Threat Actors are targeting BFSI Sector using Improvised Modus Operandi in India
On 27th August 2022, at Null Bengalore Chapter, I have presented about various TTPs and Modus Operanies are being used by Threat Actors to target the customers of BFSI Sector.
• Using wishing smishing techniques your card has been blocked . To activate § bankk.com/ uploads -- - - Generic ¥÷:÷÷:÷÷÷÷㱺±÷÷ . . . .☒1÷i⑧㱺i÷÷¥I + ¥⑨amqzEB→g OR Modus - _ Operandi.es / Calling from fake / customer care number . . . misused VR [Interactive Voice Response ] system @⑦xlshu
• Fake/Malicious app in 3rd party appstore ¥É÷☒* - - - - - → _i☐¥Éi☒*- - - - - controlled by Generic Cloned Fake Original Application app, ; cation _÷_q¥☒ Threat Actor I : Modus ¥㱺⾨•- google play store Operandi.es 3rd party appstore [email protected]
aIIIrIIITSD TI • Creating domains using keywords - § My cashback . cash◦ Hers , scratchdiwali • Copying the same template • Distributing via pretext ing , µgggggggggggggggggµgn ggggggg-gggg.gg i payment will be only initiated if it is opened " on mobile device } manner } .
• Improvised Phishing Campaigns Customer support scam 1- improvised Modus operandi phishing domain is created without using any logo & name of the targeting entity @0×1Shu
https://github.com/EnixCoda/SMS-Forward • used an open-source apk to build the malware &II÷ Tt-_ TTEo- | } ⊥IIEI--TTE-gg--gg fg g I o o - Requesting " Ugg""" " """"" "°" M-ggggggg.gg
• Misuse of Cloudflare Pages 1AM Stack Platform javascript ftp.t tmarkup used to create Improvised example- ¥◦iᵗp¥eÉ"¥¥gressively Modus Operandi Net"ᵗY/free] Enhanced ☐BgfoBBB5§☐Img☒- E websites
㱺 •B Inclusive AAwweerrnneessssccaammppaaiiggnnss.CI • • Pprrooaaettiiwee ☒oonniittoorriinngg Using At- ML Based DRP % EE • • TTrraaiinniinnggffoorrE-mmpkooyyeee.es - 11%1%9 SS ①@0×1Shu