logo
UK Sees Card Fraud Soar Even After Clampdown on Payment Scams

UK Sees Card Fraud Soar Even After Clampdown on Payment Scams

Bloomberg2 days ago

Fraudsters have switched up their tactics after the UK cracked down on authorized push payment scams, meaning the overall amount stolen was broadly unchanged last year.
Criminals swiped £1.2 billion ($1.6 billion) in 2024, according to trade body UK Finance's annual fraud report. The amount taken using authorized push payments, where a victim is tricked into sending money to an account controlled by scammers, fell 2% to £450.7 million, and the number of cases fell by a fifth to the lowest since 2020.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

ISIL (ISIS) launches first attacks against new Syrian government
ISIL (ISIS) launches first attacks against new Syrian government

Yahoo

time28 minutes ago

  • Yahoo

ISIL (ISIS) launches first attacks against new Syrian government

ISIL (ISIS) has claimed responsibility for an attack on the Syrian army, representing the armed group's first strike at government forces since the fall of Bashar al-Assad, according to analysts. In a statement released late on Thursday, ISIL said its fighters had planted an explosive device that struck a 'vehicle of the apostate regime' in southern Syria. The bombing appears to mark an escalation by ISIL, which views the new government in Damascus as illegitimate but has so far concentrated its activities against Kurdish forces in the north. The blast, in the al-Safa desert region of Sweida province on May 22, reportedly killed or wounded seven Syrian soldiers. A second bomb attack, claimed by ISIL earlier this week, targeted fighters from the United States-backed Kurdish-led Free Syrian Army in a nearby area. ISIL said one fighter was killed and three injured. There has been no official comment from the Syrian government, and the Free Syrian Army has yet to of the new Syrian government that replaced al-Assad after his removal in December once had ties to al-Qaeda – a rival of ISIL – but broke with the group nearly a decade ago. However, over the past several months, ISIL has claimed responsibility only for attacks against the Syrian Democratic Forces in the northeast. The United Kingdom-based Syrian Observatory for Human Rights said the convoy blast was the first ISIL-claimed operation targeting the new Syrian military. ISIL was territorially defeated in Syria in 2019 but maintains sleeper cells, particularly in the country's central and eastern deserts. While the group's capacity has been diminished, the latest attacks suggest it may be seeking to reassert itself amid shifting alliances and weakening state control.

Cops in Germany Claim They've ID'd the Mysterious Trickbot Ransomware Kingpin
Cops in Germany Claim They've ID'd the Mysterious Trickbot Ransomware Kingpin

