KrebsOnSecurity not too long ago heard from a reader whose boss’s e-mail account received phished and was used to trick one of many firm’s clients into sending a big cost to scammers. An investigation into the attacker’s infrastructure factors to a long-running Nigerian cybercrime ring that’s actively concentrating on established corporations within the transportation and aviation industries.

Picture: Shutterstock, Mr. Teerapon Tiuekhom.
A reader who works within the transportation business despatched a tip a few latest profitable phishing marketing campaign that tricked an govt on the firm into getting into their credentials at a pretend Microsoft 365 login web page. From there, the attackers shortly mined the manager’s inbox for previous communications about invoices, copying and modifying a few of these messages with new bill calls for that had been despatched to a few of the firm’s clients and companions.
Talking on situation of anonymity, the reader stated the ensuing phishing emails to clients got here from a newly registered area title that was remarkably just like their employer’s area, and that not less than certainly one of their clients fell for the ruse and paid a phony bill. They stated the attackers had spun up a look-alike area just some hours after the manager’s inbox credentials had been phished, and that the rip-off resulted in a buyer struggling a six-figure monetary loss.
The reader additionally shared that the e-mail addresses within the registration data for the imposter area — [email protected] — is tied to many such phishing domains. Certainly, a search on this e-mail handle at DomainTools.com finds it’s related to not less than 240 domains registered in 2024 or 2025. Just about all of them mimic professional domains for corporations within the aerospace and transportation industries worldwide.
An Web seek for this e-mail handle reveals a humorous blog post from 2020 on the Russian discussion board hackware[.]ru, which discovered [email protected] was tied to a phishing assault that used the lure of phony invoices to trick the recipient into logging in at a pretend Microsoft login web page. We’ll come again to this analysis in a second.
JUSTY JOHN
DomainTools exhibits that a few of the early domains registered to [email protected] in 2016 embody different helpful data. For instance, the WHOIS data for alhhomaidhicentre[.]biz reference the technical contact of “Justy John” and the e-mail handle [email protected].
A search at DomainTools discovered [email protected] has been registering one-off phishing domains since not less than 2012. At this level, I used to be satisfied that some safety firm absolutely had already revealed an evaluation of this explicit menace group, however I didn’t but have sufficient data to attract any strong conclusions.
DomainTools says the Justy John e-mail handle is tied to greater than two dozen domains registered since 2012, however we will discover lots of extra phishing domains and associated e-mail addresses just by pivoting on particulars within the registration data for these Justy John domains. For instance, the road handle utilized by the Justy John area axisupdate[.]web — 7902 Pelleaux Street in Knoxville, TN — additionally seems within the registration data for accountauthenticate[.]com, acctlogin[.]biz, and loginaccount[.]biz, all of which at one level included the e-mail handle [email protected].
That Rsmith Gmail handle is linked to the 2012 phishing area alibala[.]biz (one character off of the Chinese language e-commerce large alibaba.com, with a distinct top-level area of .biz). A search in DomainTools on the cellphone quantity in these area data — 1.7736491613 — reveals much more phishing domains in addition to the Nigerian cellphone quantity “2348062918302” and the e-mail handle [email protected].
DomainTools exhibits [email protected] seems within the registration data for the area seltrock[.]com, which was used within the phishing assault documented in the 2020 Russian blog post talked about earlier. At this level, we’re simply two steps away from figuring out the menace actor group.
The identical Nigerian cellphone quantity exhibits up in dozens of area registrations that reference the e-mail handle [email protected], together with 26i3[.]web, costamere[.]com, danagruop[.]us, and dividrilling[.]com. A Net search on any of these domains finds they had been listed in an “indicator of compromise” list on GitHub maintained by Palo Alto Networks‘ Unit 42 analysis workforce.
SILVERTERRIER
Based on Unit 42, the domains are the handiwork of an enormous cybercrime group primarily based in Nigeria that it dubbed “SilverTerrier” again in 2014. In an October 2021 report, Palo Alto stated SilverTerrier excels at so-called “enterprise e-mail compromise” or BEC scams, which goal professional enterprise e-mail accounts by means of social engineering or laptop intrusion actions. BEC criminals use that entry to provoke or redirect the switch of enterprise funds for private achieve.
