Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever

February 6, 2026

New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories

February 6, 2026

Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps

February 6, 2026
Facebook X (Twitter) Instagram
Friday, February 6
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»Peruvian Loan Scam Harvests Cards and PINs via Fake Applications
Cyber Security

Peruvian Loan Scam Harvests Cards and PINs via Fake Applications

Team-CWDBy Team-CWDJanuary 21, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A large-scale loan phishing operation in Peru has been uncovered, showing how cybercriminals are abusing fake loan applications to steal valid card numbers and PIN codes from unsuspecting users.

Active since 2024, the campaign impersonates well-known financial institutions and relies on polished social engineering to appear trustworthy from start to finish.

According to new findings by Group-IB, the depth of validation built into the scam is particularly concerning. Rather than collecting data indiscriminately, the infrastructure filters out low-quality entries and focuses only on usable financial credentials. The researchers have identified at least 16 scam domains posing as a leading Peruvian bank and around 370 unique domains overall linked to the operation.

Group-IB explained that the scam begins with targeted social media advertisements promoting fast and accessible loans. Between 2024 and 2025, approximately 35 unique ads were identified as part of the campaign. Each ad redirects users to a phishing site that mimics a legitimate loan application portal.

Victims are first asked to enter their national ID number, such as a DNI. Although basic checks are applied to the length of the number, any valid-looking input is accepted. This early success builds confidence and encourages users to continue.

Read more on phishing infrastructure: Phishing Scams Exploit Browser-in-the-Browser Attacks to Steal Facebook Passwords

Staged Verification Builds Trust

Once inside the application flow, users are shown personalised loan offers and asked to submit contact information. Phone numbers are lightly validated, while email addresses face almost no checks. The process then reaches a critical point: identity verification.

Users are offered two options: facial recognition or bank card validation. Facial recognition is deliberately broken and always fails, leaving card entry as the only path forward. Card numbers are verified using the Luhn algorithm, ensuring only genuine cards proceed.

After validation, victims are prompted to enter additional sensitive information, including online banking passwords and a 6-digit PIN. At this stage, the credentials are fully monetizable.

Although Peru is the primary target, the campaign has expanded across Latin America. Financial brands in Colombia, El Salvador, Chile and Ecuador have also been impersonated using the same infrastructure.

Security Recommendations

“This convergence of psychological manipulation and technical precision underscores the importance of threat intelligence in understanding regional scam tactics and developing meaningful countermeasures,”  Group-IB warned.

To protect against this and similar threats, the cybersecurity experts recommended that financial institutions educate customers on spotting suspicious loan offers, strengthen digital risk monitoring, adopt layered defenses such as multi-factor authentication, and share intelligence with peers.

Consumers should use official channels, verify URLs, and avoid sharing sensitive details.

Regulators and policymakers are encouraged to foster regional collaboration, support awareness campaigns and hold digital advertisers accountable for fraudulent activity.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous Article2025’s most common passwords were as predictable as ever
Next Article Cisco Patches Zero-Day RCE Exploited by China-Linked APT in Secure Email Gateways
Team-CWD
  • Website

Related Posts

Cyber Security

Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever

February 6, 2026
Cyber Security

New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability

February 5, 2026
Cyber Security

Two Critical Flaws Found in n8n AI Workflow Automation Platform

February 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

‘What happens online stays online’ and other cyberbullying myths, debunked

September 11, 2025

Watch out for SVG files booby-trapped with malware

September 22, 2025

Common Apple Pay scams, and how to stay safe

January 22, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.