Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Investment Scams Use Facebook Ads, RDGA Domains, and IP Checks to Filter Victims

Posted on May 6, 2025May 9, 2025 By CWS

Cybersecurity researchers have lifted the lid on two menace actors that orchestrate funding scams by way of spoofed celeb endorsements and conceal their exercise by way of site visitors distribution programs (TDSes).
The exercise clusters have been codenamed Reckless Rabbit and Ruthless Rabbit by DNS menace intelligence agency Infoblox.
The assaults have been noticed to lure victims with bogus platforms, together with cryptocurrency exchanges, that are then marketed on social media platforms. An vital facet of those scams is the usage of internet kinds to gather person information.
“Reckless Rabbit creates adverts on Fb that result in pretend information articles that includes a celeb endorsement for the funding platform,” safety researchers Darby Clever, Piotr Glaska, and Laura da Rocha mentioned. “The article features a hyperlink to the rip-off platform which comprises an embedded internet kind persuading the person to enter their private data to ‘register’ for the funding alternative.”
A few of these kinds, apart from requesting customers’ names, cellphone numbers, and e mail addresses, supply the power to auto-generate a password, a key piece of data that is used to progress to the following section of the assault — validation checks.
The menace actors carry out HTTP GET requests to reputable IP validation instruments, corresponding to ipinfo[.]io, ipgeolocation[.]io, or ipapi[.]co, with a purpose to filter out site visitors from international locations that they don’t seem to be enthusiastic about. Checks are additionally carried out to make sure that the offered numbers and e mail addresses are genuine.
Ought to the person be deemed worthy of exploitation, they’re subsequently routed by way of a TDS that both takes them on to the rip-off platform the place they’re coaxed into parting with their funds by promising excessive returns, or to a unique web page that instructs them to attend for a name from their consultant.
“Some campaigns use name facilities to offer the victims with directions on easy methods to arrange an account and switch cash into the pretend funding platform,” the researchers defined. “For customers who don’t go the validation step, many campaigns will merely show a ‘thanks’ touchdown web page.”
An vital facet of the exercise is the usage of a registered area technology algorithm (RDGA) to arrange domains for the sketchy funding platforms, a way additionally adopted by different menace actors like Prolific Puma, Revolver Rabbit, and VexTrio Viper.

Not like conventional area technology algorithms (DGAs), RDGAs make use of a secret algorithm to register all of the domains. Reckless Rabbit is claimed to have been creating domains way back to April 2024, primarily concentrating on customers in Russia, Romania, and Poland, whereas excluding site visitors from Afghanistan, Somalia, Liberia, Madagascar, and others.
The Fb adverts used to direct customers to the pretend information articles are interspersed with promoting content material associated to objects listed on the market on marketplaces like Amazon in a bid to evade detection and enforcement motion.
What’s extra, the adverts comprise unrelated pictures and show a decoy area (e.g., “amazon[.]pl”) that is completely different from the precise area the person shall be redirected to as soon as they click on on the hyperlink (e.g., “tyxarai[.]org”).
Ruthless Rabbit, then again, is believed to have been actively working funding rip-off campaigns since a minimum of November 2022 which are geared toward Jap European customers. What units this menace actor aside is that they run their very own cloaking service (“mcraftdb[.]tech”) to carry out validation checks.

Customers who get previous the verification checks are subsequently routed to an funding platform the place they’re urged to enter their monetary data to finish the registration course of.
“A TDS permits menace actors to strengthen their infrastructure, making it extra resilient by offering the power to cover malicious content material from safety researchers and bots,” Infoblox mentioned.
This isn’t the primary time such fraudulent funding rip-off campaigns have been found within the wild. In December 2024, ESET uncovered the same scheme dubbed Nomani that makes use of a mix of social media malvertising, company-branded posts, and synthetic intelligence (AI) powered video testimonials that includes well-known personalities.
Then final month, Spanish authorities revealed they’ve arrested six people aged between 34 and 57 for allegedly working a large-scale cryptocurrency funding rip-off that used AI instruments to generate deepfake adverts that includes in style public figures to deceive individuals.
Renee Burton, vp of menace intelligence at Infoblox, informed The Hacker Information that they “must take a more in-depth look to see if there may be any proof” to establish if there are any connections between these actions and people performed by Reckless Rabbit and Ruthless Rabbit.
“Menace actors like Reckless and Ruthless Rabbits shall be relentless of their makes an attempt to trick as many customers as attainable,” the researchers mentioned. “As a result of some of these scams have confirmed to be extremely worthwhile for them, they’ll proceed to develop quickly—each in quantity and class.”
Thriller Field Scams Proliferate by way of Fb Advertisements
The event comes as Bitdefender is warning of a spike in refined subscription scams that make use of a community of greater than 200 convincing pretend web sites to trick customers into paying month-to-month subscriptions and sharing their bank card information.

