{"id":89234,"date":"2025-08-10T06:34:42","date_gmt":"2025-08-10T06:34:42","guid":{"rendered":"https:\/\/mailinvest.blog\/index.php\/2025\/08\/10\/criminals-built-a-secret-telegram-network-to-steal-115-million-cards-without-breaching-a-single-bank-firewall\/"},"modified":"2025-08-10T06:35:48","modified_gmt":"2025-08-10T06:35:48","slug":"criminals-built-a-secret-telegram-network-to-steal-115-million-cards-without-breaching-a-single-bank-firewall","status":"publish","type":"post","link":"https:\/\/mailinvest.blog\/index.php\/2025\/08\/10\/criminals-built-a-secret-telegram-network-to-steal-115-million-cards-without-breaching-a-single-bank-firewall\/","title":{"rendered":"Criminals built a secret Telegram network to steal 115 million cards without breaching a single bank firewall"},"content":{"rendered":"<p> <a href=\"https:\/\/go.fiverr.com\/visit\/?bta=1052423&nci=17043\" Target=\"_Top\"><img loading=\"lazy\" decoding=\"async\" border=\"0\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/fiverr.ck-cdn.com\/tn\/serve\/?cid=40081059\"  width=\"601\" height=\"201\"><\/a>\n<br \/><img decoding=\"async\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/cdn.mos.cms.futurecdn.net\/M8dLsateSbGVwYwoPrRba3-1200-80.jpg\" \/><\/p>\n<div id=\"article-body\">\n<hr id=\"163c1829-9e63-461c-9e1f-b681b908932a\"\/>\n<ul id=\"9a541df8-adaa-4508-9353-8cea6d8e6901\">\n<li><strong>Phishing assaults now bypass multi-factor authentication utilizing real-time digital pockets provisioning ways<\/strong><\/li>\n<li><strong>One-time passcodes are now not sufficient to cease fraudsters with mobile-optimized phishing kits<\/strong><\/li>\n<li><strong>Tens of millions of victims have been focused utilizing on a regular basis alerts like tolls, packages, and account notices<\/strong><\/li>\n<\/ul>\n<hr id=\"aaa555ff-7b8c-474a-b8cd-023e1854ef0e\"\/>\n<p id=\"6e73c24b-1133-4598-9983-ac4130f7d51d\">A wave of superior phishing campaigns, traced to Chinese language-speaking cybercriminal syndicates, might have compromised as much as 115 million US cost playing cards in simply over a yr, consultants have warned.<\/p>\n<p>Researchers at SecAlliance revealed these operations characterize a rising convergence of social engineering, real-time authentication bypasses, and phishing infrastructure designed to scale.<\/p>\n<p><a id=\"elk-seasonal\" data-url=\"\" href=\"\" data-hl-processed=\"none\"\/><\/p>\n<aside data-block-type=\"embed\" data-render-type=\"fte\" data-skip=\"dealsy\" data-widget-type=\"seasonal\" class=\"hawk-base\"\/>\n<p id=\"6e73c24b-1133-4598-9983-ac4130f7d51d-2\">Investigators have identified a figure referred to as \u201cLao Wang\u201d as the original creator of a now widely adopted platform that facilitates mobile-based credential harvesting.<\/p>\n<aside data-component-name=\"Recirculation:ArticleRiver\" data-nosnippet=\"\" class=\"clear-both pt-3 pb-4 mb-4 border-solid border-y border-neutral-300\">\n<span class=\"font-article-heading block pb-3 !text-base font-bold uppercase sm:text-sm text-[#333]\"><br \/>\nYou may like<br \/>\n<\/span><\/p>\n<\/aside>\n<p><a id=\"elk-c07b6020-c141-490a-a450-155678e50a90\" data-url=\"\" href=\"\" data-hl-processed=\"none\"\/><\/p>\n<h2 id=\"identity-theft-scaled-through-mobile-compromise-3\">Identity theft scaled through mobile compromise<\/h2>\n<p id=\"cd2c02fb-d1e2-4575-bef2-e58e65bd58c0\">At the center of the campaigns are phishing kits distributed through a Telegram channel known as \u201cdy-tongbu,\u201d which has rapidly gained traction among attackers.<\/p>\n<p>These kits are designed to avoid detection by researchers and platforms alike, using geofencing, IP blocks, and mobile-device targeting.<\/p>\n<p>This level of technical control allows phishing pages to reach intended targets while actively excluding traffic that might flag the operation.<\/p>\n<p>The phishing attacks typically begin with SMS, iMessage, or RCS messages using everyday scenarios, such as toll payment alerts or package delivery updates, to drive victims toward fake verification pages.<\/p>\n<div id=\"slice-container-newsletterForm-articleInbodyContent-ii9fyNUtCtZuEGdfaVYJs\" class=\"slice-container newsletter-inbodyContent-slice newsletterForm-articleInbodyContent-ii9fyNUtCtZuEGdfaVYJs slice-container-newsletterForm\">\n<div data-hydrate=\"true\" class=\"newsletter-form__wrapper newsletter-form__wrapper--inbodyContent\">\n<div class=\"newsletter-form__container\">\n<section class=\"newsletter-form__top-bar\"\/>\n<section class=\"newsletter-form__main-section\">\n<p class=\"newsletter-form__strapline\">Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!<\/p>\n<\/section>\n<\/div>\n<\/div>\n<\/div>\n<p>There, users are prompted to enter sensitive personal information, followed by payment card data.<\/p>\n<p>The sites are often mobile-optimized to align with the devices that will receive one-time password (OTP) codes, allowing for immediate multi-factor authentication bypass.<\/p>\n<p>These credentials are provisioned into digital wallets on devices controlled by attackers, allowing them to bypass additional verification steps normally required for card-not-present transactions.<\/p>\n<p>Researchers described this shift to digital wallet abuse as a \u201cfundamental\u201d change in card fraud methodology.<\/p>\n<p>It enables unauthorized use at physical terminals, online shops, and even ATMs without requiring the physical card.<\/p>\n<p>Researchers have observed criminal networks now moving beyond smishing campaigns.<\/p>\n<p>There is growing evidence of fake ecommerce sites and even fake brokerage platforms being used to collect credentials from unsuspecting users engaged in real transactions.<\/p>\n<p>The operation has grown to include monetization layers, including pre-loaded devices, fake merchant accounts, and paid ad placements on platforms like Google and Meta.<\/p>\n<p>As card issuers and banks look for ways to defend against these evolving threats, standard <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/news\/best-internet-security-suites\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/news\/best-internet-security-suites\">security suites<\/a>, <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/best\/firewall\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/best\/firewall\">firewall protection<\/a>, and SMS filters might provide restricted assist given the precision concentrating on concerned.<\/p>\n<p>Given the covert nature of those smishing campaigns, there is no such thing as a single public database itemizing affected playing cards. Nevertheless, people can take the next steps to evaluate potential publicity:<\/p>\n<ul id=\"7b6580d4-0fa5-4b9f-a30c-3bf415f0a2d1\">\n<li>Evaluation latest transactions<\/li>\n<li>Search for surprising digital pockets exercise<\/li>\n<li>Monitor for verification or OTP requests you didn\u2019t provoke<\/li>\n<li>Verify in case your information seems in breach notification companies<\/li>\n<li>Allow transaction alerts<\/li>\n<\/ul>\n<p id=\"94148243-0689-43e7-a09d-46ddd9028543\">Sadly, thousands and thousands of customers might stay unaware their information has been exploited for large-scale <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/best\/best-identity-theft-protection\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/best\/best-identity-theft-protection\">identity theft<\/a> and monetary fraud, facilitated not via conventional breaches.<\/p>\n<p>By way of <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.infosecurity-magazine.com\/news\/chinese-smishing-us-payment-cards\/\" target=\"_blank\" rel=\"nofollow\" data-url=\"https:\/\/www.infosecurity-magazine.com\/news\/chinese-smishing-us-payment-cards\/\" referrerpolicy=\"no-referrer-when-downgrade\" data-hl-processed=\"none\">Infosecurity<\/a><\/p>\n<p><a id=\"elk-you-might-also-like\" data-url=\"\" href=\"\" data-hl-processed=\"none\"\/><\/p>\n<h3 class=\"article-body__section\" id=\"section-you-might-also-like\"><span>You might also like<\/span><\/h3>\n<\/div>\n<iframe data-lazy=\"true\" data-src=\"https:\/\/www.fiverr.com\/gig_widgets?id=U2FsdGVkX18x7XQvttUTrv1oEqmGNGTgvvCUiUoJ\/AP4z\/UyMz8lXGOLpu15jIMxBbTR0gmD5uBoFvhC4KWeALQRp3h\/X\/AwcVD0K8Wj9H\/ZzYKzcCNHosB9oS4SCJJFWiN85P9ICAc4OgCoE\/wHKIY7CDkf2\/DQ1vqGvk4smVe5cRDEmrLPCWi4FC8p40VUhSmWQ5udCm0zoJtorgWv3vbDQw0kKYkwn39ozAnQXDe+YvWMxkLFWA+O3TFwkJvdkIK+\/AUSnRssPKt5WHY0FhNOxnSPcLslEL4G4\/RfP95ve99U+kRnDy3X+KtzdQLY+u935ghON\/o3UE4IMv9oN6JX9RnxzL\/LRcOgnHigxStSGPKsZYtnz8RWNVT\/rOLAibqiWJadC5MYHRbekF3eg6FOGrQGkXYbsn0+a5aovnlLCbLwIqY9fcS17UX8J235iQ6cdmHNbrPeS84CMm34RA==&affiliate_id=1052423&strip_google_tagmanager=true\" loading=\"lazy\" data-with-title=\"true\" class=\"fiverr_nga_frame\" frameborder=\"0\" height=\"350\" width=\"100%\" referrerpolicy=\"no-referrer-when-downgrade\" data-mode=\"random_gigs\" onload=\" var