Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Mimic CNN, BBC, and CNBC Websites to Promote Investment Scams

Posted on July 15, 2025July 15, 2025 By CWS

Cybersecurity researchers have recognized a complicated worldwide fraud marketing campaign that leverages impersonated information web sites from main shops together with CNN, BBC, CNBC, News24, and ABC Information to orchestrate large-scale funding scams.

The operation demonstrates superior social engineering techniques mixed with technical deception strategies to focus on victims throughout a number of international locations.

The marketing campaign operates by a multi-stage assault vector starting with sponsored ads on Google and Fb platforms.

These advertisements comply with predictable patterns that includes native celebrities and headlines promising “passive earnings streams” that seem to originate from reliable information sources.

The technical infrastructure supporting this operation spans an in depth community of fraudulent domains designed to reflect genuine information web sites with exceptional precision.

Malwarebytes analysts famous that the menace actors have established roughly 17,000 baiting information websites distributed throughout 50 international locations, with the USA serving as the first goal area.

The researchers found that these malicious actors keep subtle faux buying and selling platforms with names together with Eclipse Earn, Solara Vynex, and Trap10, every designed to simulate reliable funding environments.

Technical Infrastructure and Area Evaluation

The marketing campaign’s technical basis depends closely on area typosquatting strategies and the exploitation of low-cost top-level domains (TLDs) to create convincing replicas of established information shops.

Evaluation reveals constant use of domains ending in .xyz, .io, .store, and .click on extensions, which give cost-effective options to premium area registrations whereas sustaining ample visible similarity to deceive targets.

The menace actors implement URL constructions that carefully mimic reliable information web sites, incorporating recognizable branding components and acquainted navigation patterns.

These websites make the most of content material administration programs configured to routinely generate articles that includes native celebrities and region-specific funding alternatives, creating customized assault vectors that enhance sufferer engagement charges and conversion potential.

Examine dwell malware habits, hint each step of an assault, and make quicker, smarter safety choices -> Strive ANY.RUN now

Cyber Security News Tags:Actors, BBC, CNBC, CNN, Investment, Mimic, Promote, Scams, Threat, Websites

Post navigation

Previous Post: Newly Emerged GLOBAL GROUP RaaS Expands Operations with AI-Driven Negotiation Tools
Next Post: Hyper-Volumetric DDoS Attacks Reach Record 7.3 Tbps, Targeting Key Global Sectors

Related Posts

Acer Control Center Vulnerability Let Attackers Execute Malicious Code as a Privileged User Cyber Security News
Microsoft Exchange Server Vulnerabilities Let Attackers Spoof and Tamper Over Network Cyber Security News
Storm-2603 Using Custom Malware That Leverages BYOVD to Tamper with Endpoint Protections Cyber Security News
Top 10 Advanced Threat Detection Techniques for Modern Cybersecurity Cyber Security News
New ZuRu Malware Variant Weaponizes Termius SSH Client to Attack macOS Users Cyber Security News
“AI-Induced Destruction” – Helpful Tools Become Accidental Weapons Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • EU Plans Phase Out of High Risk Telecom Suppliers, in Proposals Seen as Targeting China
  • North Korea-Linked Hackers Target Developers via Malicious VS Code Projects
  • Sprocket Security Appoints Eric Sheridan as Chief Technology Officer
  • One Identity Upgrades Identity Manager for Stronger Security
  • Gootloader with Low Detection Rate Bypasses Most Security Tools

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • EU Plans Phase Out of High Risk Telecom Suppliers, in Proposals Seen as Targeting China
  • North Korea-Linked Hackers Target Developers via Malicious VS Code Projects
  • Sprocket Security Appoints Eric Sheridan as Chief Technology Officer
  • One Identity Upgrades Identity Manager for Stronger Security
  • Gootloader with Low Detection Rate Bypasses Most Security Tools

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark