Breeze Reporters

SHOCKER! Nigerian Hackers Allegedly Use Buccaneer Passwords To Wreck Shipping Companies Worldwide

A group of 20 Nigerian hackers, identified as Gold Galleon, are menacing shipping firms and bleeding them of hundreds of thousands of dollars.

The development has forced Network security firm Secureworks, an organisation whose focus appears solely to be the maritime industry to red-flagged the group (hackers).

An online platform, Maritime Executive, is reporting that Gold Galleon uses basic email scams and publicly available hacking software to try to steal hundreds of thousands of dollars from unsuspecting ship managers and service providers.

Secureworks said Gold Galleon is a group of about 20 individuals who work together to hack maritime firms all over the world using basic techniques. They rent hacking tools for just a few dollars per month; they communicate via Skype; and they identify targets using online company directories and commercially-available contact lists.

While the criminal gang uses an online proxy service to disguise its location, several cues indicate that it is of Nigerian origin, the security firm said, adding that the group communicates in pidgin, an English creole language, and it uses phrases associated with a Nigerian social organization called the, “Buccaneeers Confraternity” for usernames and passwords.

Once the group has identified a new target, it sends a spearphishing email carefully tailored to the recipient. The email has an attachment containing malware, which deploys on the unsuspecting victim’s computer and logs his or her keystrokes, recording the username and password for the victim’s business email account. Once the account is compromised, the group uses a software tool to collect all the email addresses with which that user has had an interaction, and it sets itself up to intercept business transactions between the user and his or her clients. Many maritime firms use email to handle invoicing and payment details.

When the Gold Galleon group sees payment details relayed on an invoice in a compromised email account, it intercepts the invoice, alters the account numbers to direct the money to its own “mule” bank account instead, and uses a similarly-worded email address to send the altered request on its way to the intended recipient. Often, the buyer will not detect the change to the sender’s email address and the bank details, and will simply pay.

Staff Writer

Add comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.