12.2 C
Tuesday, December 19, 2023

ESET Analysis Podcast: Neanderthals, Mammoths and Telekopye

ESET Analysis

ESET researchers talk about the dynamics inside and between numerous teams of scammers who use a Telegram bot referred to as Telekopye to rip-off individuals on on-line marketplaces

ESET Research Podcast: Neanderthals, Mammoths and Telekopye

On this episode of our podcast, ESET malware researchers discuss concerning the dynamics inside and between numerous Neanderthal teams, the methods that this horde of scammers makes use of to seek out and choose the perfect Mammoths for looking, and particularly about Neanderthals educating one another tips on how to wield Telekopye successfully.

Whereas this may appear to be an odd matter for a podcast about cybersecurity, fairly the opposite. Telekopye is the title of a extremely automated malicious toolkit carried out as a Telegram bot that cybercriminals use to deceive unsuspecting customers on on-line marketplaces.

Within the practically 40 minutes of dialogue, ESET Malware Researchers Radek Jizba and Jakub Souček clarify to the host and ESET Distinguished Researcher Aryeh Goretsky why they selected the title Telekopye and the way it connects with the Neanderthal and Mammoth nomenclature.

ESET specialists additionally dissect particular options provided by Telekopye and the completely different rip-off sorts it facilitates, whereas uncovering the geographical areas these Neanderthals goal and the way they choose their victims. The researchers additionally provide the insights they gained by infiltrating Neanderthal teams, revealing their business-like construction full with strict hierarchies, promotions, coaching supplies, and taxes. Telekopye’s success fee and payout construction can be mentioned.

This episode provides invaluable insights on tips on how to spot and mitigate these market scams, so if you wish to keep away from being scammed throughout your subsequent on-line swap, make certain to pay attention and have your notepad prepared.

For extra insights on the Telekopye toolkit and different related cyberthreats, observe ESET analysis on X (previously often known as Twitter), and take a look at our newest blogposts and white papers on WeLiveSecurity.com. In case you like what you hear, subscribe for extra on Spotify, Google Podcasts, Apple Podcasts, or PodBean.

Latest news
Related news


Please enter your comment!
Please enter your name here