cyble.com Open in urlscan Pro
192.0.78.152  Public Scan

URL: https://cyble.com/blog/new-wave-of-finacial-fraud-scammers-monitoring-social-media-complaints/
Submission: On February 19 via api from BY — Scanned from DE

Form analysis 2 forms found in the DOM

POST https://wordpress.com/email-subscriptions

<form action="https://wordpress.com/email-subscriptions" method="post" accept-charset="utf-8" data-blog="221651828" data-post_access_level="everybody" data-subscriber_email="" id="subscribe-blog" data-cb-wrapper="true">
  <div class="wp-block-jetpack-subscriptions__form-elements">
    <p id="subscribe-email">
      <label id="subscribe-field-label" for="subscribe-field" class="screen-reader-text"> Type your email… </label>
      <input required="required" type="email" name="email" style="font-size: 16px;padding: 15px 23px 15px 23px;border-radius: 50px;border-width: 1px;" placeholder="Type your email…" value="" id="subscribe-field">
    </p>
    <p id="subscribe-submit">
      <input type="hidden" name="action" value="subscribe">
      <input type="hidden" name="blog_id" value="221651828">
      <input type="hidden" name="source" value="https://cyble.com/blog/new-wave-of-finacial-fraud-scammers-monitoring-social-media-complaints/">
      <input type="hidden" name="sub-type" value="subscribe-block">
      <input type="hidden" name="app_source" value="atomic-subscription-modal-lo">
      <input type="hidden" name="redirect_fragment" value="subscribe-blog">
      <input type="hidden" name="lang" value="en_US">
      <input type="hidden" id="_wpnonce" name="_wpnonce" value="53c51a23d3"><input type="hidden" name="_wp_http_referer" value="/blog/new-wave-of-finacial-fraud-scammers-monitoring-social-media-complaints/"><input type="hidden" name="post_id"
        value="14915"> <button type="submit" class="wp-block-button__link" style="font-size: 16px;padding: 15px 23px 15px 23px;margin: 0px; margin-left: 10px;border-radius: 50px;border-width: 1px;" name="jetpack_subscriptions_widget"> Subscribe
      </button>
    </p>
  </div>
</form>

<form id="jp-carousel-comment-form" data-cb-wrapper="true">
  <label for="jp-carousel-comment-form-comment-field" class="screen-reader-text">Write a Comment...</label>
  <textarea name="comment" class="jp-carousel-comment-form-field jp-carousel-comment-form-textarea" id="jp-carousel-comment-form-comment-field" placeholder="Write a Comment..."></textarea>
  <div id="jp-carousel-comment-form-submit-and-info-wrapper">
    <div id="jp-carousel-comment-form-commenting-as">
      <fieldset>
        <label for="jp-carousel-comment-form-email-field">Email</label>
        <input type="text" name="email" class="jp-carousel-comment-form-field jp-carousel-comment-form-text-field" id="jp-carousel-comment-form-email-field">
      </fieldset>
      <fieldset>
        <label for="jp-carousel-comment-form-author-field">Name</label>
        <input type="text" name="author" class="jp-carousel-comment-form-field jp-carousel-comment-form-text-field" id="jp-carousel-comment-form-author-field">
      </fieldset>
      <fieldset>
        <label for="jp-carousel-comment-form-url-field">Website</label>
        <input type="text" name="url" class="jp-carousel-comment-form-field jp-carousel-comment-form-text-field" id="jp-carousel-comment-form-url-field">
      </fieldset>
    </div>
    <input type="submit" name="submit" class="jp-carousel-comment-form-button" id="jp-carousel-comment-form-button-submit" value="Post Comment">
  </div>
</form>

Text Content

Skip to content
Download Threat Landscape Report 2023 - 2024

Report an Incident

Talk to Sales

We are Hiring!

