods provide decentralised and privacy-focused means for exchanging coins, both for legitimate purposes and money laundering.
โ๏ธ Ongoing Investigation โ๏ธ
The Justice Department's Computer Crime Division, the National Cryptocurrency Enforcement Team, and assistant U.S. attorneys are actively handling the case in the Northern District of California.
๐ Asset Transfer ๐
The seized proceeds were returned in the form of the U.S. dollar-tied stablecoin Tether, with the Justice Department acknowledging Tether's role in facilitating the asset transfer.
๐จ Combating Cyber-Enabled Financial Fraud ๐จ
The U.S. Secret Service emphasised its commitment to protecting the financial infrastructure, thanking the Justice Department for collaboration in this case.
๐ Stay Informed ๐
As law enforcement continues to target cybercriminals, it's crucial to stay vigilant against evolving scams. Report any suspicious activity to cybercrime reporting portals. ๐๐ ๐

Cybersecurity is more important than ever, and your Mac or PC are no exception. Over time, your Mac or PC can accumulate junk files, malware, and other threats that can slow it down and make it vulnerable to attack.
That's where MacPaw comes in. MacPaw offers a suite of easy-to-use apps that can help you clean, optimize, and secure your Mac. With MacPaw, you can:
Remove junk files and malware to free up space and improve performance
Protect your privacy by erasing sensitive data
Optimize your startup settings to speed up boot times
Manage your extensions and apps to keep your Mac or PC running smoothly
Since 2008 MacPaw is trusted by over 30 million users worldwide, and it's the perfect solution for keeping your Mac or PC safe and secure.

Hackers: TIme for a littleโฆ Infidelity mwahahaha ๐๐๐ฌ
๐จ FNF Cybersecurity Incident Update! ๐จ
Fortune 500 company Fidelity National Financial (FNF), a major player in title insurance and settlement services, reported a cybersecurity incident impacting certain systems. ๐ ๐
โ ๏ธ DefCon 1 โ ๏ธ
The company launched an investigation, enlisted experts, alerted law enforcement, and implemented measures to assess and contain the breach. As part of containment, access to some systems was blocked, causing disruptions in services related to title insurance, escrow, and mortgage transactions. ๐๐
โ๏ธ Breaking The Chain โ๏ธ
FNF disclosed that an unauthorised third party accessed systems and acquired credentials, with the investigation ongoing. Real Estate News noted that the breach halted scheduled closings, leaving agents and homebuyers in a scramble. ๐ก๐ป
FNF has not commented on the situation. If you have info on the breach, contact Gone Phishing securely. Stay tuned for updates as the investigation unfolds. ๐ต๏ธโโ๏ธ๐๐

๐ฃ Catch of the Day!! ๐๐๐ฆ
Our new segment where we pick out some cool sites we like, reply to the mail and let us know what you think.
๐ The Motley Fool: โFool me once, shame on โ shame on you. Fool me โ you can't get fooled again.โ Good olโ George Dubya ๐ Let us tell whoโs not fooling around though; thatโs the Crรผe ๐ at Motley Fool. Youโd be a fool (alright, enough already! ๐) not to check out their Share Tips from time to time so your savings can one day emerge from their cocoon as a beautiful butterfly! ๐ Kidding aside, if you check out their website theyโve actually got a ton of great content with a wide variety of different investment ideas to suit most budgets ๐ค (LINK)
๐ต Wander: Find your happy place. Cue Happy Gilmore flashback ๐๏ธโณ๐๐๏ธ Mmmm Happy Placeโฆ ๐ So, weโve noticed a lot of you guys are interested in travel. As are we! We stumbled upon this cool company that offers a range of breath-taking spots around the United States and, honestly, the website alone is worth a gander. When all you see about the Land of the free and the home of the brave is news of rioting, looting and school shootings, itโs easy to forget how beautiful some parts of it are. The awe-inspiring locations along with the innovative architecture of the hotels sets Wander apart from your run of the mill American getaway ๐๏ธ๐ (LINK)
๐ Digital Ocean: If you build it they will come. Nope, weโre not talking about a baseball field for ghosts โพ๐ป๐ฟ (Great movie, to be fair ๐). This is the Digital Ocean whoโve got a really cool platform for building and hosting pretty much anything you can think of. If you check out their website youโll find yourself catching the buzz even if you canโt code (guilty ๐). But if you can and youโre looking for somewhere to test things out or launch something new or simply enhance what youโve got, weโd recommend checking out their services foโ sho ๐ And how can you not love their slogan: Dream it. Build it. Grow it. Right on, brother! ๐ฟ (LINK)

Diamond in the Sleet ๐๐จ๏ธ๐พ๐ปโ ๏ธ
๐ North Korean Threat Actor Unleashes Trojanized Supply Chain Attack! ๐
Microsoft's Threat Intelligence team has uncovered a state-sponsored threat, Diamond Sleet, linked to North Korea, orchestrating a supply chain attack.
The attackers are distributing a trojanized version of a legitimate application by CyberLink, a Taiwanese multimedia software developer. The modified installer includes malicious code that downloads a second-stage payload, impacting over 100 devices across Japan, Taiwan, Canada, and the U.S.
๐ Modus Operandi ๐
The poisoned file is hosted on CyberLink's update infrastructure, featuring checks to evade security products. The second-stage payload establishes connections with compromised command-and-control servers. Notably, Diamond Sleet has a history of targeting government, defence, telecom, and financial institutions since at least 2013.
๐ป Tech Tactics ๐ป
Microsoft observed the use of trojanized open-source and proprietary software by the threat actor. Despite the supply chain attack, no hands-on-keyboard activity was detected on target environments post-installation of the tampered installer, named LambLoad.
๐ซ Evading Detection ๐ซ
The weaponised downloader inspects for security software and fetches a disguised payload, masquerading as a PNG file. Upon execution, the malware contacts a legitimate-but-compromised domain for additional payloads.
๐ Global Impact ๐
This revelation follows recent North Korean campaigns revealed by Palo Alto Networks Unit 42. Microsoft previously tied Diamond Sleet to the exploitation of a critical security flaw in JetBrains TeamCity. Stay vigilant, update security measures, and monitor for any unusual activity. ๐ก๏ธ
Have a good weekend yโall, and of course, Happy Holidays to our American readers! ๐ฝ๏ธ๐ฆ๐๐ฝ๐ฐ๐ฅ๐ป And do yourselves a favour and donโt bother with the Black Friday sales and stay in with your families instead ๐ Just a suggestion, mind โค๏ธ

๐๏ธ Extra, Extra! Read all about it! ๐๏ธ
Every few weeks, we carefully select three hot newsletters to show you. Reputation is everything, so any links we share come from personal recommendation or carefully researched businesses at the time of posting. Enjoy!
The GeekAI: A daily 3 min newsletter on what matters in AI, with all the new AI things coming to market its good to stay ahead of the curve.
Libby Copa: The Rebel Newsletter helps writers strengthen their writing and creative practice, navigate the publishing world, and turn their art into an act of rebellion.
Techspresso: Receive a daily summary of the most important AI and Tech news, selected from 50+ media outlets (The Verge, Wired, Tech Crunch etc)
Let us know what you think.
So long and thanks for reading all the phish!
Give us a rating? |




