Revolut Phishing Scams – How to Avoid Them
TRUSSEL FJERNELSE

Revolut Phishing Scams – How to Avoid Them

1 Star2 Stars3 Stars4 Stars5 Stars (Ingen stemmer endnu)
Loading ...

Læs artiklen for at se, hvordan du kan undgå Revolut Phishing Scams og fjerne malware som blev distribueret af sådanne svindel. E-mails, beskeder og hjemmesider er alle involveret i disse typer af spoofing. Artiklen vil også hjælpe dig til at genkende Revolut Phishing Scams og den officielle Revolut meddelelser fra hinanden. Hvis du opdager, at din computer er inficeret eller opfører sig mærkeligt, Vi anbefaler, at du scanner det med et sikkerhedsværktøj.

Revolut Phishing Scams er almindelige i verden. Mange variationer af disse fupnumre findes, featuring hjemmesider specielt designet til at generere spoof sider, beskeder bevidst forsøger at narre du har et problem, eller meddelelser, der kan føre til stjålne legitimationsoplysninger eller din pc bliver inficeret med malware. Alle disse typer af Revolut scams er stadig i omløb, og gennem dem, en masse af følsomme oplysninger eller penge bliver stjålet. Folk bliver ved med at blive ofre for relaterede spoof beskeder, trods i hvilken form de er sendt på. I årenes løb Revolut bruges i mange svindelnumre og med hver ny, cyberkriminelle at forbedre deres færdigheder for at gøre en fidus så tæt som muligt på den oprindelige messaging bruges af store brand. Hvis du er målrettet med en misvisende besked, vil du blive bedt om at logge ind på ”Revolut”Eller besøger et websted domæne og udføre en handling der ligesom at betale for en mislykket forsendelse.

Trussel Summary

Navn
TypePhishing, PUP, malware
Kort beskrivelsePhishing-meddelelser, der forsøger at narre dig til at klikke på links. Når du har klikket, et link vil omdirigere dig på en landing page. Du vil blive bedt om at gøre en handling der, såsom at give legitimationsoplysninger, personlige oplysninger eller fyldning i en form. En gang imellem, klikke på et link, vil hente malware på din computer.
SymptomerDu modtager en e-mail, der er angiveligt fra Revolut. Du vil blive opfordret til at klikke på et link. Du kan derefter få malware på computeren enhed eller lander på en side, der efterligner den officielle Revolut internet side, mens krævende af dig at udfylde personlige oplysninger.
Distributionsmetodephishing e-mails, Pop-up-meddelelser, Omdirigeringer
Værktøj Detection Se Hvis dit system er blevet påvirket af

Hent

Værktøj til fjernelse af malware

BrugererfaringTilmeld dig vores forum at diskutere .

Revolut Phishing Scams October 2019 Update — Scam Verification Links

Security experts warn about the a dangerous social engineering campaign is aimed at Revolut users. The method chosen by the hackers is the sending of false emails, notifications and all minds of messages in order to manipulate them into believing that their account will be locked. These messages are considered scareware tactics and usually have a high chance of success as most users will be concerned about loosing access to their funds.

Security checks can be made if the anti-money laundering system has been triggered however Revolut will never ask for login information or financial information that may be used in orer to steal funds. The recipients of the messages will be shown a link to a hacker-controlled page which can be any of the following:

  • Login Prompts — The links will lead to a login prompt that will request that the users input their Revolut credentials in order to verify them. Doing so will automatically give hackers access to their funds and personal information.
  • Files Upload — Through the fake apps the hackers will request personal documents and sensitive to be uploaded.
  • APK Download and Installation — In some cases the users can be scammed into downloading and installing a malware APK from a hacker-controlled repository.

Revolut Phishing Scams – Distribution Methods

The Revolut phishing scams are becoming much more diverse as the financial service is becoming more popular among mobile users. At the moment there have been several campaigns that have been found to be among the major scams for the service. In the majority of cases they will use the so-called direct methods which will reach out to the users and attempt to manipulate them into giving out their personal information or the app’s credentials. There are several popular main methods which are commonly used by hackers:

  • SPAM Emails — The hackers can send out messages in bulk using a SPAM method wherein the messages appear to be sent by Revolut, bank, Google, Apple or another party that is tied to the financial service. The contents will most likely be stolen or resemble the one that is ordinarily sent to the victims. Usually the infections are caused through redirects that are executed once the users click on text links, multimedia files or engage in certain activities — downloading files, scrolling and etc. This is done by embedding in advanced JavaScript scripts as some email providers enable them by default.
  • Malware Websites — The criminals can always create fake sites that present themselves as legitimate landing pages, parts of the Revolut site or login prompts. There are two main types — the ones that are hosted on similar sounding domain names and possibly a signed and valid security certificate and the sites that are shown through a shortened URL service. These pages are usually login prompts or parts of the Revolut site.
  • Omdirigeringer — The redirects which are usually the result of having installed a browser hijackers will automatically present the endpoint page to the victims. If browser manipulation has been made the address bar can show the legitimate Revolut site but in fact the fake site will be shown.
  • annoncenetværk — The hackers can create list the malware sites on ad networks using their own credentials or through hacked/fake ones. This is a very efficient strategy as it will be posted on both safe sites and communities and across pages that integrate the relevant ad network. Using this method alone the Revolut phishing scams can reach a very large and possibly global audience.

