By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: New Investment Scams Use Facebook Ads, RDGA Domains, and IP Checks to Filter Victims
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > New Investment Scams Use Facebook Ads, RDGA Domains, and IP Checks to Filter Victims
Computing

New Investment Scams Use Facebook Ads, RDGA Domains, and IP Checks to Filter Victims

News Room
Last updated: 2025/05/06 at 10:13 AM
News Room Published 6 May 2025
Share
SHARE

Cybersecurity researchers have lifted the lid on two threat actors that orchestrate investment scams through spoofed celebrity endorsements and conceal their activity through traffic distribution systems (TDSes).

The activity clusters have been codenamed Reckless Rabbit and Ruthless Rabbit by DNS threat intelligence firm Infoblox.

The attacks have been observed to lure victims with bogus platforms, including cryptocurrency exchanges, which are then advertised on social media platforms. An important aspect of these scams is the use of web forms to collect user data.

“Reckless Rabbit creates ads on Facebook that lead to fake news articles featuring a celebrity endorsement for the investment platform,” security researchers Darby Wise, Piotr Glaska, and Laura da Rocha said. “The article includes a link to the scam platform which contains an embedded web form persuading the user to enter their personal information to ‘register’ for the investment opportunity.”

Some of these forms, besides requesting users’ names, phone numbers, and email addresses, offer the ability to auto-generate a password, a key piece of information that’s used to progress to the next phase of the attack — validation checks.

The threat actors perform HTTP GET requests to legitimate IP validation tools, such as ipinfo[.]io, ipgeolocation[.]io, or ipapi[.]co, in order to filter out traffic from countries that they are not interested in. Checks are also carried out to ensure that the provided numbers and email addresses are authentic.

Should the user be deemed worthy of exploitation, they are subsequently routed through a TDS that either takes them directly to the scam platform where they are coaxed into parting with their funds by promising high returns, or to a different page that instructs them to wait for a call from their representative.

“Some campaigns use call centers to provide the victims with instructions on how to set up an account and transfer money into the fake investment platform,” the researchers explained. “For users who do not pass the validation step, many campaigns will simply display a ‘thank you’ landing page.”

An important aspect of the activity is the use of a registered domain generation algorithm (RDGA) to set up domain names for the sketchy investment platforms, a technique also adopted by other threat actors like Prolific Puma, Revolver Rabbit, and VexTrio Viper.

Cybersecurity

Unlike traditional domain generation algorithms (DGAs), RDGAs a secret algorithm to register all the domain names. Reckless Rabbit is said to have been creating domains as far back as April 2024, primarily targeting users in Russia, Romania, and Poland, while excluding traffic from Afghanistan, Somalia, Liberia, Madagascar, and others.

The Facebook ads used to direct users to the fake news articles are interspersed with advertising content related to items listed for sale on marketplaces like Amazon in a bid to evade detection and enforcement action.

What’s more, the ads contain unrelated images and display a decoy domain (e.g., “amazon[.]pl”) that’s different from the actual domain the user will be redirected to once they click on the link (e.g., “tyxarai[.]org”).

Ruthless Rabbit, on the other hand, is believed to have been actively running investment scam campaigns since at least November 2022 that are aimed at Eastern European users. What sets this threat actor apart is that they run their own cloaking service (“mcraftdb[.]tech”) to perform validation checks.

Users who get past the verification checks are subsequently routed to an investment platform where they are urged to enter their financial information to complete the registration process.

“A TDS enables threat actors to strengthen their infrastructure, making it more resilient by providing the ability to hide malicious content from security researchers and bots,” Infoblox said.

This is not the first time such fraudulent investment scam campaigns have been discovered in the wild. In December 2024, ESET exposed a similar scheme dubbed Nomani that uses a combination of social media malvertising, company-branded posts, and artificial intelligence (AI) powered video testimonials featuring famous personalities.

Then last month, Spanish authorities revealed they have arrested six individuals aged between 34 and 57 for allegedly running a large-scale cryptocurrency investment scam that used AI tools to generate deepfake ads featuring popular public figures to deceive people.

Renee Burton, vice president of threat intelligence at Infoblox, told The Hacker News that they “would have to take a closer look to see if there is any evidence” to ascertain if there are any connections between these activities and those conducted by Reckless Rabbit and Ruthless Rabbit.

