Welcome, Guest: Register On Nairaland / LOGIN! / Trending / Recent / New
Stats: 3,155,294 members, 7,826,170 topics. Date: Monday, 13 May 2024 at 10:38 AM

SleakBuzzPR's Posts

Nairaland Forum / SleakBuzzPR's Profile / SleakBuzzPR's Posts

(1) (2) (3) (4) (5) (6) (7) (8) (9) (10) (of 10 pages)

Health / Re: Young Boy Dies After Being Bitten By Snake In A Primary School In Delta. Photos by SleakBuzzPR: 8:42pm On May 28, 2018
NwaChibuzor100:
That boy is not strong at all. Firstly how snakr go bite you and you no go fit open your mouth say na wetin do you be this. To the extent of waiting about 24hrs and still kept shut. The boy in that pics should even be about 5 yrs old. When we were of his age we were taught how to counter snake venom and it worked for me severally in my fathers farm then. You pick up the snake that bit you, cut of the head with your mouth , chew it and swallow it. There are some enzymes in the saliva that mixes with the snake's jacobsens organ and the remaining venom in that head. This reaction creates another reaction in the gastric acid of the GIT which in turn formulates to form an anti venom. The boy Bleep up mehn. If baba God secretary ask am wetin send am come, how e go fit talk say na snake send am go yonder.

RIP son.

I hope you understand how insane you sound blaming the poor boy for his demise.

When such calamity befalls your child in the future, remember this illmannered comment you made here.

May the heavens bless you with the kind of joy you derive from making a mockery of the agony of this poor family.

8 Likes

Celebrities / Re: Can Sinzu Stage A Successful Come Back Into The Nigerian Music Industry ? by SleakBuzzPR: 8:05pm On May 28, 2018
Ask yourself this....

Can you blow twice?

His case couldn't qualify to be called a blow....maybe a knock.

Can you knock twice?

7 Likes

Travel / Re: Four Killed In Accident Along Benin-Auchi Expressway (Graphic Photos) by SleakBuzzPR: 3:21pm On May 28, 2018
Shiiiiit

3 Likes

Politics / Re: National Assembly Members Notorious For Bribe Seeking- Jega by SleakBuzzPR: 3:16pm On May 28, 2018
Shiiiiiiithole

Crime / Re: Man Brutalizes His Wife Who Just Gave Birth. See How She Looks. Photos by SleakBuzzPR: 1:31pm On May 28, 2018
Jeeeeeesu

2 Likes

Business / Re: Nigerian Digital Publishing Startup: Reports First Profitable Quarter by SleakBuzzPR: 9:07am On May 26, 2018
revontuli:


They are more profitable than Uber and Twitter, who have zero profit and been burning investor money for years.


You don't know what you are saying...

1 Like

Jokes Etc / Rare Picture Of Seun & Lalastica - Photo by SleakBuzzPR: 8:14am On May 26, 2018
After banning people tire....they decided to take a selfie together grin

20 Likes 2 Shares

Business / Re: Nigerian Digital Publishing Startup: Reports First Profitable Quarter by SleakBuzzPR: 8:12am On May 26, 2018
adebayo3449:
Nice one
$1 is abt #366

Calculator lomo....are you proud of yourself?

Business / Re: Nigerian Digital Publishing Startup: Reports First Profitable Quarter by SleakBuzzPR: 7:46am On May 26, 2018
The profit you have declared is what one guy will spend on drinks in one night at Quilox....

Don't cry....you will get there.

2 Likes

Phones / Re: 4 Things You Should Know If You Are Using A Phone With A Built-in Battery by SleakBuzzPR: 7:39am On May 25, 2018
A thread for Tecno and Infinix users.

Get a SAMSUNG S8 and you wont have to bother about this nonsense thread.

24 Likes 1 Share

Education / Re: JAMB: Reps Demand Reduction Of UMTE Fee To N3000 by SleakBuzzPR: 5:33am On May 25, 2018
Bad news for JAMB registrar and his goons....