Login
Login
 * ProductsMenu Toggle
    * For Enterprises(B2B) and GovernmentsMenu Toggle
      * Cyble VisionSee Cyble in Action
        Award-winning cyber threat intelligence platform, designed to provide
        enhanced security through real-time intelligence and threat detection.
      * Cyble Hawk
        Protects sensitive information and assets from cyber threats with its
        specialized threat detection and intelligence capabilities built for
        federal bodies.
    * For Enterprises(B2B) and Individuals(B2C)Menu Toggle
      * AmIBreached
        Enables consumers and organizations to Identify, Prioritize and Mitigate
        darkweb risks.
      * Cyble OdinNew
        The most advanced internet-scanning tool in the industry for real-time
        threat detection and cybersecurity
      * The Cyber ExpressSubscribe
        #1 Trending Cyber Security News and Magazine
    * We’ve just released an update!
      Cyble has an update that enhances ASM, CTI and more...
      Menu Toggle
      * Schedule a Demo

 * SolutionsMenu Toggle
    * Detect > Validate > CloseMenu Toggle
      * Attack Surface Management
        Ensure digital security by identifying and mitigating threats with
        Cyble's Attack Surface Management
      * Brand Intelligence
        Comprehensive protection against online brand abuse, including brand
        impersonation, phishing, and fraudulent domains.
      * Cyber Threat Intelligence
        Gain insights and enhance your defense with AI-driven analysis and
        continuous threat monitoring
    * Menu ItemMenu Toggle
      * Dark Web Monitoring
        Stay vigilant and ahead of cybercriminals with Cyble's comprehensive
        Dark Web Monitoring.
      * Vulnerability Management
        Advanced scanning, risk evaluation, and efficient remediation strategies
        to protect against cyber threats.
      * Takedown and Disruption
        Combat online fraud and cybercrime by removing fraudulent sites and
        content, and disrupting malicious campaigns with #1 takedown services by
        Cyble.
    * Solutions by Industry
      
      Menu Toggle
      * Healthcare & Pharmaceuticals
      * Financial Services
        
      * Retail and CPG
      * Technology Industry
      * Educational Platform

 * Why Cyble?Menu Toggle
   * Compare Cyble
     Learn why Cyble is a key differentiator when it comes to proactive
     cybersecurity.
     Menu Toggle
     * Industry Recognition
     * Customer Stories
   * Solutions by Role
     
     Menu Toggle
     * Information Security
     * Corporate Security
     * Marketing
       
 * ResourcesMenu Toggle
   * Blog
     Discover the latest in cybersecurity with Cyble's blog, featuring a wealth
     of articles, research findings, and insights. CRIL is an invaluable
     resource for anyone interested in the evolving world of cyber threats and
     defenses, offering expert analysis and updates.
     Menu Toggle
     * Thought Leadership
     * Events
       Conferences, Webinars, Training sessions and more…
     * Threat AssessmentFree
     * SAMA Compliance
   * Knowledge Hub
     Cyble's Knowledge Hub is a central resource for current cybersecurity
     trends, research, and expert opinions.
     Menu Toggle
     * Case Studies
       Dive into Cyble's case studies to discover real-world applications of
       their cybersecurity solutions. These studies provide valuable insights
       into how Cyble addresses various cyber threats and enhances digital
       security for different organizations.
     * Research Reports
     * Whitepapers
   * Research Reports
     
 * CompanyMenu Toggle
   * Our Story
     Learn about Cyble's journey and mission in the cybersecurity landscape.
     Menu Toggle
     * Leadership Team
       Meet our leadership team.
   * CareersWe are hiring!
     Explore a career with Cyble and contribute to cutting-edge cybersecurity
     solutions. Check out Cyble's career opportunities.
     Menu Toggle
     * Press
 * PartnersMenu Toggle
   * Cyble Partner Network (CPN)
   * Partner Login
   * Become a PartnerRegister

