Welcome, Guest: Register On Nairaland / LOGIN! / Trending / Recent / NewStats: 3,155,294 members, 7,826,170 topics. Date: Monday, 13 May 2024 at 10:38 AM |
Nairaland Forum / SleakBuzzPR's Profile / SleakBuzzPR's Posts
(1) (2) (3) (4) (5) (6) (7) (8) (9) (10) (of 10 pages)
Health / Re: Young Boy Dies After Being Bitten By Snake In A Primary School In Delta. Photos by SleakBuzzPR: 8:42pm On May 28, 2018 |
NwaChibuzor100: I hope you understand how insane you sound blaming the poor boy for his demise. When such calamity befalls your child in the future, remember this illmannered comment you made here. May the heavens bless you with the kind of joy you derive from making a mockery of the agony of this poor family. 8 Likes |
Celebrities / Re: Can Sinzu Stage A Successful Come Back Into The Nigerian Music Industry ? by SleakBuzzPR: 8:05pm On May 28, 2018 |
Ask yourself this.... Can you blow twice? His case couldn't qualify to be called a blow....maybe a knock. Can you knock twice? 7 Likes
|
Travel / Re: Four Killed In Accident Along Benin-Auchi Expressway (Graphic Photos) by SleakBuzzPR: 3:21pm On May 28, 2018 |
Shiiiiit 3 Likes
|
Politics / Re: National Assembly Members Notorious For Bribe Seeking- Jega by SleakBuzzPR: 3:16pm On May 28, 2018 |
Shiiiiiiithole
|
Crime / Re: Man Brutalizes His Wife Who Just Gave Birth. See How She Looks. Photos by SleakBuzzPR: 1:31pm On May 28, 2018 |
Jeeeeeesu 2 Likes
|
Business / Re: Nigerian Digital Publishing Startup: Reports First Profitable Quarter by SleakBuzzPR: 9:07am On May 26, 2018 |
revontuli: You don't know what you are saying... 1 Like |
Jokes Etc / Rare Picture Of Seun & Lalastica - Photo by SleakBuzzPR: 8:14am On May 26, 2018 |
After banning people tire....they decided to take a selfie together 20 Likes 2 Shares
|
Business / Re: Nigerian Digital Publishing Startup: Reports First Profitable Quarter by SleakBuzzPR: 8:12am On May 26, 2018 |
adebayo3449: Calculator lomo....are you proud of yourself?
|
Business / Re: Nigerian Digital Publishing Startup: Reports First Profitable Quarter by SleakBuzzPR: 7:46am On May 26, 2018 |
The profit you have declared is what one guy will spend on drinks in one night at Quilox.... Don't cry....you will get there. 2 Likes
|
Phones / Re: 4 Things You Should Know If You Are Using A Phone With A Built-in Battery by SleakBuzzPR: 7:39am On May 25, 2018 |
A thread for Tecno and Infinix users. Get a SAMSUNG S8 and you wont have to bother about this nonsense thread. 24 Likes 1 Share
|
Education / Re: JAMB: Reps Demand Reduction Of UMTE Fee To N3000 by SleakBuzzPR: 5:33am On May 25, 2018 |
Bad news for JAMB registrar and his goons....
|
Jobs/Vacancies / Re: Police Recruitment: Date For JAMB Exam, Centres Released by SleakBuzzPR: 8:18pm On May 24, 2018 |
Since when did Police start announcing JAMB examination dates? 1 Share
|
Education / Re: Drop One English Word Which Will Make People Check Their Dictionary by SleakBuzzPR: 8:11am On May 24, 2018 |
Kakaslococosisisizm
|
Webmasters / Re: Reasons To Stop Using Wordpress Internal Linking Plugins by SleakBuzzPR: 7:57am On May 24, 2018 |
Only a lazy and inexperienced domain administrator would even think of a linking plugin in the first place.... |
Celebrities / Re: Yahoo Boy: Investigate Hushpuppi - Deji Adeyanju Tells EFCC by SleakBuzzPR: 8:23pm On May 15, 2018 |
This nigga dey point finger... If dem do am bad thing now....he go come online they say his life is in danger. Here is why EFCC won't investigate hushpuppi: 1. A formal petition is required. These online noise don't count. 2. If it's based on suspicion, there must be a direct claimant alleging loss sequel to the activities of Hushpuppi. 3. EFCC can't go to Dubai to ask him how he makes his money even though we know it ain't legit. My point is.....there are boundaries. Sitting in your house to tag EFCC with your 100naira data won't prompt anybody to expend resources after a wild goose chase. If he has been duped....carry your proof and visit their office otherwise you simply hating. What happened at Club 57 wasn't a random raid. A report was made about a few guys and they had to trace them to their chill zone since dem no get official address. The only valid reason EFCC could currently decide to engage Hushpuppi for is to beg for GUCCI trousers. I RISE......Coooooooooourt. 108 Likes 5 Shares
|
Jobs/Vacancies / Re: Urgent Vacancy For English Teacher At Sagab College, Ikorodu by SleakBuzzPR: 5:11pm On May 15, 2018 |
bruno419: I'm here sir....how may I help you? |
Celebrities / Re: Shina Peller Celebrates His Birthday With New Photo by SleakBuzzPR: 5:03pm On May 14, 2018 |
jj |
Autos / Re: 2007 Upgraded To 2010 Mercedes Benz G-wagon @ 15.5m by SleakBuzzPR: 7:45am On May 14, 2018 |
Lelepeautos: I knew I was going to remove those things obviously. You should learn never to throw the first jab. Wish you success. |
Programming / Wire Wire: A West African Cyber Threat - DELL by SleakBuzzPR: 7:41am On May 14, 2018 |
