Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

17,000+ Fake News Websites Caught Promoting Investment Frauds

Posted on July 16, 2025July 16, 2025 By CWS

An enormous community of fraudulent information web sites has been uncovered, with cybersecurity researchers figuring out over 17,000 Baiting Information Websites (BNS) throughout 50 nations orchestrating refined funding fraud schemes.

These malicious platforms masquerade as reliable information retailers, publishing fabricated tales that includes well-known public figures and revered monetary establishments to construct belief and lure unsuspecting victims into high-risk monetary scams together with Trap10, cryptocurrency buying and selling fraud, and different misleading funding schemes.

The BaitTrap marketing campaign employs a multi-stage assault methodology, using Google Advertisements and Meta promoting platforms as major distribution vectors.

Scammers create sponsored content material with compelling headlines reminiscent of “Central Financial institution Governor By accident Reveals Secret Wealth Technique” paired with official images and nationwide symbols to reinforce credibility.

Baiting information websites (Supply – CTM360)

These commercials redirect customers to professionally crafted pretend information articles that impersonate trusted media retailers like CNN, BBC, and CNBC, that includes fabricated quotes from celebrities and monetary authorities endorsing fraudulent buying and selling platforms.

CTM360 researchers famous that the marketing campaign’s sophistication extends past easy phishing techniques, incorporating a complete framework they’ve termed the “Rip-off Navigator” – a six-stage evaluation mannequin impressed by the MITRE framework.

This systematic method encompasses useful resource improvement, set off mechanisms, distribution channels, goal interplay protocols, motive identification, and monetization methods, offering cybersecurity professionals with a structured methodology for understanding and combating these threats.

The worldwide attain of BaitTrap demonstrates its unprecedented scale, with the very best focus of malicious websites focusing on the Center East (10,529 websites), Asia Pacific (3,399 websites), and Europe (1,843 websites).

The marketing campaign displays outstanding regional customization, using native languages, acquainted media manufacturers, and regional public figures to extend authenticity and maximize sufferer engagement throughout numerous geographical markets.

Technical Infrastructure and Area Evaluation

The technical infrastructure underlying BaitTrap reveals refined evasion methods designed to bypass conventional safety measures.

Nearly all of recognized Baiting Information Websites make the most of free or low-cost top-level domains together with .xyz, .store, and .click on extensions, which give scammers with cost-effective registration choices whereas complicating detection efforts.

Information websites (Supply – CTM360)

Extra regarding is the observe of compromising reliable domains to host pretend information pages, making a hybrid infrastructure that blends malicious content material with trusted area reputations.

The internet hosting structure predominantly depends on shared internet hosting platforms, permitting risk actors to quickly deploy and scale their operations whereas sustaining anonymity by distributed infrastructure.

When customers work together with these websites, they encounter a rigorously orchestrated redirection mechanism that seamlessly transitions victims from pretend information articles to fraudulent buying and selling platforms branded as “Eclipse Earn,” “Solara Vynex,” or “Azorilix.”

These platforms make use of refined consumer interface designs that mimic reliable monetary providers, full with pretend revenue dashboards displaying fabricated returns to persuade customers to make preliminary deposits averaging $240, although no precise buying and selling happens and funds are straight transferred to scammer-controlled accounts.

Examine stay malware conduct, hint each step of an assault, and make sooner, smarter safety selections -> Attempt ANY.RUN now

Cyber Security News Tags:Caught, Fake, Frauds, Investment, News, Promoting, Websites

Post navigation

Previous Post: Hacktivist Groups Attacks on Critical ICS Systems to Steal Sensitive Data
Next Post: North Korean Hackers Weaponized 67 Malicious npm Packages to Deliver XORIndex Malware

Related Posts

Microsoft Purview DLP to Restrict Microsoft 365 Copilot in Processing Emails With Sensitive Labels Cyber Security News
Cloudflare Warns of DDoS Attacks Targeting Journalists and News Organizations Cyber Security News
How To Defend Against These Phishing Kit Attacks  Cyber Security News
Supply Chain Security Mitigating Third-Party Risks Cyber Security News
APT Group 123 Actively Attacking Windows Systems to Deliver Malicious Payloads Cyber Security News
Microsoft Edge Fixes Actively Exploited Chromium Vulnerability Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Cisco ISE Vulnerability Allows Remote Attacker to Execute Commands as Root User
  • Cambodia Makes 1,000 Arrests in Latest Crackdown on Cybercrime
  • How to Prevent Brute Force Attacks
  • Threat Actors Weaponize WordPress Websites to Redirect Visitors to Malicious Websites
  • Chinese ‘Salt Typhoon’ Hackers Hijacked US National Guard Network for Nearly a Year

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Cisco ISE Vulnerability Allows Remote Attacker to Execute Commands as Root User
  • Cambodia Makes 1,000 Arrests in Latest Crackdown on Cybercrime
  • How to Prevent Brute Force Attacks
  • Threat Actors Weaponize WordPress Websites to Redirect Visitors to Malicious Websites
  • Chinese ‘Salt Typhoon’ Hackers Hijacked US National Guard Network for Nearly a Year

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News