Schedule a Demo
Schedule a Demo

Main Menu
 * ProductsMenu Toggle
    * For Enterprises(B2B) and GovernmentsMenu Toggle
      * Cyble VisionSee Cyble in Action
        Award-winning cyber threat intelligence platform, designed to provide
        enhanced security through real-time intelligence and threat detection.
      * Cyble Hawk
        Protects sensitive information and assets from cyber threats with its
        specialized threat detection and intelligence capabilities built for
        federal bodies.
    * For Enterprises(B2B) and Individuals(B2C)Menu Toggle
      * AmIBreached
        Enables consumers and organizations to Identify, Prioritize and Mitigate
        darkweb risks.
      * Cyble OdinNew
        The most advanced internet-scanning tool in the industry for real-time
        threat detection and cybersecurity
      * The Cyber ExpressSubscribe
        #1 Trending Cyber Security News and Magazine
    * We’ve just released an update!
      Cyble has an update that enhances ASM, CTI and more...
      Menu Toggle
      * Schedule a Demo

 * SolutionsMenu Toggle
    * Detect > Validate > CloseMenu Toggle
      * Attack Surface Management
        Ensure digital security by identifying and mitigating threats with
        Cyble's Attack Surface Management
      * Brand Intelligence
        Comprehensive protection against online brand abuse, including brand
        impersonation, phishing, and fraudulent domains.
      * Cyber Threat Intelligence
        Gain insights and enhance your defense with AI-driven analysis and
        continuous threat monitoring
    * Menu ItemMenu Toggle
      * Dark Web Monitoring
        Stay vigilant and ahead of cybercriminals with Cyble's comprehensive
        Dark Web Monitoring.
      * Vulnerability Management
        Advanced scanning, risk evaluation, and efficient remediation strategies
        to protect against cyber threats.
      * Takedown and Disruption
        Combat online fraud and cybercrime by removing fraudulent sites and
        content, and disrupting malicious campaigns with #1 takedown services by
        Cyble.
    * Solutions by Industry
      
      Menu Toggle
      * Healthcare & Pharmaceuticals
      * Financial Services
        
      * Retail and CPG
      * Technology Industry
      * Educational Platform

 * Why Cyble?Menu Toggle
   * Compare Cyble
     Learn why Cyble is a key differentiator when it comes to proactive
     cybersecurity.
     Menu Toggle
     * Industry Recognition
     * Customer Stories
   * Solutions by Role
     
     Menu Toggle
     * Information Security
     * Corporate Security
     * Marketing
       
 * ResourcesMenu Toggle
   * Blog
     Discover the latest in cybersecurity with Cyble's blog, featuring a wealth
     of articles, research findings, and insights. CRIL is an invaluable
     resource for anyone interested in the evolving world of cyber threats and
     defenses, offering expert analysis and updates.
     Menu Toggle
     * Thought Leadership
     * Events
       Conferences, Webinars, Training sessions and more…
     * Threat AssessmentFree
     * SAMA Compliance
   * Knowledge Hub
     Cyble's Knowledge Hub is a central resource for current cybersecurity
     trends, research, and expert opinions.
     Menu Toggle
     * Case Studies
       Dive into Cyble's case studies to discover real-world applications of
       their cybersecurity solutions. These studies provide valuable insights
       into how Cyble addresses various cyber threats and enhances digital
       security for different organizations.
     * Research Reports
     * Whitepapers
   * Research Reports
     
 * CompanyMenu Toggle
   * Our Story
     Learn about Cyble's journey and mission in the cybersecurity landscape.
     Menu Toggle
     * Leadership Team
       Meet our leadership team.
   * CareersWe are hiring!
     Explore a career with Cyble and contribute to cutting-edge cybersecurity
     solutions. Check out Cyble's career opportunities.
     Menu Toggle
     * Press
 * PartnersMenu Toggle
   * Cyble Partner Network (CPN)
   * Partner Login
   * Become a PartnerRegister

 * Cybercrime

 * December 27, 2022


NEW WAVE OF FINANCIAL FRAUD: SCAMMERS MONITORING SOCIAL MEDIA COMPLAINTS

CRIL analyzes the financial fraud campaign where scammers are monitoring
complaint posts on social media to target users of IRCTC, and Indian Banks.
Cyble
Security Threat Intelligence Products and Services
4.7
20 Ratings
Submit a review
As of 19 Feb 2024
 * Reviewed February 9, 2024
   