Palo Alto says SilverTerrier encompasses lots of of BEC fraudsters, a few of whom have been arrested in varied worldwide legislation enforcement operations by Interpol. In 2022, Interpol and the Nigeria Police Pressure arrested 11 alleged SilverTerrier members, together with a prominent SilverTerrier leader who’d been flaunting his wealth on social media for years. Sadly, the lure of straightforward cash, endemic poverty and corruption, and low boundaries to entry for cybercrime in Nigeria conspire to supply a relentless stream of latest recruits.
BEC scams had been the seventh most reported crime tracked by the FBI’s Web Crime Criticism Middle (IC3) in 2024, producing greater than 21,000 complaints. Nevertheless, BEC scams had been the second most expensive type of cybercrime reported to the feds final 12 months, with almost $2.8 billion in claimed losses. In its 2025 Fraud and Control Survey Report, the Affiliation for Monetary Professionals discovered 63 % of organizations skilled a BEC final 12 months.
Poking at a few of the e-mail addresses that spool out from this analysis reveals various Fb accounts for folks residing in Nigeria or within the United Arab Emirates, lots of whom don’t seem to have tried to masks their real-life identities. Palo Alto’s Unit 42 researchers reached an identical conclusion, noting that though a small subset of those crooks went to nice lengths to hide their identities, it was often easy to be taught their identities on social media accounts and the foremost messaging providers.
Palo Alto stated BEC actors have turn out to be much more organized over time, and that whereas it stays straightforward to seek out actors working as a gaggle, the follow of utilizing one cellphone quantity, e-mail handle or alias to register malicious infrastructure in assist of a number of actors has made it much more time consuming (however not inconceivable) for cybersecurity and legislation enforcement organizations to kind out which actors dedicated particular crimes.
“We proceed to seek out that SilverTerrier actors, no matter geographical location, are sometimes linked by means of just a few levels of separation on social media platforms,” the researchers wrote.
FINANCIAL FRAUD KILL CHAIN
Palo Alto has revealed a useful list of recommendations that organizations can undertake to reduce the incidence and affect of BEC assaults. Lots of these ideas are prophylactic, equivalent to conducting common worker safety coaching and reviewing community safety insurance policies.
However one advice — getting conversant in a course of generally known as the “monetary fraud kill chain” or FFKC — bears particular point out as a result of it gives the only greatest hope for BEC victims who’re looking for to claw again funds made to fraudsters, and but far too many victims don’t realize it exists till it’s too late.

Picture: ic3.gov.
As defined in this FBI primer, the Worldwide Monetary Fraud Kill Chain is a partnership between federal legislation enforcement and monetary entities whose objective is to freeze fraudulent funds wired by victims. Based on the FBI, viable sufferer complaints filed with ic3.gov promptly after a fraudulent switch (usually lower than 72 hours) will likely be mechanically triaged by the Financial Crimes Enforcement Network (FinCEN).
The FBI famous in its IC3 annual report (PDF) that the FFKC had a 66 % success fee in 2024. Viable ic3.gov complaints contain losses of not less than $50,000, and embody all data from the sufferer or sufferer financial institution, in addition to a accomplished FFKC kind (offered by FinCEN) containing sufferer data, recipient data, financial institution names, account numbers, location, SWIFT, and any further data.
Why Choose handofgod.tech
Multi Realm Structure
Stake and earn through Elysium Garden Purgatory and Sanctum
TVL Tracking
Monitor token price HOG supply and pool liquidity live
Farm and Claim
Earn HOG GHOG and points from dashboard actions and AI signals
Sonic Integration
Move assets with speed and interact with liquidity across Hand of God
Enter the divine protocol at https://handofgod.tech
Find free spins and offers using casino mirror
Why rate-x.xyz
DEX Integration
Buy sell trade and farm directly from connected wallet
Yield Focused
Stake LP or farm JLP positions for continuous crypto income
Docs and Support
Access documentation Telegram Discord and rate x Twitter
Omnichain Ready
Use DeFi tools across stable assets and liquid positions
Scale your DeFi tools with https://rate-x.xyz
Why Choose swapx.buzz
SWPx Utility
Stake swap earn and claim with full token integration
veSWPx Voting
Boost pool rewards with governance and veSWPx position
DeFi Staking
Stake LP manage position and monitor APR rewards
NFT Ready
xNFTs and vote tools integrated into the swapx crypto flow
Start earning and voting with https://swapx.buzz