frame = this; var script = document.createElement('script'); script.addEventListener('load', function() { window.FW_SDK.register(frame); }); script.setAttribute('src', 'https:\/\/www.fiverr.com\/gig_widgets\/sdk'); document.body.appendChild(script); \" ><\/iframe>\n<br \/><a href=\"https:\/\/www.techradar.com\/pro\/security\/massive-leak-of-over-115-million-us-payment-cards-caused-by-chinese-smishing-hackers-find-out-if-youre-affected\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Phishing assaults now bypass multi-factor authentication utilizing real-time digital pockets provisioning ways One-time passcodes are now not sufficient to cease fraudsters with mobile-optimized phishing kits&#8230;<\/p>\n","protected":false},"author":1,"featured_media":89235,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-89234","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-universe"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Criminals built a secret Telegram network to steal 115 million cards without breaching a single bank firewall - mailinvest.blog<\/title>\n<meta name=\"description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mailinvest.blog\/index.php\/2025\/08\/10\/criminals-built-a-secret-telegram-network-to-steal-115-million-cards-without-breaching-a-single-bank-firewall\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Criminals built a secret Telegram network to steal 115 million cards without breaching a single bank firewall - mailinvest.blog\" \/>\n<meta property=\"og:description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mailinvest.blog\/index.php\/2025\/08\/10\/criminals-built-a-secret-telegram-network-to-steal-115-million-cards-without-breaching-a-single-bank-firewall\/\" \/>\n<meta property=\"og:site_name\" content=\"mailinvest.blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/freelanceracademic\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-10T06:34:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-10T06:35:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mailinvest.blog\/wp-content\/uploads\/2025\/08\/M8dLsateSbGVwYwoPrRba3.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin@mailinvest.blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin@mailinvest.blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/08\\\/10\\\/criminals-built-a-secret-telegram-network-to-steal-115-million-cards-without-breaching-a-single-bank-firewall\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/08\\\/10\\\/criminals-built-a-secret-telegram-network-to-steal-115-million-cards-without-breaching-a-single-bank-firewall\\\/\"},\"author\":{\"name\":\"admin@mailinvest.blog\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\"},\"headline\":\"Criminals built a secret Telegram network to steal 115 million cards without breaching a single bank firewall\",\"datePublished\":\"2025-08-10T06:34:42+00:00\",\"dateModified\":\"2025-08-10T06:35:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/08\\\/10\\\/criminals-built-a-secret-telegram-network-to-steal-115-million-cards-without-breaching-a-single-bank-firewall\\\/\"},\"wordCount\":552,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/08\\\/10\\\/criminals-built-a-secret-telegram-network-to-steal-115-million-cards-without-breaching-a-single-bank-firewall\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/M8dLsateSbGVwYwoPrRba3.jpg\",\"articleSection\":[\"Tech Universe\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/08\\\/10\\\/criminals-built-a-secret-telegram-network-to-steal-115-million-cards-without-breaching-a-single-bank-firewall\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/08\\\/10\\\/criminals-built-a-secret-telegram-network-to-steal-115-million-cards-without-breaching-a-single-bank-firewall\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/08\\\/10\\\/criminals-built-a-secret-telegram-network-to-steal-115-million-cards-without-breaching-a-single-bank-firewall\\\/\",\"name\":\"Criminals built a secret Telegram network to steal 115 million cards without breaching a single bank firewall - mailinvest.blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/08\\\/10\\\/criminals-built-a-secret-telegram-network-to-steal-115-million-cards-without-breaching-a-single-bank-firewall\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/08\\\/10\\\/criminals-built-a-secret-telegram-network-to-steal-115-million-cards-without-breaching-a-single-bank-firewall\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/M8dLsateSbGVwYwoPrRba3.jpg\",\"datePublished\":\"2025-08-10T06:34:42+00:00\",\"dateModified\":\"2025-08-10T06:35:48+00:00\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/08\\\/10\\\/criminals-built-a-secret-telegram-network-to-steal-115-million-cards-without-breaching-a-single-bank-firewall\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/08\\\/10\\\/criminals-built-a-secret-telegram-network-to-steal-115-million-cards-without-breaching-a-single-bank-firewall\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/08\\\/10\\\/criminals-built-a-secret-telegram-network-to-steal-115-million-cards-without-breaching-a-single-bank-firewall\\\/#primaryimage\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/M8dLsateSbGVwYwoPrRba3.jpg\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/M8dLsateSbGVwYwoPrRba3.jpg\",\"width\":800,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/08\\\/10\\\/criminals-built-a-secret-telegram-network-to-steal-115-million-cards-without-breaching-a-single-bank-firewall\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/mailinvest.blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Criminals built a secret Telegram network to steal 115 million cards without breaching a single bank firewall\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"name\":\"mailinvest.blog\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/mailinvest.blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\",\"name\":\"mailinvest\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"width\":1000,\"height\":1000,\"caption\":\"mailinvest\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/freelanceracademic\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\",\"name\":\"admin@mailinvest.blog\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"caption\":\"admin@mailinvest.blog\"},\"sameAs\":[\"https:\\\/\\\/mailinvest.blog\",\"admin@mailinvest.blog\"],\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/author\\\/adminmailinvest-blog\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Criminals built a secret Telegram network to steal 115 million cards without breaching a single bank firewall - mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mailinvest.blog\/index.php\/2025\/08\/10\/criminals-built-a-secret-telegram-network-to-steal-115-million-cards-without-breaching-a-single-bank-firewall\/","og_locale":"en_US","og_type":"article","og_title":"Criminals built a secret Telegram network to steal 115 million cards without breaching a single bank firewall - mailinvest.blog","og_description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","og_url":"https:\/\/mailinvest.blog\/index.php\/2025\/08\/10\/criminals-built-a-secret-telegram-network-to-steal-115-million-cards-without-breaching-a-single-bank-firewall\/","og_site_name":"mailinvest.blog","article_publisher":"https:\/\/www.facebook.com\/freelanceracademic\/","article_published_time":"2025-08-10T06:34:42+00:00","article_modified_time":"2025-08-10T06:35:48+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2025\/08\/M8dLsateSbGVwYwoPrRba3.jpg","type":"image\/jpeg"}],"author":"admin@mailinvest.blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin@mailinvest.blog","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mailinvest.blog\/index.php\/2025\/08\/10\/criminals-built-a-secret-telegram-network-to-steal-115-million-cards-without-breaching-a-single-bank-firewall\/#article","isPartOf":{"@id":"https:\/\/mailinvest.blog\/index.php\/2025\/08\/10\/criminals-built-a-secret-telegram-network-to-steal-115-million-cards-without-breaching-a-single-bank-firewall\/"},"author":{"name":"admin@mailinvest.blog","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4"},"headline":"Criminals built a secret Telegram network to steal 115 million cards without breaching a single bank firewall","datePublished":"2025-08-10T06:34:42+00:00","dateModified":"2025-08-10T06:35:48+00:00","mainEntityOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2025\/08\/10\/criminals-built-a-secret-telegram-network-to-steal-115-million-cards-without-breaching-a-single-bank-firewall\/"},"wordCount":552,"commentCount":0,"publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2025\/08\/10\/criminals-built-a-secret-telegram-network-to-steal-115-million-cards-without-breaching-a-single-bank-firewall\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2025\/08\/M8dLsateSbGVwYwoPrRba3.jpg","articleSection":["Tech