   "Best Threat Intelligence Tool ever ..." (read more)

 * Reviewed February 9, 2024
   
   "Cyble Proactive threat intelligence, Seamless integration for Enhance Cyber
   Defence. ..." (read more)

 * Reviewed February 8, 2024
   
   "Monitor and Control your exposure...." (read more)

 * Reviewed January 31, 2024
   
   "Empowering cybersecurity with innovative Threat Intelligence Solutions..."
   (read more)

 * Reviewed January 30, 2024
   
   "Excellent product and gives empowerment to the organization to receive an
   early alert..." (read more)

 * Reviewed January 25, 2024
   
   "Cyble: Empowering Cybersecurity with Real-time Intelligence..." (read more)

 * Reviewed January 17, 2024
   
   "Improve your threat intelligence with Cyble Vision ..." (read more)

 * Reviewed January 1, 2024
   
   "A stronge cyber defense with potential for integrated enhancement. ..."
   (read more)

 * Reviewed December 29, 2023
   
   "Strong support from cyble team for take down ..." (read more)

 * Reviewed December 29, 2023
   
   "Future of brand Monitoring - Cyble Vision..." (read more)

 * Reviewed December 27, 2023
   
   "Vigilant Monitoring, Exceptional Customer Support, Complete Peace of Mind.
   ..." (read more)

 * Reviewed December 27, 2023
   
   "Enhanced cyber security posture. ..." (read more)

 * Reviewed December 22, 2023
   
   "Strongly recommended for visibility for Threat intelligence..." (read more)

 * Reviewed December 19, 2023
   
   "Your ultimate choice for AI powered Threat Intelligence!..." (read more)

 * Reviewed December 10, 2023
   
   "Cutting-Edge Threat Intelligent Platform..." (read more)

 * Reviewed August 28, 2023
   
   "Review of Cyble..." (read more)

 * Reviewed April 14, 2023
   
   "Very good threat intel, just needs more polish..." (read more)

 * Reviewed October 27, 2021
   
   "Cyble story resonates with its products and the team delivered what they
   said they would..." (read more)

 * Reviewed October 12, 2021
   
   "Exceptional product and service. Highly recommended...." (read more)

 * Reviewed August 9, 2021
   
   "Very Good..." (read more)


IRCTC AND MULTIPLE INDIAN BANKING USERS AT RISK



Twitter is a popular social media platform that allows people from all walks of
life to share their thoughts, ideas, and experiences with others. Users can
express their opinions, ask questions, and share their knowledge with a wide
audience.

With its reach and influence, Twitter has become a powerful tool for
communication and connection. Additionally, Twitter has become a platform for
users to voice their complaints and bring attention to issues that matter to
them.

Recently, Cyble Research and Intelligence Labs discovered a scam that is
targeting citizens in India. The scammers use Twitter to find potential victims
by monitoring user complaint tweets. These tweets, which are meant to bring
attention to issues and problems, are being exploited by cybercriminals to
target their victims.

Technical Content! Subscribe to Unlock


Sign up and get access to Cyble Research and Intelligence Labs' exclusive
contents


Email
Unlock this Content



We also noticed a scam involving the Indian Railway Catering and Tourism
Corporation (IRCTC). The scammers seem to monitor Twitter for complaints about
the Indian Railway, and when they find a victim’s contact information, they will
call to initiate the scam.

The figure below shows one example of a complaint tweet posted by a user and the
subsequent call received by the scammer.

Figure 1 – IRCTC complaint posted by the user on Twitter



Upon seeing the victim’s tweet, the scammer pretends to be an IRCTC customer
support representative and calls the victim to request personal information such
as the Train PNR number, order number, refund amount, and payment method.

Even if the victim fails to provide the requested information, the scammer
continues their efforts to successfully carried out financial fraud using
various techniques.

