Artwork

A tartalmat a The Small Business Cyber Security Guy biztosítja. Az összes podcast-tartalmat, beleértve az epizódokat, grafikákat és podcast-leírásokat, közvetlenül a The Small Business Cyber Security Guy vagy a podcast platform partnere tölti fel és biztosítja. Ha úgy gondolja, hogy valaki az Ön engedélye nélkül használja fel a szerzői joggal védett művét, kövesse az itt leírt folyamatot https://hu.player.fm/legal.
Player FM - Podcast alkalmazás
Lépjen offline állapotba az Player FM alkalmazással!

TikTok Shop's AI-Powered Million-Pound Crypto Heist

10:19
 
Megosztás
 

Manage episode 507501207 series 3690923
A tartalmat a The Small Business Cyber Security Guy biztosítja. Az összes podcast-tartalmat, beleértve az epizódokat, grafikákat és podcast-leírásokat, közvetlenül a The Small Business Cyber Security Guy vagy a podcast platform partnere tölti fel és biztosítja. Ha úgy gondolja, hogy valaki az Ön engedélye nélkül használja fel a szerzői joggal védett művét, kövesse az itt leírt folyamatot https://hu.player.fm/legal.

Episode Summary

UK businesses face a sophisticated new threat as criminals deploy artificial intelligence to industrialize fraud through TikTok Shop. Host Lucy Harper exposes the "FraudOnTok" campaign that's already stolen over £900,000 through 15,000 fake websites, weaponized AI-generated content, and advanced malware specifically designed to hunt cryptocurrency wallets on personal devices that connect to business systems.

What You'll Learn

  • How the "FraudOnTok" campaign uses AI to create convincing fake influencer videos at industrial scale
  • Why SparkKitty malware specifically targets screenshots to steal cryptocurrency wallet recovery phrases
  • How OAuth token theft bypasses traditional password security and multi-factor authentication
  • The business risk when employees' personal devices compromise corporate Google accounts
  • 4-step emergency protection plan for businesses and individuals using social media platforms
  • Weekend-specific threat patterns targeting casual social media users

Critical Statistics Mentioned

  • £900,000+ already stolen through FraudOnTok campaign
  • 15,000+ fake TikTok Shop domains registered by criminals
  • 10,000+ unique fake websites identified by researchers
  • 5,000+ malicious applications distributing SparkKitty malware
  • .top, .shop, .icu domains most commonly used for fake sites
  • Meta ads used to distribute fake content to legitimate audiences
  • OAuth tokens provide persistent access even after password changes

Key Sources & References


  • Episode Sponsor

    Equate Group Limited - Comprehensive cybersecurity services specialising in protecting businesses against sophisticated social engineering attacks that target personal devices connecting to business systems.

    Additional Threats Mentioned

    • CyberHeist Banking Phish: Parallel campaigns targeting UK banking customers through fake Google advertisements
    • Deepfake Identity Verification: AI-generated identity documents sophisticated enough to pass automated verification systems
    • Weekend Crypto Surge: Cryptocurrency scams spike during weekends when security monitoring is reduced

    Source Verification Standards

    All sources cited in this episode have been fact-checked and verified through multiple authoritative cybersecurity research channels. CTM360's FraudOnTok research serves as the primary technical source for campaign details. Financial impact figures are cross-referenced through multiple security vendors. UK-specific threat i

      continue reading

    4 epizódok

    Artwork
    iconMegosztás
     
    Manage episode 507501207 series 3690923
    A tartalmat a The Small Business Cyber Security Guy biztosítja. Az összes podcast-tartalmat, beleértve az epizódokat, grafikákat és podcast-leírásokat, közvetlenül a The Small Business Cyber Security Guy vagy a podcast platform partnere tölti fel és biztosítja. Ha úgy gondolja, hogy valaki az Ön engedélye nélkül használja fel a szerzői joggal védett művét, kövesse az itt leírt folyamatot https://hu.player.fm/legal.

    Episode Summary

    UK businesses face a sophisticated new threat as criminals deploy artificial intelligence to industrialize fraud through TikTok Shop. Host Lucy Harper exposes the "FraudOnTok" campaign that's already stolen over £900,000 through 15,000 fake websites, weaponized AI-generated content, and advanced malware specifically designed to hunt cryptocurrency wallets on personal devices that connect to business systems.

    What You'll Learn

    • How the "FraudOnTok" campaign uses AI to create convincing fake influencer videos at industrial scale
    • Why SparkKitty malware specifically targets screenshots to steal cryptocurrency wallet recovery phrases
    • How OAuth token theft bypasses traditional password security and multi-factor authentication
    • The business risk when employees' personal devices compromise corporate Google accounts
    • 4-step emergency protection plan for businesses and individuals using social media platforms
    • Weekend-specific threat patterns targeting casual social media users

    Critical Statistics Mentioned

    • £900,000+ already stolen through FraudOnTok campaign
    • 15,000+ fake TikTok Shop domains registered by criminals
    • 10,000+ unique fake websites identified by researchers
    • 5,000+ malicious applications distributing SparkKitty malware
    • .top, .shop, .icu domains most commonly used for fake sites
    • Meta ads used to distribute fake content to legitimate audiences
    • OAuth tokens provide persistent access even after password changes

    Key Sources & References


  • Episode Sponsor

    Equate Group Limited - Comprehensive cybersecurity services specialising in protecting businesses against sophisticated social engineering attacks that target personal devices connecting to business systems.

    Additional Threats Mentioned

    • CyberHeist Banking Phish: Parallel campaigns targeting UK banking customers through fake Google advertisements
    • Deepfake Identity Verification: AI-generated identity documents sophisticated enough to pass automated verification systems
    • Weekend Crypto Surge: Cryptocurrency scams spike during weekends when security monitoring is reduced

    Source Verification Standards

    All sources cited in this episode have been fact-checked and verified through multiple authoritative cybersecurity research channels. CTM360's FraudOnTok research serves as the primary technical source for campaign details. Financial impact figures are cross-referenced through multiple security vendors. UK-specific threat i

      continue reading

    4 epizódok

    Minden epizód

    ×
     
    Loading …

    Üdvözlünk a Player FM-nél!

    A Player FM lejátszó az internetet böngészi a kiváló minőségű podcastok után, hogy ön élvezhesse azokat. Ez a legjobb podcast-alkalmazás, Androidon, iPhone-on és a weben is működik. Jelentkezzen be az feliratkozások szinkronizálásához az eszközök között.

     

    Gyors referencia kézikönyv

    Hallgassa ezt a műsort, miközben felfedezi
    Lejátszás