Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

How scammers used Dubai Police branding to launch phishing attacks

Recent investigations reveal that the malicious campaigns against Dubai Police originate from automated domain generation algorithms or bulk registrations, facilitating rapid cycling through various domains to host fraudulent web pages

byKerem Gülen
December 13, 2024
in News, Cybersecurity

The Dubai Police face impersonation threats as fraudsters in the UAE utilize sophisticated phishing attacks to target unsuspecting mobile users. Cybercriminals are sending thousands of text messages, falsely claiming to represent the law enforcement agency, prompting victims to click on malicious URLs.

Dubai Police face impersonation threats from phishing attacks

Researchers at BforeAI have reported a surge in phishing attacks that exploit the credibility of police communications. These messages often urge recipients to address fictitious legal issues or register on “official” online portals. The deceptive links redirect victims to fraudulent websites aiming to extract sensitive information, including banking and personal identification details. According to Abu Qureshi, lead for threat intelligence and mitigation at BforeAI, the attackers employ well-crafted lures featuring official branding, indicating a moderate level of sophistication, according to Dark Reading.

Despite these tailored approaches aimed at UAE citizens, researchers note a ‘spray-and-pray’ methodology due to the broad reach of the phishing campaigns. Qureshi emphasizes that the calculated misuse of Dubai Police branding enhances the scammers’ credibility and exposes a deep understanding of social engineering techniques. This method of exploitation embodies a reliance on psychological manipulation, leveraging citizens’ trust in law enforcement.

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.


Phishing experts are upping their game to hunt for C-suite whales


Increasing cybercrime targeting UAE citizens

The rise in cybercrime targeting UAE citizens is part of a greater trend in the Middle East. Cybercriminals are increasingly focused on affluent regions to maximize financial gain, exploiting a high-value target demographic characterized by significant digital service usage. Kaspersky’s recent research indicates that 87% of companies in the UAE have encountered some form of cyber incident within the past two years.

Qureshi highlights that the “UAE is a high-value target due to its affluent population, high Internet penetration, and reliance on digital services.” The unique economic and political dynamics in the region further attract cybercriminal activities. With many organizations embracing rapid digital transformation without adequate cybersecurity measures, these vulnerabilities provide ample opportunities for exploitation.

Recent investigations reveal that the malicious campaigns against Dubai Police originate from automated domain generation algorithms or bulk registrations, facilitating rapid cycling through various domains to host fraudulent web pages. Many of these domains have roots in Tencent’s servers based in Singapore. Researchers have found Tencent servers connected to previous malicious activities, further complicating the cyber threat landscape.

Qureshi notes the challenges law enforcement faces in addressing this issue, as the presence of malicious activity on Tencent servers could result from the abuse of legitimate services. The jurisdictional complexities complicate enforcement actions against perpetrators behind these campaigns. Two registrants connected to the fraudulent activities have been identified as operating from India and Dubai, with names crafted to reflect legitimacy.

Resecurity uncovered a similar large-scale fraud campaign wherein scammers impersonate law enforcement to target consumers. These scams involve victims being tricked into paying non-existent fines online, with numerous reports of phone calls from individuals posing as Dubai Police officers.

The impersonation efforts leverage smishing, vishing, and phishing tactics. Particularly around significant dates like National Day, also known as Eid Al Etihad, celebrated annually on December 2, scammers intensified their activities. Citizens are often less vigilant during such festive periods, which the fraudsters exploit, leading to substantial financial losses.

The UAE Financial Intelligence Unit reported that fraud continues to pose significant risks, contributing to money laundering activities, with estimated losses reaching AED 1.2 billion (approximately USD 326 million) from 2021 to 2023. Reports from this authority highlight that phishing, vishing, and smishing are now the most common forms of fraud in the UAE.

The scam operation revealed a sophisticated approach where fraudsters initially send fake payment requests through SMS or email mimicking Dubai Police branding, including legitimate-looking payment pages. Such tactics lead to confusion and prompt victims into action, believing they are following official instructions.

In one reported instance, a victim received a call from an individual claiming to be an inspector who threatened the victim with driving license revocation unless payment was made. Such tactics reflect organized crime strategies aimed at instilling panic and urgency to extract payments. In addition, smishing scenarios capitalized on low fine amounts to entice victims into providing credit card information, often resulting in unauthorized charges.

Cybercriminals reportedly send between 50,000 to 100,000 messages daily as part of their operations, utilizing stolen databases from the Dark Web containing sensitive personal data, including phone numbers. Recent analysis has revealed a notable increase in phishing attacks using newly registered generic top-level domains (gTLDs), offering fraudsters opportunities due to their low registration costs and inadequate monitoring.

Resecurity identified over 144 domain names registered by the actors between September and November 2024, with some linked to Chinese domain registrars.


Featured image credit: Max Fleischmann/Unsplash

Tags: Cybersecurity

Related Posts

Verizon down: Latest Verizon outage map for service issues

Verizon down: Latest Verizon outage map for service issues

October 10, 2025
A critical Oracle zero-day flaw is being actively abused by hackers

A critical Oracle zero-day flaw is being actively abused by hackers

October 10, 2025
Microsoft Copilot can now create documents and search your Gmail

Microsoft Copilot can now create documents and search your Gmail

October 10, 2025
Google Messages is about to get a lot smarter with this AI tool

Google Messages is about to get a lot smarter with this AI tool

October 10, 2025
Here is how WhatsApp will let you display your Facebook account

Here is how WhatsApp will let you display your Facebook account

October 10, 2025
The Windows 10 doomsday clock is ticking for 500 million users

The Windows 10 doomsday clock is ticking for 500 million users

October 10, 2025

LATEST NEWS

Verizon down: Latest Verizon outage map for service issues

A critical Oracle zero-day flaw is being actively abused by hackers

Microsoft Copilot can now create documents and search your Gmail

Google Messages is about to get a lot smarter with this AI tool

Here is how WhatsApp will let you display your Facebook account

The Windows 10 doomsday clock is ticking for 500 million users

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.