“Criminals create Fb pages and take out full adverts to advertise the already basic ‘thriller field’ rip-off and different variants,” the Romanian firm mentioned. “The ‘thriller field’ rip-off has developed and now consists of nearly hidden recurring funds, alongside hyperlinks to web sites to varied outlets. Fb is used as the principle platform for these new and enhanced thriller field scams.”
The rogue sponsored adverts promote clearance gross sales from manufacturers like Zara or supply an opportunity to purchase a “thriller field” containing Apple merchandise and search to entice customers by claiming that they’ll seize one in all them by paying a minimal sum of cash, generally as little as $2.
The cybercriminals deploy numerous tips to sidestep detection efforts, together with creating a number of variations of the advert, solely one in all which is malicious, whereas the others show random product pictures.

These scams, like those perpetrated by Reckless Rabbit and Ruthless Rabbit, incorporate a survey element to make sure that the victims are actual individuals and never bots. Moreover, the fee pages rope unsuspecting customers right into a subscription program that earns the menace actors recurring revenues underneath the pretext of giving them a reduction.
“Criminals have been pumping funds in adverts selling impersonated content material creators, utilizing the identical subscription mannequin that appears to be now the driving income stream of those scams,” Bitdefender researchers Răzvan Gosa and Silviu Stahie mentioned.
“Scammers usually change the impersonated manufacturers, and so they’ve begun increasing previous the present thriller containers. They’re now making an attempt to promote low-quality merchandise or imitation articles, pretend investments, dietary supplements, and rather more.”
U.S. Treasury Sanctions Junta-Linked Militia in Myanmar Over Rip-off Compounds
The findings additionally comply with a wave of sanctions imposed by the U.S. Division of the Treasury in opposition to the Myanmar-linked Karen Nationwide Military (KNA) for helping organized crime syndicates function multi-billion-dollar rip-off compounds, in addition to facilitating human trafficking and cross-border smuggling.
The actions additionally goal the group’s chief Noticed Chit Thu, and his two sons, Noticed Htoo Eh Moo and Noticed Chit Chit. Noticed Chit Thu was sanctioned by the UK in 2023 and the European Union in 2024 for changing into a key enabler of rip-off operations within the area.
“Cyber rip-off operations, corresponding to these run by the KNA, generate billions in income for prison kingpins and their associates, whereas depriving victims of their hard-earned financial savings and sense of safety,” mentioned Deputy Secretary Michael Faulkender.
In these so-called romance baiting scams, fraudsters — who’re themselves trafficked to the rip-off websites by luring them with high-paying jobs — are coerced into concentrating on strangers on-line, constructing rapport with them over time, after which induce them to spend money on bogus cryptocurrency and buying and selling platforms managed by the prison actors.
“The KNA income from cyber rip-off schemes on an industrial scale by leasing land it controls to different organized crime teams, and offering assist for human trafficking, smuggling, and the sale of utilities used to offer power to rip-off operations,” the Treasury Division mentioned. “The KNA additionally offers safety at rip-off compounds in Karen State.”
The United Nations Workplace on Medication and Crime (UNODC) final month divulged the rip-off facilities are nonetheless increasing regardless of latest crackdowns, producing annual income to the tune of about $40 billion.

Discovered this text fascinating? Observe us on Twitter  and LinkedIn to learn extra unique content material we publish.

The Hacker News Tags:Ads, Checks, Domains, Facebook, Filter, Investment, RDGA, Scams, Victims

Post navigation

Previous Post: The Silent Drivers Behind 2025’s Worst Breaches
Next Post: Hackers Exploit Samsung MagicINFO, GeoVision IoT Flaws to Deploy Mirai Botnet

Related Posts

Nation-State Hacks, Spyware Alerts, Deepfake Malware, Supply Chain Backdoors The Hacker News
Germany Shuts Down eXch Over $1.9B Laundering, Seizes €34M in Crypto and 8TB of Data The Hacker News
The Silent Drivers Behind 2025’s Worst Breaches The Hacker News
Fortinet Patches CVE-2025-32756 Zero-Day RCE Flaw Exploited in FortiVoice Systems The Hacker News
OttoKit WordPress Plugin with 100K+ Installs Hit by Exploits Targeting Multiple Flaws The Hacker News
Malicious npm Package Leverages Unicode Steganography, Google Calendar as C2 Dropper The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • ChatGPT Vulnerability Lets Attackers Embed Malicious SVGs & Images in Shared Chats
  • Cybercrime-as-a-Service – Countering Accessible Hacking Tools
  • How to Remove Malware From Your PC
  • How to Recover From a Data Breach
  • BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2025

Recent Posts

  • ChatGPT Vulnerability Lets Attackers Embed Malicious SVGs & Images in Shared Chats
  • Cybercrime-as-a-Service – Countering Accessible Hacking Tools
  • How to Remove Malware From Your PC
  • How to Recover From a Data Breach
  • BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News