Home Security ESET Research Podcast: Neanderthals, Mammoths and Telekopye

ESET Research Podcast: Neanderthals, Mammoths and Telekopye

by
0 comment
ESET Research Podcast: Neanderthals, Mammoths and Telekopye

ESET Analysis

ESET researchers focus on the dynamics inside and between numerous teams of scammers who use a Telegram bot known as Telekopye to rip-off folks on on-line marketplaces

On this episode of our podcast, ESET malware researchers speak concerning the dynamics inside and between numerous Neanderthal teams, the strategies that this horde of scammers makes use of to search out and choose the perfect Mammoths for searching, and particularly about Neanderthals educating one another how you can wield Telekopye successfully.

Whereas this may seem to be an odd matter for a podcast about cybersecurity, fairly the opposite. Telekopye is the identify of a extremely automated malicious toolkit applied as a Telegram bot that cybercriminals use to deceive unsuspecting customers on on-line marketplaces.

Within the almost 40 minutes of dialogue, ESET Malware Researchers Radek Jizba and Jakub Souček clarify to the host and ESET Distinguished Researcher Aryeh Goretsky why they selected the identify Telekopye and the way it connects with the Neanderthal and Mammoth nomenclature.

ESET consultants additionally dissect particular options provided by Telekopye and the totally different rip-off sorts it facilitates, whereas uncovering the geographical areas these Neanderthals goal and the way they choose their victims. The researchers additionally supply the insights they gained by infiltrating Neanderthal teams, revealing their business-like construction full with strict hierarchies, promotions, coaching supplies, and taxes. Telekopye’s success price and payout construction can be mentioned.

See also  Lack of skills causing AI setbacks, says research

This episode provides invaluable insights on how you can spot and mitigate these market scams, so if you wish to keep away from being scammed throughout your subsequent on-line swap, be certain that to pay attention and have your notepad prepared.

For extra insights on the Telekopye toolkit and different related cyberthreats, observe ESET analysis on X (formerly known as Twitter), and take a look at our newest blogposts and white papers on WeLiveSecurity.com. For those who like what you hear, subscribe for extra on Spotify, Google Podcasts, Apple Podcasts, or PodBean.



Source link

You may also like

cbn (2)

Discover the latest in tech and cyber news. Stay informed on cybersecurity threats, innovations, and industry trends with our comprehensive coverage. Dive into the ever-evolving world of technology with us.

© 2024 cyberbeatnews.com – All Rights Reserved.