Below is the summary of a report submitted to FBI and CIA by DELL Technologies in U.S.A "Nigerian prince" and "419" scams have plagued victims for decades and transitioned to the Internet in the 1990s. There are many variations and names for these scams, which originated in Nigeria. The scammers refer to their trade using the terms "yahoo yahoo" or "G-work," calling themselves "yahoo-yahoo boys," "yahoo boiz," or "G-boys." However, the simple con man fraud practiced by many West African-based threat actors is being replaced by a new crime they refer to as "wire-wire," "waya-waya," or "the new G-work." These terms have not entered the mainstream lexicon as of this publication and are not well-defined, but SecureWorks® Counter Threat Unit™ (CTU) research indicates that they refer to the evolution of low-level con games into more sophisticated and conventional cybercrime that is compromising businesses around the world. The businesses range in size and span industries from machinery manufacturers to countertop material manufacturers to chemical companies. The cybercriminals use spearphishing and malware to gain direct access to organizations' computers to facilitate the theft of large sums of money without the victim's knowledge. A Facebook search for "wire-wire" reveals numerous groups and users operating in the open. They advertise their services or offer training courses about wire-wire to would-be criminals. Multiple social media platforms have a wealth of information about individual threat actors, but meticulous research is necessary to understand how these thefts are being accomplished. Business email compromise The Internet security industry has been aware of the evolution of largely African-based threat actors for several years. Security companies such as Trend Micro, ThreatConnect, Palo Alto, and FireEye have detailed the rise of this activity. However, awareness about how these threat actors operate and how to spot their intrusions is still low among security professionals and the public. Because these actors operate differently than other cybercriminals, it is essential to understand how they conduct their schemes. Although some wire-wire activity is simple low-level credit card fraud, the largest threat to organizations is business email compromise. CTU™ researchers use the following terms to distinguish between wire-wire fraud types: Business email compromise (BEC) — Hijacking an email account or an email server to intercept business transactions and redirect payments Business email spoofing (BES) — Sending spoofed email from an external account pretending to be a company executive authorizing an irregular payment transaction CTU researchers have encountered many reports that use "BEC" to refer to activities better categorized as "BES." BEC is much more devious and harder to detect than BES. If these terms are used interchangeably, a potential victim may assume that verifying requests with the named executive using established communication channels will sufficiently mitigate the threat. However, this defense cannot prevent BEC fraud. How BEC works In BEC, an attacker compromises a seller's email account to position himself as a "man-in-the-middle" between the seller and a buyer in existing business transactions. The threat actor then uses his control of the seller's account to passively monitor the transaction. When it is time for payment details to be relayed to the buyer via an invoice, the threat actor intercepts the seller's email and changes the destination bank account for the buyer's payment. If the payment account does not appear to be suspicious, the buyer will likely submit the payment to the attacker's account. To completely and transparently control the communication between the buyer and seller, the attacker must be able to control and monitor the email chain between the two parties. The first step is to compromise a business's email account, which can be accomplished easily and inexpensively with various phishing kits and commodity malware. For approximately $30, a threat actor can send a large quantity of emails containing malicious attachments (referred to as "bombing" to a list of email addresses scraped from the target's web pages. Even if only a few recipients are compromised, the potential payoff for the attacker could be thousands to hundreds of thousands of dollars per email campaign. From the seller's point of view, the transaction appears to be normal until the buyer does not pay for the invoiced goods. The only suspicious aspect the seller might detect is the change of email address between the request for a quote and the PO. The buyer will not notice a problem until the seller fails to ship the purchased goods. The seller's email address does not change because the attacker controls that email account. If the threat actor is skilled at document forgery and generates a seemingly