Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Mimic CNN, BBC, and CNBC Websites to Promote Investment Scams

Posted on July 15, 2025July 15, 2025 By CWS

Cybersecurity researchers have recognized a complicated worldwide fraud marketing campaign that leverages impersonated information web sites from main shops together with CNN, BBC, CNBC, News24, and ABC Information to orchestrate large-scale funding scams.

The operation demonstrates superior social engineering techniques mixed with technical deception strategies to focus on victims throughout a number of international locations.

The marketing campaign operates by a multi-stage assault vector starting with sponsored ads on Google and Fb platforms.

These advertisements comply with predictable patterns that includes native celebrities and headlines promising “passive earnings streams” that seem to originate from reliable information sources.

The technical infrastructure supporting this operation spans an in depth community of fraudulent domains designed to reflect genuine information web sites with exceptional precision.

Malwarebytes analysts famous that the menace actors have established roughly 17,000 baiting information websites distributed throughout 50 international locations, with the USA serving as the first goal area.

The researchers found that these malicious actors keep subtle faux buying and selling platforms with names together with Eclipse Earn, Solara Vynex, and Trap10, every designed to simulate reliable funding environments.

Technical Infrastructure and Area Evaluation

The marketing campaign’s technical basis depends closely on area typosquatting strategies and the exploitation of low-cost top-level domains (TLDs) to create convincing replicas of established information shops.

Evaluation reveals constant use of domains ending in .xyz, .io, .store, and .click on extensions, which give cost-effective options to premium area registrations whereas sustaining ample visible similarity to deceive targets.

The menace actors implement URL constructions that carefully mimic reliable information web sites, incorporating recognizable branding components and acquainted navigation patterns.

These websites make the most of content material administration programs configured to routinely generate articles that includes native celebrities and region-specific funding alternatives, creating customized assault vectors that enhance sufferer engagement charges and conversion potential.

Examine dwell malware habits, hint each step of an assault, and make quicker, smarter safety choices -> Strive ANY.RUN now

Cyber Security News Tags:Actors, BBC, CNBC, CNN, Investment, Mimic, Promote, Scams, Threat, Websites

Post navigation

Previous Post: Newly Emerged GLOBAL GROUP RaaS Expands Operations with AI-Driven Negotiation Tools
Next Post: Hyper-Volumetric DDoS Attacks Reach Record 7.3 Tbps, Targeting Key Global Sectors

Related Posts

Google Cloud and Cloudflare Suffers Massive Widespread Outages Cyber Security News
Malicious npm Packages as Utilities Let Attackers Destroy Production Systems Cyber Security News
Critical ModSecurity WAF Vulnerability Allows Denial of Service via Empty XML Tags Cyber Security News
Speaker Proposal Deadline Approaches for OpenSSL Conference 2025 in Prague Cyber Security News
Microsoft Confirms Error Entry in Windows Firewall With Advanced Security Cyber Security News
Mitigating Malware Threats on Unmanaged Endpoint Devices Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Practice Secure Coding
  • Ransomware Gangs Actively Expanding to Attack VMware and Linux Systems
  • North Korean Hackers Using Fake Zoom Invites to Attack Crypto Startups
  • Apache Tomcat Coyote Vulnerability Let Attackers Trigger DoS Attack
  • NCSC Urges Organizations to Upgrade Microsoft Windows 11 to Defend Cyberattacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Practice Secure Coding
  • Ransomware Gangs Actively Expanding to Attack VMware and Linux Systems
  • North Korean Hackers Using Fake Zoom Invites to Attack Crypto Startups
  • Apache Tomcat Coyote Vulnerability Let Attackers Trigger DoS Attack
  • NCSC Urges Organizations to Upgrade Microsoft Windows 11 to Defend Cyberattacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News