• About Us
  • Disclaimer
  • Contact Us
  • Privacy Policy
Wednesday, October 8, 2025
mGrowTech
No Result
View All Result
  • Technology And Software
    • Account Based Marketing
    • Channel Marketing
    • Marketing Automation
      • Al, Analytics and Automation
      • Ad Management
  • Digital Marketing
    • Social Media Management
    • Google Marketing
  • Direct Marketing
    • Brand Management
    • Marketing Attribution and Consulting
  • Mobile Marketing
  • Event Management
  • PR Solutions
  • Technology And Software
    • Account Based Marketing
    • Channel Marketing
    • Marketing Automation
      • Al, Analytics and Automation
      • Ad Management
  • Digital Marketing
    • Social Media Management
    • Google Marketing
  • Direct Marketing
    • Brand Management
    • Marketing Attribution and Consulting
  • Mobile Marketing
  • Event Management
  • PR Solutions
No Result
View All Result
mGrowTech
No Result
View All Result
Home Technology And Software

After researchers unmasked a prolific SMS scammer, a new operation has emerged in its wake

Josh by Josh
August 10, 2025
in Technology And Software
0
After researchers unmasked a prolific SMS scammer, a new operation has emerged in its wake
0
SHARES
0
VIEWS
Share on FacebookShare on Twitter


If you, like practically anyone else with a cell phone in the U.S. and beyond, have received a scam text message about an unpaid toll or undelivered mail item, there’s a good chance you have been targeted by a prolific scamming operation.

The scam isn’t particularly complex, but it has been highly effective. By sending spam text messages that look like genuine notifications for popular services, from postal deliveries to local government programs, unsuspecting victims click a link that loads a phishing page, they enter their credit card details, and that information is swiped and used for fraud.

During a period of seven months in 2024, the scam netted at least 884,000 stolen credit card details, allowing scammers to cash in on their victims’ accounts. Some victims lost thousands of dollars in the scam, researchers say.

But a series of opsec mistakes ultimately led security researchers and investigative journalists to the real-world identity of the maker of the scamming software, Magic Cat, who researchers say goes by the handle Darcula. 

a photo of a profile picture of a prolific scammer, the picture is a white fluffy cat on a couch.
Image Credits:via Mnemonic

As revealed by the Oslo-headquartered security firm Mnemonic and reported in tandem by Norwegian media earlier this year, behind the fluffy cute cat in Darcula’s profile photos is a 24-year-old Chinese national named Yucheng C.

The researchers say Yucheng C. develops Magic Cat for his hundreds of customers, who use the software to launch their own SMS text message scam campaigns at their victims.

Soon after he was unmasked, Darcula went dark and his scam operation has not seen any updates since, leaving his customers in the lurch. But in its wake, a new operation has emerged and is already vastly outpacing its predecessor.

Researchers are now sounding the alarm on the new fraud operation, Magic Mouse, which rose from the ashes of Magic Cat. 

Ahead of sharing new findings at the Def Con security conference in Las Vegas on Friday, Harrison Sand, an offensive security consultant at Mnemonic, told TechCrunch that Magic Mouse has been surging in popularity since the demise of Darcula’s Magic Cat. 

Sand also warned of the operation’s growing ability to steal people’s credit cards on a massive scale.

During their investigation, Mnemonic found photos from inside the operation posted in a Telegram channel that Darcula administered, showing a line-up of credit card payment terminals and videos showing racks with dozens of phones used for automating the sending of messages to victims. 

The scammers use the card details in mobile wallets on phones and conduct payment fraud, laundering their funds into other bank accounts. Some of the phones had mobile wallets overflowing with other people’s stolen cards, ready to be used for mobile transactions. 

Sand told TechCrunch that Magic Mouse is already responsible for the theft of at least 650,000 credit cards a month.

While evidence suggests Magic Mouse is an entirely new operation, coded by new developers and likely unrelated to Darcula, much of Magic Mouse’s success stems from the new operators stealing the phishing kits that made its predecessor’s software so popular. Sand said these kits contain hundreds of phishing sites that Magic Cat used to mimic the legitimate web pages of major tech giants, popular consumer services, and delivery firms, all designed to trick victims into handing over their credit card details.