The same victim may also be targeted by multiple scammers, who may use different
tactics to gain control of the victim’s bank account through UPI fraud. Some
examples of UPI frauds that scammers may use are:


LINKING VICTIM’S MOBILE NUMBER OR ACCOUNT THROUGH UPI TO SCAMMER DEVICE:



In this case, the scammer contacted the victim over call and requested personal
information, including which UPI payment app they used. The scammer sent an SMS
during the call with an activation code, as shown in Figure 2.

Once the victim receives the message, the scammer asks them to forward an SMS to
a specific number.

According to the article on UPI fraud by RazorPay, the scammer can link the
victim’s mobile number or account to their own device through UPI once the
victim forwards the received message. The screenshot below shows the scammer’s
call history and the verification code received during the call.

Figure 2 – Call history with Scammer and UPI activation message




SCAMMERS SEND THE GOOGLE FORM TO COLLECT SENSITIVE INFORMATION:



In certain instances, the scammer may request basic personal information from
the victim to avoid arousing suspicion and will send a Google form to collect
sensitive details, including the victim’s mobile number, UPI PIN, and other
personal information. The figure below shows an example of this:

Figure 3 – Google form link sent by a scammer to collect UPI pin



The mobile number of the scammer has negative comments related to the scam on
Truecaller, and they have used the Indian Railway logo as their WhatsApp profile
picture in an attempt to convince victims that they are a legitimate IRCTC
customer support representative.

Figure 4 – Negative review of the scammer’s mobile number and WhatsApp profile
using the Indian Railway logo




SCAMMER SENDS A PHISHING LINK OR MALICIOUS APK FILE ON WHATSAPP:



Scammers have been using Android malware in addition to other fraudulent
tactics. They may send a phishing link that downloads a malicious APK file to
infect the device, or they may send the malicious file via WhatsApp.

Scammers use such malicious APK files with names like “IRCTC customer.apk,”
“online complaint.apk,” or “complaint register.apk” to trick victims into
revealing their net banking credentials, UPI details, credit/debit card
information, and sometimes even their One-Time-Passwords (OTPs) used for
two-factor authentication (2FA) implemented by banks.

Figure 5 – Malicious APK file forwarded by the scammer



Related to the same scam, CRIL came across a phishing site
hxxps://mycomplainquery[.]in, which pretends to be the customer support site and
prompts victims for basic information such as name, mobile number, and complaint
query.

Figure 6 – Phishing page pretending to be customer support



The phishing website prompts the user to input the refund amount upon providing
the required information. It later offers various payment options, including
credit cards, online banking, and the Unified Payments Interface (UPI).

Figure 7 – Phishing site prompts for the refund amount Figure 8 – Phishing site
offers payment options



After the victim chooses the payment option on the phishing site, victims are
asked to enter sensitive banking information such as their UPI identification,
UPI personal identification number, net banking login details, credit card
information, and debit card details. This stolen data is then sent to the
Command and Control (C&C) server.

Figure 9 – Phishing site stealing sensitive banking details



After obtaining sensitive banking information, the phishing site may ask the
victim to install a malicious application to track the complaint status.
However, this application will also be used to steal incoming text messages from
the infected device.

Figure 10 – Phishing site downloads malicious Android app




TECHNICAL ANALYSIS 



APK Metadata Information  

 * App Name: complain register
 * Package Name: com.my.update
 * SHA256 Hash: f952c05d9df163cdc96938222c197ea10c9250b3e548a880b0c52faa9c4d6e28

The below figure shows the metadata information of the application. 

Figure 11 – Malicious Application Metadata Information



The malicious application will ask the victim to grant SMS permission upon
installation. It will then display a complaint tracking page and encourage the
victim to enter their complaint number, email address, and phone number.

Figure 12 – Malicious application prompts for permission and loads fake
complaint tracking page



The malware includes a SMSReceiver in the Manifest file, which allows it to
collect incoming SMS messages on an infected device and send them to a command
and control (C&C) server at hxxps://mycomplainquery[.]in/api/message.

Figure 13 – SMS Receiver stealing incoming SMS



The malware also connects to the endpoint hxxps://mycomplainquery[.]in/api/phone
to receive the phone number to send incoming SMS messages.

