Header image

Opteck Trading Platform Data Utilised in Scam Effort

Scammers use former trading platform data to steal money from former users.

Adversaries are leveraging stolen data in a cryptocurrency heist scam which uses vishing and spear phishing tactics.

Monitored by Cisco Talos since January 2024, scammers have been impersonating investigation officers of CySEC (Cyprus Securities and Exchange Commission) where the attacker uses a lure of refunding a fake seized amount from a fraudulent trading activity in Opteck trading platform to compromise the victims. Opteck’s license was suspended in 2019 due to non-compliance.

Talos researchers said the scammer attempts to contact a potential victim who is, or was once, a user of the Opteck trading platform. Once their use of Opteck is confirmed, they manipulate victims into sharing sensitive information and transferring cryptocurrency.


Dan Raywood Senior Editor SC Media UK

Dan Raywood is a B2B journalist with more than 20 years of experience, including covering cybersecurity for the past 16 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes.

He has spoken at events including 44CON, Infosecurity Europe, RANT Conference, BSides Scotland, Steelcon and ESET Security Days.

Outside work, Dan enjoys supporting Tottenham Hotspur, managing mischievous cats, and sampling craft beers.

Dan Raywood Senior Editor SC Media UK

Dan Raywood is a B2B journalist with more than 20 years of experience, including covering cybersecurity for the past 16 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes.

He has spoken at events including 44CON, Infosecurity Europe, RANT Conference, BSides Scotland, Steelcon and ESET Security Days.

Outside work, Dan enjoys supporting Tottenham Hotspur, managing mischievous cats, and sampling craft beers.

Upcoming Events

24
Oct
Webinar

Securing Data in the Cloud: Advanced Strategies for Cloud Application Security

Discussing the current trends in cloud security, focusing on the challenges of hybrid environments

In this live webinar, join security specialists from OPSWAT to discuss the current trends in cloud security, focusing on the challenges of hybrid environments, including diminished visibility and weakened threat detection.

image image image