Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Mimic CNN, BBC, and CNBC Websites to Promote Investment Scams

Posted on July 15, 2025July 15, 2025 By CWS

Cybersecurity researchers have recognized a complicated worldwide fraud marketing campaign that leverages impersonated information web sites from main shops together with CNN, BBC, CNBC, News24, and ABC Information to orchestrate large-scale funding scams.

The operation demonstrates superior social engineering techniques mixed with technical deception strategies to focus on victims throughout a number of international locations.

The marketing campaign operates by a multi-stage assault vector starting with sponsored ads on Google and Fb platforms.

These advertisements comply with predictable patterns that includes native celebrities and headlines promising “passive earnings streams” that seem to originate from reliable information sources.

The technical infrastructure supporting this operation spans an in depth community of fraudulent domains designed to reflect genuine information web sites with exceptional precision.

Malwarebytes analysts famous that the menace actors have established roughly 17,000 baiting information websites distributed throughout 50 international locations, with the USA serving as the first goal area.

The researchers found that these malicious actors keep subtle faux buying and selling platforms with names together with Eclipse Earn, Solara Vynex, and Trap10, every designed to simulate reliable funding environments.

Technical Infrastructure and Area Evaluation

The marketing campaign’s technical basis depends closely on area typosquatting strategies and the exploitation of low-cost top-level domains (TLDs) to create convincing replicas of established information shops.

Evaluation reveals constant use of domains ending in .xyz, .io, .store, and .click on extensions, which give cost-effective options to premium area registrations whereas sustaining ample visible similarity to deceive targets.

The menace actors implement URL constructions that carefully mimic reliable information web sites, incorporating recognizable branding components and acquainted navigation patterns.

These websites make the most of content material administration programs configured to routinely generate articles that includes native celebrities and region-specific funding alternatives, creating customized assault vectors that enhance sufferer engagement charges and conversion potential.

Examine dwell malware habits, hint each step of an assault, and make quicker, smarter safety choices -> Strive ANY.RUN now

Cyber Security News Tags:Actors, BBC, CNBC, CNN, Investment, Mimic, Promote, Scams, Threat, Websites

Post navigation

Previous Post: Newly Emerged GLOBAL GROUP RaaS Expands Operations with AI-Driven Negotiation Tools
Next Post: Hyper-Volumetric DDoS Attacks Reach Record 7.3 Tbps, Targeting Key Global Sectors

Related Posts

Trend Micro Apex One Vulnerability Allow Attackers to Inject Malicious Code Cyber Security News
New Elastic EDR 0-Day Vulnerability Allows Attackers to Bypass Detection, Execute Malware, and Cause BSOD Cyber Security News
Healthcare Sector Emerges as a Prime Target for Cyber Attacks in 2025 Cyber Security News
Future of Passwords Biometrics and Passwordless Authentication Cyber Security News
Microsoft Announces New Security Defaults for Windows 365 Cloud PCs Cyber Security News
WhatsApp Developers Under Attack From Weaponized npm Packages with Remote Kill Switch Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Threats Actors Weaponize ScreenConnect Installers to Gain Initial Access to Organizations
  • CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation
  • New Malware Leverages Windows Character Map to Bypass Windows Defender and Mine Cryptocurrency for The Attackers
  • Hackers Weaponize Fake Microsoft Teams Site to Deploy Odyssey macOS Stealer
  • How to Close the AI Governance Gap in Software Development

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Threats Actors Weaponize ScreenConnect Installers to Gain Initial Access to Organizations
  • CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation
  • New Malware Leverages Windows Character Map to Bypass Windows Defender and Mine Cryptocurrency for The Attackers
  • Hackers Weaponize Fake Microsoft Teams Site to Deploy Odyssey macOS Stealer
  • How to Close the AI Governance Gap in Software Development

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News