WIRED

timean hour ago

  • WIRED

Cops in Germany Claim They've ID'd the Mysterious Trickbot Ransomware Kingpin

Matt Burgess Lily Hay Newman May 30, 2025 9:22 AM The elusive boss of the Trickbot and Conti cybercriminal groups has been known only as 'Stern.' Now, German law enforcement has published his alleged identity—and it's a familiar face. Photograph:For years, members of the Russian cybercrime cartel Trickbot unleashed a relentless hacking spree on the world. The group attacked thousands of victims, including businesses, schools, and hospitals. 'Fuck clinics in the usa this week,' one member wrote in internal Trickbot messages in 2020 about a list of 428 hospitals to target. Orchestrated by an enigmatic leader using the online moniker 'Stern,' the group of around 100 cybercriminals stole hundreds of millions of dollars over the course of roughly six years. Despite a wave of law enforcement disruptions and a damaging leak of more than 60,000 internal chat messages from Trickbot and the closely associated counterpart group Conti, the identity of Stern has remained a mystery. Last week, though, Germany's federal police agency, the Bundeskriminalamt or BKA, and local prosecutors alleged that Stern's real-world name is Vi­ta­ly Ni­ko­lae­vich Kovalev, a 36-year-old, 5'11' Russian man who cops believe is in his home country and thus shielded from potential extradition. A recently issued Interpol red notice says that Kovalev is wanted by Germany for allegedly being the 'ringleader' of a 'criminal organisation.' 'Stern's naming is a significant event that bridges gaps in our understanding of Trickbot—one of the most notorious transnational cybercriminal groups to ever exist,' says Alexander Leslie, a threat intelligence analyst at the security firm Recorded Future. 'As Trickbot's 'big boss' and one of the most noteworthy figures in the Russian cybercriminal underground, Stern remained an elusive character, and his real name was taboo for years.' Stern has notably seemed to be absent from multiple rounds of Western sanctions and indictments in recent years calling out alleged Trickbot and Conti members. Leslie and other researchers have long speculated to WIRED that global law enforcement may have strategically withheld Stern's alleged identity as part of ongoing investigations. Kovalev is suspected of being the 'founder' of Trickbot and allegedly used the Stern moniker, the BKA said in an online announcement. 'It has long been assumed, based on numerous indications, that 'stern' is in fact 'Kovalev',' a BKA spokesperson says in written responses to questions from WIRED. They add that, 'The investigating authorities involved in Operation Endgame were only able to identify the actor stern as 'Kovalev' during their investigation this year,' referring to a multi-year international effort to identify and disrupt cybercriminal infrastructure, known as Operation Endgame. The BKA spokesperson also notes in written statements to WIRED that information obtained through a 2023 investigation into the Qakbot malware as well as analysis of the leaked Trickbot and Conti chats from 2022 were 'helpful' in making the attribution. They added, too, that the 'assessment is also shared by international partners.' The German announcement is the first time that officials from any government have publicly alleged an identity for a suspect behind the Stern moniker. As part of Operation Endgame, BKA's Stern attribution inherently comes in the context of a multinational law enforcement collaboration. But unlike in other Trickbot and Conti-related attributions, other countries have not publicly concurred with BKA's Stern identification thus far. Europol, the US Department of Justice, the US Treasury, and the UK's Foreign, Commonwealth & Development Office did not immediately respond to WIRED's requests for comment. Several cybersecurity researchers who have tracked Trickbot extensively tell WIRED they were unaware of the announcement. An anonymous account on the social media platform X recently claimed that Kovalev used the Stern handle and published alleged details about him. WIRED messaged multiple accounts that supposedly belong to Kovalev, according to the X account and a database of hacked and leaked records compiled by District 4 Labs but received no response. Meanwhile, Kovalev's name and face may already be surprisingly familiar to those who have been following recent Trickbot revelations. This is because Kovalev was jointly sanctioned by the United States and United Kingdom in early 2023 for his alleged involvement as a senior member in Trickbot. He was also charged in the US at the time with hacking linked to bank fraud allegedly committed in 2010. The US added him to its most wanted list. In all of this activity, though, the US and UK linked Kovalev to the online handles 'ben' and 'Bentley.' The 2023 sanctions did not mention a connection to the Stern handle. And, in fact, Kovalev's 2023 indictment was mainly noteworthy because his use of 'Bentley' as a handle was determined to be 'historic' and distinct from that of another key Trickbot member who also went by 'Bentley.' The Trickbot ransomware group first emerged around 2016, after its members moved from the Dyre malware that was disrupted by Russian authorities. Over the course of its lifespan, the Trickbot group—which used its namesake malware, alongside other ransomware variants such as Ryuk, IcedID, and Diavol—increasingly overlapped in operations and personnel with the Conti gang. In early 2022, Conti published a statement backing Russia's full-scale invasion of Ukraine, and a cybersecurity researcher who had infiltrated the groups leaked more than 60,000 messages from Trickbot and Conti members, revealing a huge trove of information about their day-to-day operations and structure. Stern acted like a 'CEO' of the Trickbot and Conti groups and ran them like a legitimate company, leaked chat messages analyzed by WIRED and security researchers show. 'Trickbot set the mold for the modern 'as-a-service' cybercriminal business model that was adopted by countless groups that followed,' Recorded Future's Leslie says. 'While there were certainly organized groups that preceded Trickbot, Stern oversaw a period of Russian cybercrime that was characterized by a high level of professionalization. This trend continues today, is reproduced worldwide, and is visible in most active groups on the dark web.' Stern's eminence within Russian cybercrime has been widely documented. The cryptocurrency tracing firm Chainalysis does not publicly name cybercriminal actors and declined to comment on BKA's identification, but the company emphasized that the Stern persona alone is one of the all-time most profitable ransomware actors it tracks. 'The investigation revealed that stern generated significant revenues from illegal activities, in particular in connection with ransomware,' the BKA spokesperson tells WIRED. Stern 'surrounds himself with very technical people, many of which he claims to have sometimes decades of experience, and he's willing to delegate substantial tasks to these experienced people whom he trusts,' says Keith Jarvis, a senior security researcher at cybersecurity firm Sophos' Counter Threat Unit. 'I think he's always probably lived in that organizational role.' Increasing evidence in recent years has indicated that Stern has at least some loose connections to Russia's intelligence apparatus, including its main security agency, the Federal Security Service (FSB). The Stern handle mentioned setting up an office for 'government topics' in July 2020, while researchers have seen other members of the Trickbot group say that Stern is likely the 'the link between us and the ranks/head of department type at FSB.' Stern's consistent presence was a significant contributor to Trickbot and Conti's effectiveness—as was the entity's ability to maintain strong operational security and remain hidden. As Sophos' Jarvis put it, 'I have no thoughts on the attribution as I've never heard a compelling story about Stern's identity from anyone prior to this announcement.'

Airbus Seeks Middle East Comeback After Boeing's Major May Haul
Airbus Seeks Middle East Comeback After Boeing's Major May Haul

Bloomberg

timean hour ago

  • Bloomberg

Airbus Seeks Middle East Comeback After Boeing's Major May Haul

By , Siddharth Vikram Philip, and Julie Johnsson Save Airbus SE is looking to stage a comeback in June with a flurry of fresh orders after arch-rival Boeing Co. logged its biggest-ever deal this month that left the European planemaker empty-handed. The aircraft manufacturer is turning its focus to the Paris Air Show taking place in the middle of the month, where some carriers from the Middle East are poised to order more widebody aircraft.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store