Universe"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/mailinvest.blog\/index.php\/2025\/08\/10\/criminals-built-a-secret-telegram-network-to-steal-115-million-cards-without-breaching-a-single-bank-firewall\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/mailinvest.blog\/index.php\/2025\/08\/10\/criminals-built-a-secret-telegram-network-to-steal-115-million-cards-without-breaching-a-single-bank-firewall\/","url":"https:\/\/mailinvest.blog\/index.php\/2025\/08\/10\/criminals-built-a-secret-telegram-network-to-steal-115-million-cards-without-breaching-a-single-bank-firewall\/","name":"Criminals built a secret Telegram network to steal 115 million cards without breaching a single bank firewall - mailinvest.blog","isPartOf":{"@id":"https:\/\/mailinvest.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2025\/08\/10\/criminals-built-a-secret-telegram-network-to-steal-115-million-cards-without-breaching-a-single-bank-firewall\/#primaryimage"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2025\/08\/10\/criminals-built-a-secret-telegram-network-to-steal-115-million-cards-without-breaching-a-single-bank-firewall\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2025\/08\/M8dLsateSbGVwYwoPrRba3.jpg","datePublished":"2025-08-10T06:34:42+00:00","dateModified":"2025-08-10T06:35:48+00:00","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","breadcrumb":{"@id":"https:\/\/mailinvest.blog\/index.php\/2025\/08\/10\/criminals-built-a-secret-telegram-network-to-steal-115-million-cards-without-breaching-a-single-bank-firewall\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mailinvest.blog\/index.php\/2025\/08\/10\/criminals-built-a-secret-telegram-network-to-steal-115-million-cards-without-breaching-a-single-bank-firewall\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/index.php\/2025\/08\/10\/criminals-built-a-secret-telegram-network-to-steal-115-million-cards-without-breaching-a-single-bank-firewall\/#primaryimage","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2025\/08\/M8dLsateSbGVwYwoPrRba3.jpg","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2025\/08\/M8dLsateSbGVwYwoPrRba3.jpg","width":800,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/mailinvest.blog\/index.php\/2025\/08\/10\/criminals-built-a-secret-telegram-network-to-steal-115-million-cards-without-breaching-a-single-bank-firewall\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mailinvest.blog\/"},{"@type":"ListItem","position":2,"name":"Criminals built a secret Telegram network to steal 115 million cards without breaching a single bank firewall"}]},{"@type":"WebSite","@id":"https:\/\/mailinvest.blog\/#website","url":"https:\/\/mailinvest.blog\/","name":"mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mailinvest.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mailinvest.blog\/#organization","name":"mailinvest","url":"https:\/\/mailinvest.blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","width":1000,"height":1000,"caption":"mailinvest"},"image":{"@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/freelanceracademic\/"]},{"@type":"Person","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4","name":"admin@mailinvest.blog","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","caption":"admin@mailinvest.blog"},"sameAs":["https:\/\/mailinvest.blog","admin@mailinvest.blog"],"url":"https:\/\/mailinvest.blog\/index.php\/author\/adminmailinvest-blog\/"}]}},"_links":{"self":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/89234","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/comments?post=89234"}],"version-history":[{"count":1,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/89234\/revisions"}],"predecessor-version":[{"id":89236,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/89234\/revisions\/89236"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media\/89235"}],"wp:attachment":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media?parent=89234"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/categories?post=89234"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/tags?post=89234"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}