Figure 14 – Malware sending SMS on the number received from the C&C server



The IP address “217.21.94[.]24” was found to be hosting the C&C server
hxxps://mycomplainquery[.]in and communicating with the malicious APK file
“icici.apk”.

This APK file was part of a campaign that distributed info stealer malware to
target Indian bank customers as part of a reward scam. The connection between
the IP address and the APK file suggests that the same threat actor is behind
both scams.

Figure 15 – IP hosting C&C server involved in Reward scam



In addition to targeting IRCTC users, these scammers have also been targeting
users of various users from other brands and organizations such as MobiKwik,
Spicejet, and Indian banks. When users report complaints on social media,
scammers take advantage of the opportunity to carry out phishing attacks by
asking them to download malicious files to file their complaints and steal their
funds from bank accounts.

Some examples of this can be seen in the below image from different users who
have experienced this tactic.

Figure 16 – Users received a call from scammers after raising a complaint on
social media



We have observed a group of financially motivated scammers based in India
responsible for this scam. The same victims receive calls from different
scammers, each time pretending to be a customer support representative, claiming
to initiate the transfer of funds, and stealing money from their bank accounts
using different fraud tactics. This suggests that scammers attempt to deceive
and defraud their targets for financial gain.


CONCLUSION



The reward scam began in late 2020 and targeted various Indian banking users
through different themes. Recently, CRIL noticed that the scammers behind the
reward scam have started monitoring users’ refund complaints on social media to
identify potential victims and steal their funds using various techniques. This
demonstrates how cybercriminals are constantly finding new ways to exploit
people’s online activity and use it to their own benefit.

It is important for users to be aware of these scams and to be cautious when
providing personal information or downloading files online.


OUR RECOMMENDATIONS



We have listed some essential cybersecurity best practices that create the first
line of control against attackers. We recommend that our readers follow the best
practices given below:

 * Download and install software only from official app stores like Google Play
   Store or the iOS App Store.
 * Use a reputed anti-virus and internet security software package on your
   connected devices, such as PCs, laptops, and mobile devices.
 * Never share your Card Details, CVV number, Card PIN, and Net Banking
   Credentials with an untrusted source.
 * IRCTC or other legitimate organizations never ask for a Card PIN or UPI PIN
   with other banking information; avoid sharing such information over call.
 * Use strong passwords and enforce multi-factor authentication wherever
   possible.
 * Enable biometric security features such as fingerprint or facial recognition
   for unlocking the mobile device where possible.
 * Be wary of opening any links received via SMS or emails delivered to your
   phone.
 * Ensure that Google Play Protect is enabled on Android devices.
 * Be careful while enabling any permissions.
 * Keep your devices, operating systems, and applications updated.


MITRE ATT&CK® TECHNIQUES



TacticTechnique IDTechnique NameInitial AccessT1566PhishingInitial
AccessT1476Deliver Malicious App via Other Means.PersistenceT1402

 Broadcast ReceiversCollectionT1412Capture SMS
MessagesExfiltrationT1567Exfiltration Over Web Service


INDICATORS OF COMPROMISE (IOCS)



IndicatorsIndicator
TypeDescriptionf952c05d9df163cdc96938222c197ea10c9250b3e548a880b0c52faa9c4d6e28SHA256
 Hash of malicious APKbf0cbcea2df55ca0a0bdebec8f615bb71eba4636SHA1  Hash of
malicious APKf4a6093132a4765ffe9115f3bb386f6bMD5Hash of malicious
APKhxxps://mycomplainquery[.]inURLAndroid Malware Distribution URL & C&C server


RELATED

IRCTC (2019) ALLEGED USER DATA RESURFACED ON DARKWEB – 900,000+ USERS’ RECORDS
EXPOSED

The Indian Railway Catering and Tourism Corporation (IRCTC) provides an online
ticketing system for Indian Railways. As a subsidiary of the Indian Railways,
IRCTC handles the catering, tourism, and online ticketing operations of the
Indian Railways. Besides offering online ticketing facility, IRCTC is also
responsible for running India's first semi-high…