legitimate invoice, the buyer will likely believe that the seller cheated them. Not all wire-wire attackers are skilled. Many struggle to understand how their malware operates and how it is detected by antivirus software. CTU researchers have observed clumsily modified invoices, with payment details in a font that does not match the rest of the document and a bank account that is associated with an unrelated business name and is located in a different country than the seller. Regardless, BEC is effective against many targeted businesses. Case study When researching wire-wire activity, CTU researchers discovered that one of the most notable cyberheists had been executed by a Nigerian wire-wire group against an Indian chemical company and its U.S. customer. The customer, also a chemical company, sought to purchase a large quantity of chemicals from the Indian company. CTU researchers found that the wire-wire group had hijacked the email username and password of an employee at the Indian company. The company used a webmail application for its corporate email, and the employee login required only a username and password. Because employees did not have to provide another form of verification, the threat actors used the credentials to access and read the employee's emails. The attackers identified an opportunity when the U.S. company sent a price quote request to purchase $400,000 in chemicals from the Indian company. The threat actors added a rule to the employee's email to redirect all future email from the U.S. company to the attacker's email account. The attackers intercepted the U.S. company's purchase order and resent it from another email address that closely resembled the submitter's actual email address. At this point, the attackers established their MITM position between the buyer and the seller. The Indian company eventually sent an invoice that contained wire payment details. Because the invoice was sent to the attacker-generated email address, the threat actors modified the following information before forwarding it to the legitimate recipient at the U.S. company: The bank account number or International Bank Account Number (IBAN) for the attacker-controlled account The full name and address of the bank where the attackers' account was located The SWIFT/BIC code of the attackers' bank The U.S. chemical company unknowingly wired $400,000 into the attacker-controlled account. The threat actors then laundered the money through multiple accounts in different countries, making recovery impossible and the money trail difficult to trace. SOURCE: https://www.secureworks.com/research/wire-wire-a-west-african-cyber-threat 1 Like 1 Share |
Autos / Re: 2007 Upgraded To 2010 Mercedes Benz G-wagon @ 15.5m by SleakBuzzPR: 7:01am On May 14, 2018 |
Autos / Re: Lagos: 2005 Acura Mdx @850k (No duty) by SleakBuzzPR: 6:59am On May 14, 2018 |
Lelepeautos: Apologise and all my posts on your thread will be erased. I will demarket you on this forum before you blink twice. |
Autos / Re: 2006 Nissan Altima @ 530k by SleakBuzzPR: 6:58am On May 14, 2018 |
. |
Autos / Re: Lagos: 2008 Honda Accord @ 1.230m by SleakBuzzPR: 6:55am On May 14, 2018 |
. |
Autos / Re: Ibadan: Toks. 2010 Toyota Venza by SleakBuzzPR: 6:54am On May 14, 2018 |
. |
Autos / Re: Lagos: 2004 Toyota Corolla Sport@1.150m by SleakBuzzPR: 6:53am On May 14, 2018 |
. |
Autos / Re: Lagos: 2005 Acura Mdx @850k (No duty) by SleakBuzzPR: 2:01am On May 14, 2018 |
Lelepeautos: So lets just say we are buying the body alone? U dey craze sir 3 Likes |
Politics / Re: President Buhari Returns To Nigeria From UK Medical Trip (Photos, Video) by SleakBuzzPR: 10:39pm On May 11, 2018 |
Click like for no reason 69 Likes |
Celebrities / Re: Checkout Efe 2014 Throwback Photo by SleakBuzzPR: 3:55pm On May 10, 2018 |
His past looks better than his present. Quite unfortunate.... No endorsement deal. No hit song... No nothing... Just a few strands of wretched beards. Your money go soon finish. 21 Likes
|
Travel / Re: 8 Signs Of Tiredness That Makes It Dangerous To Drive by SleakBuzzPR: 2:15pm On May 10, 2018 |
Just drink Black Panther and your generation will never know sleep while driving... Available for distribution nationwide. Head Office....243 Iweka Road Onitsha 1 Like
|
Crime / Re: Abba Kyari Recovered N200k Phone That Was Stolen - Man Reveals How by SleakBuzzPR: 2:14pm On May 10, 2018 |
einsteine: Yen yen yen yen
|
Travel / Re: Loaded Truck Ram Into Residential Houses In Iwaro , Benue - Pictures by SleakBuzzPR: 2:11pm On May 10, 2018 |
It's plan work.....be looking. 2 Likes
|
(1) (2) (3) (4) (5) (6) (7) (8) (9) (10) (of 10 pages)
(Go Up)
Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health religion celebs tv-movies music-radio literature webmasters programming techmarket Links: (1) (2) (3) (4) (5) (6) (7) (8) (9) (10) Nairaland - Copyright © 2005 - 2024 Oluwaseun Osewa. All rights reserved. See How To Advertise. 47 |