Monday, February 12, 2024
HomeCyber SecurityESET Analysis Podcast: Neanderthals, Mammoths and Telekopye

ESET Analysis Podcast: Neanderthals, Mammoths and Telekopye


ESET Analysis

ESET researchers focus on the dynamics inside and between varied teams of scammers who use a Telegram bot known as Telekopye to rip-off individuals on on-line marketplaces

ESET Research Podcast: Neanderthals, Mammoths and Telekopye

On this episode of our podcast, ESET malware researchers speak concerning the dynamics inside and between varied Neanderthal teams, the strategies that this horde of scammers makes use of to seek out and choose one of the best Mammoths for searching, and particularly about Neanderthals instructing one another wield Telekopye successfully.

Whereas this would possibly seem to be an odd subject for a podcast about cybersecurity, fairly the opposite. Telekopye is the identify of a extremely automated malicious toolkit carried out as a Telegram bot that cybercriminals use to deceive unsuspecting customers on on-line marketplaces.

Within the practically 40 minutes of debate, ESET Malware Researchers Radek Jizba and Jakub Souček clarify to the host and ESET Distinguished Researcher Aryeh Goretsky why they selected the identify Telekopye and the way it connects with the Neanderthal and Mammoth nomenclature.

ESET consultants additionally dissect particular options supplied by Telekopye and the totally different rip-off varieties it facilitates, whereas uncovering the geographical areas these Neanderthals goal and the way they choose their victims. The researchers additionally supply the insights they gained by infiltrating Neanderthal teams, revealing their business-like construction full with strict hierarchies, promotions, coaching supplies, and taxes. Telekopye’s success price and payout construction can also be mentioned.

This episode provides invaluable insights on spot and mitigate these market scams, so if you wish to keep away from being scammed throughout your subsequent on-line swap, make certain to pay attention and have your notepad prepared.

For extra insights on the Telekopye toolkit and different comparable cyberthreats, observe ESET analysis on X (previously referred to as Twitter), and take a look at our newest blogposts and white papers on WeLiveSecurity.com. If you happen to like what you hear, subscribe for extra on Spotify, Google Podcasts, Apple Podcasts, or PodBean.





Supply hyperlink

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments