Connect with us

Cyber Crime

Top 10 Technology Crimes From Around The World [22.04.2024] Compiled By Futurecrime Researchers



Daily cyber crime news by FCRF

Protect Yourself: 6 Walmart Shopper Scams and How to Avoid Them

Walmart shoppers face a myriad of scams, including fake job offers, gift card schemes, and deceptive delivery alerts. Fraudsters impersonate Walmart in phishing emails and fake giveaways, aiming to steal personal information. Scammers also sell counterfeit gift cards on online marketplaces and use fake surveys to harvest sensitive data. Shoppers should exercise caution, avoiding instant job offers and demands for payment via gift cards. Verify suspicious communications directly through Walmart’s official channels to avoid falling victim to these increasingly sophisticated scams.

Police Raid Manchester Airport to Dismantle ‘Industrial Scale’ Fraud Operation

Police apprehend suspects at Manchester Airport linked to an online scamming site defrauding 70,000 victims globally. LabHost, established in 2021, facilitated phishing websites to extract personal information, with over 40,000 fraudulent sites created by 2024. Subscribers paid monthly fees to access fake profiles of 170 companies. Law enforcement’s Operation Stargrew contacted 25,000 UK victims, aiming to deter further offenses. This operation, along with others like Operation Elaborate, targets international fraud networks, showcasing collaborative efforts between law enforcement and private sectors to combat online fraud, emphasized by Metropolitan Police Deputy Commissioner Dame Lynne Owens and National Economic Crime Centre Director Adrian Searle.

Global cyber gang implicated in large-scale fraud apprehended by law enforcement

Law enforcement globally dismantled a gang accused of exploiting a technology service to execute fraudulent text message schemes, resulting in the arrest of 37 individuals. Victims are being contacted. Authorities highlight that younger individuals, accustomed to the internet, were prime targets for the phishing scam. The technology facilitated scammers, even without technical expertise, to inundate victims with deceptive messages, prompting online payments. The gang’s site, LabHost, was the focus of police action, aiding criminals in sending messages and guiding victims to counterfeit websites resembling genuine online payment or shopping platforms.

Euro-Med calls for investigation into tech companies’ involvement in Israeli killings of Gaza civilians

Euro-Mediterranean Human Rights Monitor urges investigation into tech giants’ role in Israeli violence against Gaza civilians. They stress accountability for any complicity or failure to safeguard user data. Palestinians targeted by Israel based on social media activity, despite lacking military involvement, as documented by the group. Israel allegedly employs AI-backed systems to unlawfully surveil Palestinians. Collaboration between Google and Israel, such as Project Nimbus, allegedly facilitates increased monitoring and illegal data collection, perpetuating denial, persecution, and crimes against Palestinians, according to the monitor.

New St. James Police Chief to Implement Enhanced Technology for Crime Reduction

Acting SSP Eron Samuels, newly appointed head of St. James Police Division in Jamaica, pledges to enhance crime-fighting with technology, emphasizing improved monitoring and response times. Plans include expanding monitoring capabilities with Jamaica Eye and GPS tracking for vehicles. Samuels aims to equip St. James with cutting-edge technology, addressing concerns of neglect compared to other divisions. At a Montego Bay Chamber of Commerce meeting, President Oral Heaven expresses support for police efforts, offering collaboration to enhance safety for residents and visitors. Both parties anticipate a productive partnership to foster a safer and prosperous St. James.

Pig Butchering Scams 

A pig-butchering scam is an investment fraud promising high returns in a short time. Scammers gain victims’ trust through social media, often posing as professionals or romantic interests. They pitch fake investment opportunities persuasively, urging urgent investment. Once funds are collected via digital platforms, scammers vanish, making recovery difficult. This scheme preys on victims’ financial aspirations and emotional vulnerabilities, trapping them in a cycle of deceit. The process involves gaining trust, pitching investments, collecting money, and disappearing, exploiting victims’ trust and desire for financial success. Recognizing the scam becomes challenging as victims become emotionally and financially invested.

Dopamu: Strategies for Nigeria to Utilize Advanced Technology in Addressing Insecurity

Oladipupo Dopamu, a cybersecurity expert with experience in IT innovation for global corporations, assesses Nigeria’s insecurity crisis in an interview. He highlights various security challenges including terrorism, kidnapping, and communal clashes, attributing the situation to socioeconomic inequalities, political instability, and weak governance. Dopamu emphasizes the need for Nigeria to invest more in intelligence gathering and technology, particularly for surveillance and reconnaissance, to enhance counterinsurgency efforts and improve situational awareness and response capabilities.

Insights into LabHost: The Decline of an SMS Scamming Empire 
LabHost, a tool launched in 2021, enabled users to create phishing campaigns, offering web pages mimicking legitimate sites. Services included SMS scam management, allowing customized messages to trick victims into providing personal data and payment details. Customers paid monthly fees ranging from $300 to $500. Phishing attacks varied but commonly involved SMS messages directing victims to fraudulent websites to input sensitive information. The operation led to 37 arrests worldwide, highlighting law enforcement’s crackdown on cybercrime.

Worldwide Operation Dismantles ‘Most Dangerous Cybercrime Syndicate’

International authorities, led by UK and US law enforcement, dismantle LockBit, a Russian-linked ransomware group, in a major operation. LockBit targeted governments, corporations, and institutions, causing billions in damages and extracting millions in ransoms. Operation Cronos infiltrated LockBit’s network, seized control of infrastructure, and obtained decryption keys, rendering LockBit redundant. Over 2,000 victims, including Royal Mail and Boeing, were targeted, with $120 million in ransom payments. LockBit and Hive operate under “ransomware as a service,” facilitating cybercrime proliferation. US indicts two Russians linked to LockBit, imposing sanctions. Majority of cyber criminals are Russian, but no state support detected.

Kai Zhuang: Rising Crime Trend Illustrated by Cyber Kidnapping in the US

Experts warn that the “cyber kidnapping” of Chinese student Kai Zhuang in the US reflects a global trend where criminals exploit technology to extort parents. Perpetrators manipulate victims into believing their loved ones are in danger, demanding ransom. Such crimes go largely unreported and rely on advances in technology, including AI voice impersonation. Preventative measures include awareness, verifying emergencies, and reporting to authorities. Improvement in call authentication and tracing could aid prevention. Despite unknown victim numbers, vigilance and precautionary measures are crucial in thwarting cyber kidnappings, which exploit vulnerabilities for substantial payouts.

Follow on

 Telegram | Facebook | Twitter | LinkedIn | Instagram | YouTube

Continue Reading