The latest attack on a fake news website has made headlines across the US, Australia, China, and the UK. Hackers used reverse engineering to identify their targets and then contacted them via email pretending to be a legitimate news site. They asked journalists to write reviews and stories about their website. The websites looked very similar to the real thing, except that they had a fake backend.
Hackers target individuals on Facebook
Facebook recently discovered a cyber-espionage campaign by Iranian hackers that targeted US military personnel on the social networking site. The group used fake news sites and online personas to trick victims into divulging sensitive information. The campaign was part of a larger online espionage campaign, according to Facebook.
The hackers used fake accounts on the social network, filling them with fake information and trying to befriend the targeted victims. The operation was active since 2011, and it was described by Facebook as “one of the most elaborate cyber espionage campaigns in history”. The hackers’ tactics were extremely sophisticated, establishing connections and credibility by pretending to be victims’ colleagues and friends.
The scammers spread their posts by leveraging Facebook’s advertising tools. They usually get fake users or regular users to spread their posts, hoping that enough users will fall for the scam. The goal of this scam is to gain the personal information of victims and to gain access to their devices. These accounts are also used for spreading malware. As a result, Facebook has tightened its ad delivery platform to limit the reach of these accounts.
The new “state-sponsored” warning system on Facebook may be a public relations effort for the company. The social networking giant has already been collaborating with U.S. government agencies, handing over data to them in the past. The move may also be intended to deter people from mining Facebook systems for information.
The recent phishing campaigns involving Facebook and fake news websites have become increasingly sophisticated. In one recent attack, actors believed to be linked to Iran set up a fake news website to spread false information and forged relationships with high-level U.S. government officials. Ultimately, the company took the necessary steps to protect its users.
The hackers also use malware that installs itself on Android devices using fake versions of encrypted messaging apps. The malware uses accessibility features and fake profiles to convince their targets to install a fake application. This malware can steal information and access the microphone and camera.
Hackers target companies with fake news site
Hackers are targeting political institutions to undermine democratic institutions, as well as to chip away at the relations between countries. They target politicians and government officials by phishing for their email credentials. The attacks have sparked a new focus on political cyber-security. Parties are now investing in staff and resources to protect campaign data and off-the-record conversations.
The cyberattacks began in June 2022, when hackers hacked the accounts of Greens party members in Germany. Two politicians were compromised, Annalena Baerbock, the German Foreign Minister, and Robert Habeck, the Norwegian Minister of Economic Affairs. Norwegian security authorities traced the attacks to Russian-backed cyber actors. A DDoS attack on the website of the Port of London Authority in 2021 forced the website to go offline, and an Iranian group claimed responsibility. In May 2022, a phishing attack targeted the Ministry of Foreign Affairs of Jordan. Researchers attributed this attack to an Iranian cyber-espionage actor.
The hacking activity is spreading across social media networks. Several social media platforms, including Twitter, have reported fake news and hacked pages. Twitter has suspended several accounts and blocked several links. The investigation revealed that the hacker was attempting to influence public conversation about the situation in Ukraine. The hacking group behind the hacked accounts, dubbed Ghostwriter, allegedly gained access to Facebook, Twitter, and other social media accounts. The group attempted to post videos showing Ukrainian soldiers being weakened and surrounded by white flags of surrender.
The fake news site Red Ladon spoofs popular media websites, such as BBC News. It also infected devices with malware known as ScanBox. This malware is capable of keylogging and browser fingerprinting. It is one of the most sophisticated attacks targeting politicians yet. The group is now being investigated by various intelligence agencies.
The hackers also hacked the social media accounts of the British Royal Army. They took over its Twitter and YouTube accounts. The hacking also forced the government to issue a warning to strengthen network security. In addition, hackers have attacked the websites of various European countries, including Albania and Lithuania. One of these was the e-Albania portal, which was used to access public services. A Ukrainian media company was also hit by hackers. The President of Ukraine blamed Russia for the attack.