Nigerian scammers buy exploit kits to defraud Asian businesses

Deeper reconnaissance of infiltrated accounts can lead to big thefts

Microsoft Word Intruder is one of the administration tools used by a group of Nigerian scammers to monitor infected computers.

Microsoft Word Intruder is one of the administration tools used by a group of Nigerian scammers to monitor infected computers.

A small group of Nigerian scammers is using more sophisticated methods to defraud mostly Asian businesses, including buying exploit kits and malware from experienced coders, according to a new report from FireEye.

The security company said the group performs deep reconnaissance of its potential victims, jumping inside financial transactions in order to try to divert payments to their own accounts.

The schemes are much more complex than so-called 419 or advance fee fraud scams, where random victims are induced to send funds in order to get a non-existent but much larger payoff.

To carry out the scam, the group often uses the Microsoft Word Intruder exploit kit. The kit can be used to create malicious Word documents that are then sent over email. If opened, the victim's computer will be infected with a keylogger.

The group buys the tools from experienced malicious software coders, paying for remote access tools, keyloggers and exploit kits, FireEye said.

More than 2,300 victims have been targeted in 54 countries. It appears the group seeks out small to medium size businesses in Asia that perform financial transfers to suppliers. By targeting non-Asian speakers, the grammatical atrocities of the phishing emails are also less noticeable, which can be tipoffs to a scam.

The exploit kit will install the HawkEye or KeyBase keyloggers, which collect authentication credentials for email accounts. The scammers then watch those accounts, monitoring correspondence between businesses and suppliers, looking for an opportune moment to inject themselves into a transaction.

"Once the scammers identify an interesting victim, they log into the victims accounts using the stolen credentials and study the different transactions in which the victims are involved," FireEye wrote.

If a pending transaction looks promising, the group creates a similar email address as to the victim, copying the email thread between the two parties to make it look legitimate. The scammers then pressure one party to accept different bank account details, diverting money to their own accounts.

The scammers then use a network of mules to accept the payments into their own accounts and forward it on.

Some operations have been very lucrative successes. FireEye included emails from one scammer to a money mule partner in Indonesia alerting that $900,000 and €300,000 would be transferred to an account soon.

"With this single transaction, the scammer is slated to collect over $1 million," FireEye wrote. "We believe that they launder their money through a few strategies such as buying gold and luxury items, or mixing the money they have obtained through these scams with money collected legitimately."

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags fraudFireEye

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Jeremy Kirk

IDG News Service
Show Comments

Cool Tech

Toys for Boys

Family Friendly

Stocking Stuffer

SmartLens - Clip on Phone Camera Lens Set of 3

Learn more >

Christmas Gift Guide

Click for more ›

Brand Post

Bitdefender 2019

Shop safely with our award-winning security solution. Protect yourself this Black Friday and get the exclusive Black Friday discount for Bitdefender 2019!

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Maryellen Rose George

Brother PT-P750W

It’s useful for office tasks as well as pragmatic labelling of equipment and storage – just don’t get too excited and label everything in sight!

Cathy Giles

Brother MFC-L8900CDW

The Brother MFC-L8900CDW is an absolute stand out. I struggle to fault it.

Luke Hill

MSI GT75 TITAN

I need power and lots of it. As a Front End Web developer anything less just won’t cut it which is why the MSI GT75 is an outstanding laptop for me. It’s a sleek and futuristic looking, high quality, beast that has a touch of sci-fi flare about it.

Emily Tyson

MSI GE63 Raider

If you’re looking to invest in your next work horse laptop for work or home use, you can’t go wrong with the MSI GE63.

Laura Johnston

MSI GS65 Stealth Thin

If you can afford the price tag, it is well worth the money. It out performs any other laptop I have tried for gaming, and the transportable design and incredible display also make it ideal for work.

Andrew Teoh

Brother MFC-L9570CDW Multifunction Printer

Touch screen visibility and operation was great and easy to navigate. Each menu and sub-menu was in an understandable order and category

Featured Content

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?