Jobs/Vacancies / Re: Police Recruitment: Date For JAMB Exam, Centres Released by SleakBuzzPR: 8:18pm On May 24, 2018
Since when did Police start announcing JAMB examination dates?

1 Share

Education / Re: Drop One English Word Which Will Make People Check Their Dictionary by SleakBuzzPR: 8:11am On May 24, 2018
Kakaslococosisisizm

Webmasters / Re: Reasons To Stop Using Wordpress Internal Linking Plugins by SleakBuzzPR: 7:57am On May 24, 2018
Only a lazy and inexperienced domain administrator would even think of a linking plugin in the first place....
Celebrities / Re: Yahoo Boy: Investigate Hushpuppi - Deji Adeyanju Tells EFCC by SleakBuzzPR: 8:23pm On May 15, 2018
This nigga dey point finger...

If dem do am bad thing now....he go come online they say his life is in danger.

Here is why EFCC won't investigate hushpuppi:

1. A formal petition is required. These online noise don't count.

2. If it's based on suspicion, there must be a direct claimant alleging loss sequel to the activities of Hushpuppi.

3. EFCC can't go to Dubai to ask him how he makes his money even though we know it ain't legit.

My point is.....there are boundaries. Sitting in your house to tag EFCC with your 100naira data won't prompt anybody to expend resources after a wild goose chase.

If he has been duped....carry your proof and visit their office otherwise you simply hating.

What happened at Club 57 wasn't a random raid. A report was made about a few guys and they had to trace them to their chill zone since dem no get official address.

The only valid reason EFCC could currently decide to engage Hushpuppi for is to beg for GUCCI trousers.

I RISE......Coooooooooourt.

108 Likes 5 Shares

Jobs/Vacancies / Re: Urgent Vacancy For English Teacher At Sagab College, Ikorodu by SleakBuzzPR: 5:11pm On May 15, 2018
bruno419:
Can youeBrsupplyb83this: Need Funding....
PMPlease seeTuthe linkaebelow.
0hjE8k goshen26 TiAqBq mrrhymes101 6THaml joelsblog k6S1DU sleakbuzzpr aPl46Y emeritus001

I'm here sir....how may I help you?
Celebrities / Re: Shina Peller Celebrates His Birthday With New Photo by SleakBuzzPR: 5:03pm On May 14, 2018
jj
Autos / Re: 2007 Upgraded To 2010 Mercedes Benz G-wagon @ 15.5m by SleakBuzzPR: 7:45am On May 14, 2018
Lelepeautos:





lol... you're too small to damage what God started....
Regret while trying.... God is on His throne... Okere gan

Today is Monday.... God will give you the right accolade... Mark this day

Renowned Nincompoop!

I knew I was going to remove those things obviously.

You should learn never to throw the first jab.

Wish you success.
Programming / Wire Wire: A West African Cyber Threat - DELL by SleakBuzzPR: 7:41am On May 14, 2018
Below is the summary of a report submitted to FBI and CIA by DELL Technologies in U.S.A


"Nigerian prince" and "419" scams have plagued victims for decades and transitioned to the Internet in the 1990s. There are many variations and names for these scams, which originated in Nigeria. The scammers refer to their trade using the terms "yahoo yahoo" or "G-work," calling themselves "yahoo-yahoo boys," "yahoo boiz," or "G-boys." However, the simple con man fraud practiced by many West African-based threat actors is being replaced by a new crime they refer to as "wire-wire," "waya-waya," or "the new G-work." These terms have not entered the mainstream lexicon as of this publication and are not well-defined, but SecureWorks® Counter Threat Unit™ (CTU) research indicates that they refer to the evolution of low-level con games into more sophisticated and conventional cybercrime that is compromising businesses around the world. The businesses range in size and span industries from machinery manufacturers to countertop material manufacturers to chemical companies. The cybercriminals use spearphishing and malware to gain direct access to organizations' computers to facilitate the theft of large sums of money without the victim's knowledge.

A Facebook search for "wire-wire" reveals numerous groups and users operating in the open. They advertise their services or offer training courses about wire-wire to would-be criminals. Multiple social media platforms have a wealth of information about individual threat actors, but meticulous research is necessary to understand how these thefts are being accomplished.

