“Currently, it is estimated that hundreds of cybercriminals are using this kit to commit fraud, leaving victims with empty bank accounts.\u00a0Their Telegram channel has over 1,255 members, a significant indicator of the scale and scope of the malicious activity being promoted by the group.
The attackers use various social engineering and spoofing tactics to trick victims into revealing their sensitive information, which supports real-time interaction to abuse and bypass MFA (Multi-Factor Authentication).
The kit is designed to intercept sensitive information, including banking credentials, credit card and personal information, and OTP\/TAN codes. Besides traditional tokens (such as SMS code), the kit supports QR Codes and PhotoTAN method (widely used in Germany and Switzerland), which may indicate that fraudsters are monitoring the latest MFA\/2FA technologies implemented by banks and seeking to exploit possible bypass methods to defraud their customers.
V3B phishing kit supports over 54 financial institutions (based in Austria, Belgium, France, Finland, Greece, Germany, Italy, Netherlands, Norway, Poland, Spain), featuring customized and localized templates to mimic authentication and verification processes of major online banking, e-commerce, cryptocurrency providers and payment systems in the EU.<\/p>\n\n\n\n
Technical details about the phishing kit are included in the report published by Resecurity: https:\/\/www.resecurity.com\/blog\/article\/cybercriminals-attack-banking-customers-in-eu-with-v3b-phishing-kit<\/strong><\/a><\/p>\n\n\n\n
Pierluigi Paganini<\/strong><\/a>
Follow me on Twitter: @securityaffairs<\/strong><\/a> and Facebook<\/strong><\/a> and Mastodon<\/a><\/p>\n\n\n\n
(<\/strong>SecurityAffairs<\/strong><\/a> \u2013<\/strong> hacking, V3B<\/strong>)<\/strong><\/p>\n\n\n\n