“Threat actors like Reckless and Ruthless Rabbits will be relentless in their attempts to trick as many users as possible,” the researchers said. “Because these types of scams have proven to be highly profitable for them, they will continue to grow rapidly—both in number and sophistication.”

Mystery Box Scams Proliferate via Facebook Ads

The development comes as Bitdefender is warning of a spike in sophisticated subscription scams that a network of more than 200 convincing fake websites to trick users into paying monthly subscriptions and sharing their credit card data.

“Criminals create Facebook pages and take out full ads to promote the already classic ‘mystery box’ scam and other variants,” the Romanian company said. “The ‘mystery box’ scam has evolved and now includes almost hidden recurring payments, alongside links to websites to various shops. Facebook is used as the main platform for these new and enhanced mystery box scams.”

The rogue sponsored ads advertise clearance sales from brands like Zara or offer a chance to buy a “mystery box” containing Apple products and seek to entice users by claiming that they can grab one of them by paying a minimal sum of money, sometimes as low as $2.

The cybercriminals deploy various tricks to sidestep detection efforts, including creating multiple versions of the ad, only one of which is malicious, while the others display random product images.

Cybersecurity

These scams, like the ones perpetrated by Reckless Rabbit and Ruthless Rabbit, incorporate a survey component to ensure that the victims are real people and not bots. Additionally, the payment pages rope unsuspecting users into a subscription program that earns the threat actors recurring revenues under the pretext of giving them a discount.

“Criminals have been pumping funds in ads promoting impersonated content creators, using the same subscription model that seems to be now the driving revenue stream of these scams,” Bitdefender researchers Răzvan Gosa and Silviu Stahie said.

“Scammers often change the impersonated brands, and they’ve begun expanding past the existing mystery boxes. They are now trying to sell low-quality products or imitation articles, fake investments, supplements, and much more.”

U.S. Treasury Sanctions Junta-Linked Militia in Myanmar Over Scam Compounds

The findings also follow a wave of sanctions imposed by the U.S. Department of the Treasury against the Myanmar-linked Karen National Army (KNA) for assisting organized crime syndicates operate multi-billion-dollar scam compounds, as well as facilitating human trafficking and cross-border smuggling.

The actions also target the group’s leader Saw Chit Thu, and his two sons, Saw Htoo Eh Moo and Saw Chit Chit. Saw Chit Thu was sanctioned by the United Kingdom in 2023 and the European Union in 2024 for becoming a key enabler of scam operations in the region.

“Cyber scam operations, such as those run by the KNA, generate billions in revenue for criminal kingpins and their associates, while depriving victims of their hard-earned savings and sense of security,” said Deputy Secretary Michael Faulkender.

In these so-called romance baiting scams, fraudsters — who are themselves trafficked to the scam sites by luring them with high-paying jobs — are coerced into targeting strangers online, building rapport with them over time, and then induce them to invest in bogus cryptocurrency and trading platforms controlled by the criminal actors.

“The KNA profits from cyber scam schemes on an industrial scale by leasing land it controls to other organized crime groups, and providing support for human trafficking, smuggling, and the sale of utilities used to provide energy to scam operations,” the Treasury Department said. “The KNA also provides security at scam compounds in Karen State.”

The United Nations Office on Drugs and Crime (UNODC) last month divulged the scam centers are still expanding despite recent crackdowns, generating annual profits to the tune of about $40 billion.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article What can we expect from the crypto bill?  – UKTN
Next Article Amazon Introduces Big Sale Across Nearly Every M4 iPad Pro, Plus Get the Apple Pencil Pro for $99
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

A ‘Grand Unified Theory’ of Math Just Got a Little Bit Closer
Gadget
GNU Binutils 2.45 Released With Continued Work Around SFrame Stack Tracing
Computing
10 Pro Photography Tips I’ve Learned From Reviewing Hundreds of Cameras
News
Top 10 AI Agents for Real Estate To Automate Lead Management
Computing

You Might also Like

Computing

GNU Binutils 2.45 Released With Continued Work Around SFrame Stack Tracing

1 Min Read
Computing

Top 10 AI Agents for Real Estate To Automate Lead Management

32 Min Read
Computing

AI Hallucinations Are Costing Businesses Millions: What BAML Is Doing to Prevent Them | HackerNoon

6 Min Read
Computing

AMD SEV Optimizations Ready For Linux 6.17 Plus A 10x Improvement For Intel TDX

3 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?