Business email compromise

The Internet security industry has been aware of the evolution of largely African-based threat actors for several years. Security companies such as Trend Micro, ThreatConnect, Palo Alto, and FireEye have detailed the rise of this activity. However, awareness about how these threat actors operate and how to spot their intrusions is still low among security professionals and the public. Because these actors operate differently than other cybercriminals, it is essential to understand how they conduct their schemes. Although some wire-wire activity is simple low-level credit card fraud, the largest threat to organizations is business email compromise. CTU™ researchers use the following terms to distinguish between wire-wire fraud types:

Business email compromise (BEC) — Hijacking an email account or an email server to intercept business transactions and redirect payments
Business email spoofing (BES) — Sending spoofed email from an external account pretending to be a company executive authorizing an irregular payment transaction

CTU researchers have encountered many reports that use "BEC" to refer to activities better categorized as "BES." BEC is much more devious and harder to detect than BES. If these terms are used interchangeably, a potential victim may assume that verifying requests with the named executive using established communication channels will sufficiently mitigate the threat. However, this defense cannot prevent BEC fraud.

How BEC works

In BEC, an attacker compromises a seller's email account to position himself as a "man-in-the-middle" between the seller and a buyer in existing business transactions. The threat actor then uses his control of the seller's account to passively monitor the transaction. When it is time for payment details to be relayed to the buyer via an invoice, the threat actor intercepts the seller's email and changes the destination bank account for the buyer's payment. If the payment account does not appear to be suspicious, the buyer will likely submit the payment to the attacker's account.

To completely and transparently control the communication between the buyer and seller, the attacker must be able to control and monitor the email chain between the two parties. The first step is to compromise a business's email account, which can be accomplished easily and inexpensively with various phishing kits and commodity malware. For approximately $30, a threat actor can send a large quantity of emails containing malicious attachments (referred to as "bombing"wink to a list of email addresses scraped from the target's web pages. Even if only a few recipients are compromised, the potential payoff for the attacker could be thousands to hundreds of thousands of dollars per email campaign.

From the seller's point of view, the transaction appears to be normal until the buyer does not pay for the invoiced goods. The only suspicious aspect the seller might detect is the change of email address between the request for a quote and the PO. The buyer will not notice a problem until the seller fails to ship the purchased goods. The seller's email address does not change because the attacker controls that email account. If the threat actor is skilled at document forgery and generates a seemingly legitimate invoice, the buyer will likely believe that the seller cheated them.

Not all wire-wire attackers are skilled. Many struggle to understand how their malware operates and how it is detected by antivirus software. CTU researchers have observed clumsily modified invoices, with payment details in a font that does not match the rest of the document and a bank account that is associated with an unrelated business name and is located in a different country than the seller. Regardless, BEC is effective against many targeted businesses.

Case study

When researching wire-wire activity, CTU researchers discovered that one of the most notable cyberheists had been executed by a Nigerian wire-wire group against an Indian chemical company and its U.S. customer. The customer, also a chemical company, sought to purchase a large quantity of chemicals from the Indian company. CTU researchers found that the wire-wire group had hijacked the email username and password of an employee at the Indian company. The company used a webmail application for its corporate email, and the employee login required only a username and password. Because employees did not have to provide another form of verification, the threat actors used the credentials to access and read the employee's emails.

The attackers identified an opportunity when the U.S. company sent a price quote request to purchase $400,000 in chemicals from the Indian company. The threat actors added a rule to the employee's email to redirect all future email from the U.S. company to the attacker's email account. The attackers intercepted the U.S. company's purchase order and resent it from another email address that closely resembled the submitter's actual email address. At this point, the attackers established their MITM position between the buyer and the seller.

