Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Threat Actors Mimic CNN, BBC, and CNBC Websites to Promote Investment Scams

Threat Actors Mimic CNN, BBC, and CNBC Websites to Promote Investment Scams

Posted on July 15, 2025July 15, 2025 By CWS

Cybersecurity researchers have recognized a complicated worldwide fraud marketing campaign that leverages impersonated information web sites from main shops together with CNN, BBC, CNBC, News24, and ABC Information to orchestrate large-scale funding scams.

The operation demonstrates superior social engineering techniques mixed with technical deception strategies to focus on victims throughout a number of international locations.

The marketing campaign operates by a multi-stage assault vector starting with sponsored ads on Google and Fb platforms.

These advertisements comply with predictable patterns that includes native celebrities and headlines promising “passive earnings streams” that seem to originate from reliable information sources.

The technical infrastructure supporting this operation spans an in depth community of fraudulent domains designed to reflect genuine information web sites with exceptional precision.

Malwarebytes analysts famous that the menace actors have established roughly 17,000 baiting information websites distributed throughout 50 international locations, with the USA serving as the first goal area.

The researchers found that these malicious actors keep subtle faux buying and selling platforms with names together with Eclipse Earn, Solara Vynex, and Trap10, every designed to simulate reliable funding environments.

Technical Infrastructure and Area Evaluation

The marketing campaign’s technical basis depends closely on area typosquatting strategies and the exploitation of low-cost top-level domains (TLDs) to create convincing replicas of established information shops.

Evaluation reveals constant use of domains ending in .xyz, .io, .store, and .click on extensions, which give cost-effective options to premium area registrations whereas sustaining ample visible similarity to deceive targets.

The menace actors implement URL constructions that carefully mimic reliable information web sites, incorporating recognizable branding components and acquainted navigation patterns.

These websites make the most of content material administration programs configured to routinely generate articles that includes native celebrities and region-specific funding alternatives, creating customized assault vectors that enhance sufferer engagement charges and conversion potential.

Examine dwell malware habits, hint each step of an assault, and make quicker, smarter safety choices -> Strive ANY.RUN now

Cyber Security News Tags:Actors, BBC, CNBC, CNN, Investment, Mimic, Promote, Scams, Threat, Websites

Post navigation

Previous Post: Newly Emerged GLOBAL GROUP RaaS Expands Operations with AI-Driven Negotiation Tools
Next Post: Hyper-Volumetric DDoS Attacks Reach Record 7.3 Tbps, Targeting Key Global Sectors

Related Posts

Windows Remote Desktop Client Vulnerability Let Attackers Execute Remote Code Windows Remote Desktop Client Vulnerability Let Attackers Execute Remote Code Cyber Security News
GitLab Releases Critical Security Updates to Fix Vulnerabilities GitLab Releases Critical Security Updates to Fix Vulnerabilities Cyber Security News
ServiceNow Platform Vulnerability Let Attackers Exfiltrate Sensitive Data ServiceNow Platform Vulnerability Let Attackers Exfiltrate Sensitive Data Cyber Security News
Researchers Breakdown DragonForce Ransomware Along with Decryptor for ESXi and Windows Systems Researchers Breakdown DragonForce Ransomware Along with Decryptor for ESXi and Windows Systems Cyber Security News
CISA Warns of Google Chrome 0-Day Vulnerability Exploited in Attacks CISA Warns of Google Chrome 0-Day Vulnerability Exploited in Attacks Cyber Security News
APT35 Hacker Groups Internal Documents Leak Exposes their Targets and Attack Methods APT35 Hacker Groups Internal Documents Leak Exposes their Targets and Attack Methods Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News