October 13, 2020

With 1 comment

TRENDS IN PHISHING ATTACKS AND THE INDUSTRIES COMMONLY TARGETED

Research shows that there has been a considerable uptick
in phishing attacks since the onset of the pandemic. Reports indicate that over
91% of information security breaches begin
with attackers launching phishing attacks on victims.   According to a report by
the Federal Bureau of Investigation (FBI), there were more than 11 times as many
phishing attacks and complaints in 2020 than in 2016. Out of all the malware…

June 13, 2021

In "COVID-19"

CON GAMES: FRAUDSTERS POSING AS VLES DUPING CSC BANK MITRA SCHEME SUBSCRIBERS

Cyble Research and Intelligence Labs analyzes the modus operandi of fraudsters
involved in the CSC Bank Mitra scam.

December 16, 2022

In "Phishing"

Search for your darkweb exposure



Use Cyble's Largest Dark Web Monitoring Engine to Assess Your Exposure. Make
Sure You're Aware of the Risks by Searching Through Our 150,447,938,145 Records!
We Have Over 50,000 Data Breaches, Several Hacking Forums, Conversations
Indexed.

Download Now





Share the Post:

PrevPreviousNew YouTube Bot Malware Spotted Stealing User’s Sensitive
Information
NextPure coder offers multiple malware for sale in Darkweb forumsNext


RELATED POSTS

VULNERABLE FORTINET DEVICES: LOW-HANGING FRUIT FOR THREAT ACTORS

February 16, 2024

NEW GO-BASED JKWERLO RANSOMWARE POSES A RISK TO FRENCH AND SPANISH USERS 

February 14, 2024

QUICK LINKS

Main Menu

 * Home
 * About Us
 * Blog
 * Cyble Partner Network (CPN)
 * Press
 * Responsible Disclosure
 * Knowledge Hub
 * Sitemap

PRODUCTS

Main Menu

 * AmIBreached
 * Cyble Vision
 * Cyble Hawk
 * Cyble Odin
 * The Cyber Express

SOLUTIONS

Main Menu

 * Attack Surface Management
 * Brand Intelligence
 * Cyber Threat Intelligence
 * Dark Web Monitoring
 * Takedown and Disruption
 * Vulnerability Management

PRIVACY POLICY

Main Menu

 * AmIBreached
 * Cyble Vision


© 2024. Cyble Inc.(Leading Cyber Threat Intelligence Company). All Rights
Reserved
Twitter Linkedin Youtube
Request a demo
Upcoming Events
Research Reports
Talk To Sales



DISCOVER MORE FROM CYBLE

Subscribe now to keep reading and get access to the full archive.

Type your email…

Subscribe

Continue reading

Scroll to Top
 

Loading Comments...

 

Write a Comment...
Email Name Website

We use cookies to ensure that we give you the best experience on our website. If
you continue to use this site we will assume that you are happy with it.Ok





×
We Value Your Privacy
Settings
NextRoll, Inc. ("NextRoll") and our 18 advertising partners use cookies and
similar technologies on this site and use personal data (e.g., your IP address).
If you consent, the cookies, device identifiers, or other information can be
stored or accessed on your device for the purposes described below. You can
click "Allow All" or "Decline All" or click Settings above to customise your
consent regarding the purposes and features for which your personal data will be
processed and/or the partners with whom you will share personal data.
NextRoll and our advertising partners process personal data to: ● Store and/or
access information on a device; ● Create a personalised content profile; ●
Select personalised content; ● Personalised advertising, advertising
measurement, audience research and services development; ● Services development.
For some of the purposes above, our advertising partners: ● Use precise
geolocation data. Some of our partners rely on their legitimate business
interests to process personal data. View our advertising partners if you wish to
provide or deny consent for specific partners, review the purposes each partner
believes they have a legitimate interest for, and object to such processing.
If you select Decline All, you will still be able to view content on this site
and you will still receive advertising, but the advertising will not be tailored
for you. You may change your setting whenever you see the Manage consent
preferences on this site.
Decline All
Allow All
Manage consent preferences