The Indian company eventually sent an invoice that contained wire payment details. Because the invoice was sent to the attacker-generated email address, the threat actors modified the following information before forwarding it to the legitimate recipient at the U.S. company:

The bank account number or International Bank Account Number (IBAN) for the attacker-controlled account
The full name and address of the bank where the attackers' account was located
The SWIFT/BIC code of the attackers' bank

The U.S. chemical company unknowingly wired $400,000 into the attacker-controlled account. The threat actors then laundered the money through multiple accounts in different countries, making recovery impossible and the money trail difficult to trace.


SOURCE:
https://www.secureworks.com/research/wire-wire-a-west-african-cyber-threat

1 Like 1 Share

Autos / Re: 2007 Upgraded To 2010 Mercedes Benz G-wagon @ 15.5m by SleakBuzzPR: 7:01am On May 14, 2018
grin
Autos / Re: Lagos: 2005 Acura Mdx @850k (No duty) by SleakBuzzPR: 6:59am On May 14, 2018
Lelepeautos:



Young man, if you're well trained you won't come to NL and be dissing... You've just exhibited that you are a mere nincompoop!

Tbh, i don't have your time....

Apologise and all my posts on your thread will be erased.

I will demarket you on this forum before you blink twice.
Autos / Re: 2006 Nissan Altima @ 530k by SleakBuzzPR: 6:58am On May 14, 2018
.
Autos / Re: Lagos: 2008 Honda Accord @ 1.230m by SleakBuzzPR: 6:55am On May 14, 2018
.
Autos / Re: Ibadan: Toks. 2010 Toyota Venza by SleakBuzzPR: 6:54am On May 14, 2018
.
Autos / Re: Lagos: 2004 Toyota Corolla Sport@1.150m by SleakBuzzPR: 6:53am On May 14, 2018
.
Autos / Re: Lagos: 2005 Acura Mdx @850k (No duty) by SleakBuzzPR: 2:01am On May 14, 2018
Lelepeautos:
Neatly used
ac, engine, gear, legs and fender needs to be fixed
contact: +2348100018739

So lets just say we are buying the body alone?

U dey craze sir grin

3 Likes

Politics / Re: President Buhari Returns To Nigeria From UK Medical Trip (Photos, Video) by SleakBuzzPR: 10:39pm On May 11, 2018
Click like for no reason grin

69 Likes

Celebrities / Re: Checkout Efe 2014 Throwback Photo by SleakBuzzPR: 3:55pm On May 10, 2018
His past looks better than his present.

Quite unfortunate....

No endorsement deal.
No hit song...
No nothing...

Just a few strands of wretched beards.

Your money go soon finish.

21 Likes

Travel / Re: 8 Signs Of Tiredness That Makes It Dangerous To Drive by SleakBuzzPR: 2:15pm On May 10, 2018
Just drink Black Panther and your generation will never know sleep while driving...

Available for distribution nationwide.

Head Office....243 Iweka Road Onitsha

1 Like

Crime / Re: Abba Kyari Recovered N200k Phone That Was Stolen - Man Reveals How by SleakBuzzPR: 2:14pm On May 10, 2018
einsteine:


There are ways to track a phone without sim card.

Using the IMEI number of a phone, you can know the current sim that is being used in the phone. So unless there is no sim in the phone, that's when it will be tracked. Lots of criminals are being caught with this everyday because they tink once they throw away the sim in the phone, that's all. Unfortunately for criminals, each time you make a phone call, the IMEI number is transmitted as part of the call information and that's how phone thieves are tracked.

Yen yen yen yen

Travel / Re: Loaded Truck Ram Into Residential Houses In Iwaro , Benue - Pictures by SleakBuzzPR: 2:11pm On May 10, 2018
grin

It's plan work.....be looking.

2 Likes

(1) (2) (3) (4) (5) (6) (7) (8) (9) (10) (of 10 pages)

(Go Up)

Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health
religion celebs tv-movies music-radio literature webmasters programming techmarket

Links: (1) (2) (3) (4) (5) (6) (7) (8) (9) (10)

Nairaland - Copyright © 2005 - 2024 Oluwaseun Osewa. All rights reserved. See How To Advertise. 47
Disclaimer: Every Nairaland member is solely responsible for anything that he/she posts or uploads on Nairaland.