FraudHIGH

Cybercriminals Target Accountants - Millions Stolen from Firms

Featured image for Cybercriminals Target Accountants - Millions Stolen from Firms
#Hive0117#DarkWatchman#phishing#Russian firms#accountants

Original Reporting

TRThe Record

AI Intelligence Briefing

CyberPings AI·Reviewed by Rohit Rana
Severity LevelHIGH

Significant risk — action recommended within 24-48 hours

🚨
🚨 SCAM PROFILE
Scam TypePhishing and Financial Fraud
Target DemographicAccountants and Finance Departments
Attack ChannelEmail
Social Engineering TacticDisguised Salary Payments
Financial LossOver 14 million rubles
Scale3,000+ organizations
Geographic FocusRussia
Red FlagsSuspicious emails with attachments
Law Enforcement ActionOngoing investigations by cybersecurity firms
🎯

Basically, hackers trick accountants into transferring money to them by pretending it's for salaries.

Quick Summary

Cybercriminals are targeting accountants in Russian firms to steal millions by disguising fraudulent transfers as salary payments. This highlights serious vulnerabilities in financial security.

What Happened

Cybercriminals have launched a sophisticated attack targeting accountants in Russian firms, stealing millions by disguising fraudulent transfers as salary payments. Researchers from the cybersecurity firm F6 reported that the group known as Hive0117 executed these attacks between February and March 2026, affecting over 3,000 organizations.

How It Works

The attackers utilized phishing emails to compromise accountants' computers. These emails appeared legitimate, often sent from compromised accounts, and contained password-protected attachments masquerading as routine business documents. When victims opened these files, they unknowingly executed a hidden malware file, which installed DarkWatchman, a remote access trojan.

Once the malware was active, attackers gained covert control over the infected systems, allowing them to access corporate online banking portals. They created fraudulent payment orders that looked like legitimate salary transfers, routing funds to accounts they controlled. The largest theft reported exceeded 14 million rubles (around $178,000).

Who's Being Targeted

The primary targets of this campaign are accountants and finance departments within Russian companies. This focus on financial personnel highlights the vulnerability of corporate finance systems to social engineering tactics.

Signs of Infection

Organizations should be vigilant for signs of phishing attempts, especially emails that contain unexpected attachments or requests for sensitive information. Indicators of compromise include:

  • Unusual login activity from accounting systems
  • Unexpected transactions in bank accounts
  • Reports of employees receiving suspicious emails

How to Protect Yourself

To safeguard against these types of attacks, companies should implement the following measures:

  • Employee Training: Regularly educate staff on recognizing phishing attempts and suspicious emails.
  • Email Filtering: Utilize advanced email filtering solutions to detect and block malicious emails before they reach employees.
  • Multi-Factor Authentication (MFA): Enforce MFA for access to corporate banking systems to add an extra layer of security.
  • Regular Audits: Conduct regular audits of financial transactions to quickly identify any unauthorized activities.

Conclusion

The Hive0117 group has been active since late 2021 and has previously targeted various sectors beyond Russia, including Lithuania and Kazakhstan. Their operations demonstrate a persistent threat to corporate finance departments, emphasizing the need for robust cybersecurity measures to protect sensitive financial data.

🔍 How to Check If You're Affected

  1. 1.Monitor for unusual login attempts in financial systems.
  2. 2.Check for unexpected transactions or payment orders.
  3. 3.Review email logs for phishing attempts targeting finance staff.

🏢 Impacted Sectors

FinanceTechnology

Pro Insight

🔒 Pro insight: This attack strategy underscores the critical need for enhanced cybersecurity training within finance departments to combat social engineering threats.

Sources

Original Report

TRThe Record
Read Original

Related Pings

HIGHFraud

Bitcoin Depot Hack - $3.6 Million Stolen by Cybercriminals

Bitcoin Depot has reported a cyberattack resulting in the theft of $3.6 million worth of bitcoin, raising significant security concerns in the cryptocurrency sector.

SecurityWeek·
HIGHFraud

Phishing Alert - Cybercriminals Exploit Meta Notifications

A new phishing campaign is targeting businesses through Meta's Business Manager. Cybercriminals are using real-looking notifications to deceive users, risking account security. Organizations must be vigilant to avoid falling victim to these scams.

Cyber Security News·
HIGHFraud

Hackers Use Pixel-Large SVG Trick to Steal Credit Cards

Hackers are targeting online stores using Magento with a clever SVG trick to steal credit card data. Nearly 100 stores are affected, making it crucial for site owners to act quickly to protect customer information.

BleepingComputer·
HIGHFraud

Fraud Rockets Higher in Mobile-First Latin America

Fraud is surging in mobile-first Latin America as cyber-fraudsters exploit vulnerabilities. Financial institutions struggle to keep pace, putting users at risk. Awareness is key to protection.

Dark Reading·
HIGHFraud

Timeshare Owners - Beware of Cartel-Linked Scams

Authorities warn timeshare owners about cartel-linked scams. Criminals are exploiting vulnerable owners, leading to significant financial losses. Stay informed and protect yourself.

Malwarebytes Labs·
HIGHFraud

Indian Bank Alerts Users About Fake LPG Payment Scams

Indian Bank has warned users about a surge in fake LPG payment and KYC update scams. These scams are designed to steal banking information. Customers are urged to stay vigilant and verify communications through official channels.

Cyber Security News·