Clustering and reuse of phone numbers in scam emails — une étude qui révèle comment les acteurs malveillants recyclent leurs infrastructures téléphoniques. L'OSINT appliqué aux patterns de réutilisation, c'est un peu comme retrouver une empreinte digitale dans un couloir que quelqu'un pensait avoir effacé. La donnée raconte toujours une histoire. #OSINT #infosec #ScamAnalysis
https://malware.news/t/insights-into-the-clustering-and-reuse-of-phone-numbers-in-scam-emails/106707
Insights into the clustering and reuse of phone numbers in scam emails

Cisco Talos has recently started to collect and gather intelligence around phone numbers within emails as an additional indicator of compromise (IOC). In this blog, we discuss new insights into in-the-wild phone number reuse in scam emails.  According to Talos’ observations, the ease of API-driven provisioning makes a few VoIP providers the preferred tool for attackers, allowing for high-volume, cost-effective scam operations that are difficult to trace. Attackers maintain operational continuity...

Malware Analysis, News and Indicators

Campaign type: Crypto-themed advance fee fraud
Observed tactics:
• Survey-based initial trust anchor
• High-value BTC lure (0.943 / 1.824 BTC)
• Fake transaction approval states
• OTP-style authentication mimicry
• Reverse social engineering via chat
• Bitcoin QR payment endpoint
• Recently registered infrastructure

Psychological chain:
Trust seeding → Reward inflation → Procedural legitimacy → Time pressure → Micro-payment extraction.

Notable observations:
– Structured flow architecture
– Domain churn
– UX mimicking real crypto processors
– Potential bot-filtering via poll entry

This demonstrates how scam operators now invest in full user journey design.

Source: https://malwr-analysis.com/2026/02/22/crypto-compensation-scam-fake-btc-payout-lure-abusing-survey-payment-flows/

What telemetry would you prioritize for early detection?
Engage below.
Follow TechNadu for technical cybersecurity reporting.

#ThreatIntelligence #CryptoFraud #PhishingInfrastructure #ScamAnalysis #OSINT #BlueTeam #FraudOps #DigitalForensics #CyberDefense