The phishing scams redirects can also be caused by interacting with various files and applications. This can be presented using different file types and malware loaders. A good example is the often created makro-inficerede dokumenter which can be of all popular formats: tekstfiler, databaser, regneark og præsentationer. When they are opened by the victims a prompt will be shown asking them to enable the built-in scripts. If this is done the associated malware engine will be started. Et alternativ er at skabe malicious bundle installers which are usually legitimate setup bundle installers of popular programs which are downloaded by end users: kreativitet suiter, produktivitet og kontor apps, systemværktøjer og endda computerspil. They are uploaded to various sites, including download portals and file-sharing networks like BitTorrent.

Bear in mind that a large part of the infections are done by downloading and interacting with browser hijackers — they are dangerous plugins that are made compatible with the most popular web browsers. The posted descriptions will promise the addition of additional features or performance optimizations. To do so the criminals will use fake user reviews and post the descriptions through impersonated or stolen developer credenials. A large number of Revolut phishing scams can be orchestrated by publishing fake apps both for Android and iOS and published on their respective repositories.

Sim Card Swap Revolut Phishing Scams

One of the most common tactics which has been found to plague Revolut customers is the SIM card swap, orchestrated by the hacking group. This is done by using other scams in order to take control of the target’s phone number. The scammers do so by gathering enough personal information in order to convince the mobile carriers into handing out control of the associated SIM card to the criminals. In the end the this will allow the hackers to take over control of the accounts by supplying their own cards and claiming that they are the users.

Revolut Phishing Scams — Protection Tips

In order to protect themselves from Revolut phishing scams the users will need to take extra care when supplying information about themselves or related to their Revolut accounts. Take special note that the hackers can easily impersonate Revolut staff and social engineer the victims into revealing their card PIN numbers or security responses such as passwords. The best action to do in this case is to take a screenshot and report them directly to Revolut.

Take note that communications is mainly done through the legitimate applications support function. Revolut will never reach out to individual users via social network profiles, special site or portals. We also advise all Revolut users to constantly look out for updates and keep their applications updated at all times.

In the last few months there have been several sightings of fake and counterfeit notifications that will redirect the users to a fake login or verification page. We remind our readers that such notifications are fake and should be treated with suspicion. They can take forms of pop-ups and emails.

Remove Revolut Phishing Scams and Related Malware

Alt, hvad der kræves for at fjerne nogle Revolut Phishing Scams er at ignorere meddelelsen, aldrig reagere på det og slette den. Andre svindel kræver en smule handling, såsom grundigt scanne din computer maskine med sikkerhedssoftware at afgøre, om du har nogle malware komponent, der skubber Revolut spoof beskeder til din computer, browser eller e-mail-adresse.

Vi anbefaler, at alle computerbrugere scanne deres system for aktive infektioner og malware ved hjælp af et sikkerhedsprogram. Det kunne forhindre mange ondsindede handlinger og stoppe malware distribuere yderligere.

Hent

Værktøj til fjernelse af malware


Spy Hunter scanner kun detektere trussel. Hvis du ønsker, at truslen skal fjernes automatisk, du nødt til at købe den fulde version af anti-malware værktøj.Læs mere om SpyHunter Anti-Malware værktøj / Sådan fjernes SpyHunter

Avatar

Martin Beltov

Martin dimitterede med en grad i Publishing fra Sofia Universitet. Som en cybersikkerhed entusiast han nyder at skrive om de nyeste trusler og mekanismer indbrud.

Flere indlæg - Websted

Følg mig:
TwitterGoogle Plus

Efterlad en kommentar

Din e-mail-adresse vil ikke blive offentliggjort. Krævede felter er markeret *

Frist er opbrugt. Venligst genindlæse CAPTCHA.

Del på Facebook Del
Loading ...
Del på Twitter Tweet
Loading ...
Del på Google Plus Del
Loading ...
Del på Linkedin Del
Loading ...
Del på Digg Del
Del på Reddit Del
Loading ...
Del på Stumbleupon Del
Loading ...