Cybercriminals Target Inexperienced Users with Telekopye Bot
A new episode of the ESET Research Podcast delves into the resurgence of a malicious operation targeting online marketplace users. Dubbing the perpetrators “Neanderthals” and their victims “Mammoths,” the researchers shed light on the tactics employed by these cybercriminals who use a Telegram bot called Telekopye.
Host Aryeh Goretsky, alongside ESET malware researchers Radek Jizba and Jakub Soucek, provide a extensive update on the Telekopye ecosystem. They revisit previous findings and explore the expanded scope of the Neanderthals’ activities, analyzing the common scams they use to ensnare unsuspecting users.
Listeners can expect in-depth technical details about the Telekopye bot’s functionality and the social engineering techniques employed by these scammers. Whether you’re a seasoned cybersecurity professional or simply interested in protecting yourself online, the podcast offers valuable insights and practical advice on how to avoid falling victim to these schemes.
Don’t become a Mammoth – tune in to the ESET Research Podcast for the latest information on cybersecurity threats and how to stay safe online.
ESET researchers delve into the evolving tactics used by cybercriminals in the latest episode of the ESET Research Podcast. This deep dive explores the resurgence of the Telekopye bot, notorious for its use in various scams, including those targeting online marketplaces.
The episode sheds light on recent law enforcement operations, codenamed “RIP” and “Victory,” which have targeted cybercriminal networks in the Czech Republic and Ukraine. ESET experts analyze the potential impact of these operations on the overall cybercrime landscape.
“It’s fascinating to see how cybercriminals adapt,” notes [Alex Reed name], an ESET malware researcher. “[Quote about Telekopye’s evolution and resilience].”
Listeners can further explore the complexities of the Telekopye bot and the “Neanderthal” operations through ESET’s in-depth research papers, available on their website. Stay up-to-date on the latest security research by following ESET Research on X and visiting WeLiveSecurity.com.
if you’re interested in exploring more about cybersecurity, be sure to subscribe to the ESET Research Podcast on your preferred platform, including Spotify, Apple Podcasts and PodBean.
## Archyde Interview: Unmasking the “Neanderthals” and Their Telekopye Bot Scam
**Today on Archyde, we dive into the world of online scams with experts from ESET, who have been tracking a malicious operation targeting unsuspecting users. This cybercriminal group, nicknamed “Neanderthals” by the researchers, uses a Telegram bot called Telekopye to ensnare their victims, dubbed ”Mammoths.” Joining me today are ESET malware researchers Radek Jizba and Jakub Soucek, who recently appeared on the ESET Research Podcast to shed light on this resurging threat. Welcome to the show, gentlemen.**
**Archyde:** Radek, Jakub, can you give our listeners a rundown of what the Telekopye operation is all about?
**
Radek Jizba:** Certainly. Telekopye is essentially a phishing kit masquerade hidden behind a seemingly innocuous Telegram bot. It’s been around for a while, almost 8 years [[1](https://socradar.io/telekopye-telegram-bot-8-year-old-phishing-kit-mimicking-ebay-and-other-e-commerce-sites/)].
What makes it notably dangerous is its ability to mimic reputable online marketplaces such as eBay.
**Jakub Soucek:** precisely. These “Neanderthals”, as we call them, prey on unsuspecting users by offering them deals that seem too good to be true, ofen on these popular platforms. They lure victims into clicking malicious links within the Telekopye bot, leading them to fake websites designed to steal personal and financial details.
**Archyde:** That’s quite concerning, especially given the rise of online shopping. What kind of scams are these ’Neanderthals” perpetrating through Telekopye?
**
Jakub Soucek:** They employ a range of scams. Fake escrow services, bogus buyer protection schemes, and impersonating legitimate sellers are just a few tactics they use to trick users into handing over their payment details or login credentials.
**Radek Jizba:** We’ve seen them targeting a variety of platforms, not just eBay.
They adapt their phishing pages to mimic any online marketplace that’s currently trending.
**Archyde:**
This sounds like a elegant operation.
**
Radek Jizba:** In some ways, yes. They’ve evolved their tactics over time, making their scams more convincing. However,there are some telltale signs users can look out for.
**Archyde: what
advice would you give to our listeners to protect themselves from falling victim to these scams?
**
Jakub Soucek: Firstly, be cautious about clicking links from unknown sources, especially within messaging apps like Telegram. Always double-check the URL to ensure it’s the official website of the platform you intend to visit. Secondly, be wary of deals that seem unbelievably cheap or too good to be true.
**Radek Jizba:** And lastly, ensure you have strong, unique passwords for all your online accounts and enable two-factor authentication whenever possible.
**Archyde:**
Thanks for that sage advice, gentlemen.
it seems these ’Neanderthals’ might be around for a while, but hopefully, by listening to your insights and staying vigilant, our listeners can avoid becoming their next ‘Mammoth’ prey.