But despite the prolific nature of Magic Cat and, now, Magic Mouse, and their ability to net millions of dollars in stolen funds from consumers, Sand told TechCrunch in a call that law enforcement is not looking beyond a few scattered reports of fraud or at the wider operation behind the scheme. 

Instead, Sand said, it is the tech companies and financial giants who shoulder much of the responsibility for allowing these scams to exist and thrive, and for not making it more difficult for scammers to use stolen cards. 

As for anyone who receives a suspicious text, ignoring an unwanted message might be the best policy. 



Source_link

READ ALSO

The best Amazon deals on Kindles, Echo speakers, Fire TV devices and more for Prime Day

Prime Day 2025 – We’re Tracking Deals Live

Related Posts

The best Amazon deals on Kindles, Echo speakers, Fire TV devices and more for Prime Day
Technology And Software

The best Amazon deals on Kindles, Echo speakers, Fire TV devices and more for Prime Day

October 8, 2025
Technology And Software

Prime Day 2025 – We’re Tracking Deals Live

October 8, 2025
You can’t libel the dead. But that doesn’t mean you should deepfake them.
Technology And Software

You can’t libel the dead. But that doesn’t mean you should deepfake them.

October 8, 2025
How to Protect Virtualized and Containerized Environments?
Technology And Software

How to Protect Virtualized and Containerized Environments?

October 7, 2025
The best Prime Day kitchen deals include up to 50 percent off our favorite air fryers and more
Technology And Software

The best Prime Day kitchen deals include up to 50 percent off our favorite air fryers and more

October 7, 2025
Jony Ive Says He Wants His OpenAI Devices to ‘Make Us Happy’
Technology And Software

Jony Ive Says He Wants His OpenAI Devices to ‘Make Us Happy’

October 7, 2025
Next Post
Detailed Targeting Myth – Jon Loomer Digital

Detailed Targeting Myth - Jon Loomer Digital

POPULAR NEWS

Communication Effectiveness Skills For Business Leaders

Communication Effectiveness Skills For Business Leaders

June 10, 2025
15 Trending Songs on TikTok in 2025 (+ How to Use Them)

15 Trending Songs on TikTok in 2025 (+ How to Use Them)

June 18, 2025
Trump ends trade talks with Canada over a digital services tax

Trump ends trade talks with Canada over a digital services tax

June 28, 2025
App Development Cost in Singapore: Pricing Breakdown & Insights

App Development Cost in Singapore: Pricing Breakdown & Insights

June 22, 2025
7 Best EOR Platforms for Software Companies in 2025

7 Best EOR Platforms for Software Companies in 2025

June 21, 2025

EDITOR'S PICK

Six Ideas from Licensing Expo 2025

Six Ideas from Licensing Expo 2025

May 27, 2025
What We Actually Know About Optimizing for LLM Search

What We Actually Know About Optimizing for LLM Search

September 2, 2025
New Branding for ITO Gin by Analogue — BP&O

New Branding for ITO Gin by Analogue — BP&O

August 19, 2025
AI Bots Are Closing in on Search Engine Bots

AI Bots Are Closing in on Search Engine Bots

June 22, 2025

About

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Check our landing page for details.

Follow us

Categories

  • Account Based Marketing
  • Ad Management
  • Al, Analytics and Automation
  • Brand Management
  • Channel Marketing
  • Digital Marketing
  • Direct Marketing
  • Event Management
  • Google Marketing
  • Marketing Attribution and Consulting
  • Marketing Automation
  • Mobile Marketing
  • PR Solutions
  • Social Media Management
  • Technology And Software
  • Uncategorized

Recent Posts

  • How does the TikTok algorithm work in 2025? Tips to boost visibility
  • The best Amazon deals on Kindles, Echo speakers, Fire TV devices and more for Prime Day
  • Ai Flirt Chat Generator With Photos
  • 7 Keys To Crafting Sustainability Stories
  • About Us
  • Disclaimer
  • Contact Us
  • Privacy Policy
No Result
View All Result
  • Technology And Software
    • Account Based Marketing
    • Channel Marketing
    • Marketing Automation
      • Al, Analytics and Automation
      • Ad Management
  • Digital Marketing
    • Social Media Management
    • Google Marketing
  • Direct Marketing
    • Brand Management
    • Marketing Attribution and Consulting
  • Mobile Marketing
  • Event Management
  • PR Solutions

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?