Mobile Phishers Target Brokerage Customers in ‘Ramp and Dump’ Cashout Scheme

Mobile Phishers Target Brokerage Customers in 'Ramp and Dump' Cashout Scheme

Cybercriminal groups specializing in advanced mobile phishing kits have evolved their operations beyond stealing payment card data for mobile wallet enrollment, now pivoting to exploit brokerage accounts in sophisticated ‘ramp and dump’ schemes.

This shift, as detailed in recent research by security experts, leverages compromised user credentials to manipulate foreign stock prices, circumventing traditional security controls that prevent direct fund transfers.

Unlike conventional pump-and-dump frauds that rely on social media hype to inflate penny stock values, ramp-and-dump operations use coordinated trading across multiple hijacked accounts to artificially drive up share prices without external promotion.

Evolution of Phishing Tactics

According to Krebson Security, once the targeted stock reaches a predetermined threshold, perpetrators sell off holdings, leaving legitimate investors with devalued assets and substantial losses.

The Financial Industry Regulatory Authority (FINRA) has issued advisories highlighting how this manipulation stems from controlled trading by malicious actors, resulting in catastrophic share price collapses that mirror traditional scams but operate through internal market dynamics.

Ford Merrill, a security researcher at SecAlliance, has tracked this activity to Chinese-language Telegram communities openly vending these phishing tools.

These kits, refined over the past three years, enable attackers to preposition themselves in low-liquidity stocks, such as Chinese initial public offerings (IPOs) or penny stocks, by liquidating victims’ existing positions and reallocating funds.

Perpetrators coordinate timed purchases across phished accounts to ramp up prices, then dump shares for profit.

This method exploits vulnerabilities in brokerage multi-factor authentication (MFA) systems, particularly those relying on phishable one-time passcodes (OTPs) delivered via SMS or automated calls.

For instance, platforms like Schwab and Fidelity offer OTP options that can be intercepted during phishing attacks, where victims are lured via spoofed messages claiming account suspension and prompted to enter credentials and verification codes.

The 2FA text message

Even app-based push notifications remain susceptible if attackers initiate logins with stolen data, tricking users into approval.

Technical Underpinnings

The phishing kits, often demonstrated in vendor videos on Telegram, include customizable templates mimicking major brokerages, sent through Apple’s iMessage or Google’s RCS for heightened legitimacy.

A notable vendor, known as “Outsider” (previously “Chenlun”), provides kits that harvest usernames, passwords, and OTPs, adapting easily to targets like Schwab while expandable to others.

This builds on earlier phishing waves from 2022-2024, which spoofed entities like the U.S. Postal Service to enroll cards in mobile wallets using phished OTPs.

As financial institutions bolstered wallet provisioning requiring app-based enrollment fraudsters redirected efforts to brokerages with weaker MFA, such as Schwab’s options for SMS, calls, or app notifications, all vulnerable to social engineering.

Merrill notes the scheme’s ingenuity in decoupling fraud traces: attackers can buy shares on legitimate Chinese exchanges, benefiting from price inflation driven by U.S.-based compromised accounts without direct linkages.

Coordination may involve real-time phishing or pre-stocked accounts, supported by human operators managing device banks for lure distribution and OTP capture.

Artificial intelligence, including large language models, accelerates kit development, lowering barriers for cybercriminals and enabling rapid iterations.

While some brokerages like Vanguard offer robust alternatives such as Universal 2nd Factor (U2F) hardware keys which resist phishing by requiring physical interaction widespread adoption lags.

The FBI’s February 2025 call for victim information underscores the scheme’s scale, with FINRA emphasizing industry-wide threats.

Mitigation requires shifting to non-phishable MFA, enhanced transaction monitoring for anomalous patterns, and user education on emerging fraud vectors.

As phishing ecosystems mature, integrating AI-driven defenses and regulatory oversight will be crucial to counter these adaptive threats, preventing further erosion of trust in financial markets.

Find this News Interesting! Follow us on Google News, LinkedIn, and X to Get Instant Updates!


Source link

About Cybernoz

Security researcher and threat analyst with expertise in malware analysis and incident response.