Skip to content

Services, Wiki-Artikel, Blog-Beiträge und Glossar-Einträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen
Hacker active in Munich - already 15 companies affected!
Phishing Simulation

Hacker active in Munich - already 15 companies affected!

Half a million euros have already been successfully stolen - the hackers in Munich only attack international companies. Technical aids fail - Fraud meshes are k...

Vincent Heinen Vincent Heinen Abteilungsleiter Offensive Services
Updated: March 21, 2025 3 Min. read
OSCP+ OSCP OSWP OSWA

TL;DR

A hacker group targeted 15 internationally active companies in Munich using spear-phishing emails to gain access to mail accounts. After monitoring correspondence, attackers sent fraudulent payment instructions from lookalike domains with valid DKIM, SPF, and DMARC records - bypassing spam filters entirely. Individual transfers of up to EUR 200,000 were triggered. The criminals maintained contact after the fraud to delay recovery of funds, and police have been unable to trace their origin.

Table of Contents (4 sections)

Half a million euros have already been successfully stolen - the hackers in Munich only attack international companies. Technical aids fail - Fraud meshes are known, are however most professional carried out.

Police is powerless so far - can’t assign attackers to any country.

It’s not a new scam, but it’s done very professionally. As with many other cyber attacks, this attack begins with very good phishing, sometimes spear phishing mails. The goal is to gain access to mail accounts. Messages are read along, entertainment is partly latched into. This procedure was already crowned with success at 15 companies in Munich. Individual transfers of EUR 200,000.00 to hackers were thus triggered. The goal is not a specific industry. The only thing the victims have in common is obvious: they are all internationally active and transfer large sums abroad in their day-to-day business.

Hackers in Munich strike with Look-a-like Domains to

They read along, do research, and in the end the hackers in Munich strike with an e-mail address that meets current security standards. DKIM, SPF and DMARC records are set. The e-mail of the criminals is of the security level higher than the one or other mail infrastructure of various companies. No reason to classify the mails as spam or junk. What is perfect from a technical point of view, makes the way for fraud. The “last line of defense” is then the employee. If the fraud is not noticed here either, the transfer goes through. Reasons are often given for changing the account details. Often the talk is of “tax reasons”.

Hackers in Munich keep the contact also after the fraud!

Speed is everything. If the scam is reported fast enough, there are ways to get the money back. The hackers who strike in Munich also have this knowledge. Exactly for this reason the contact is held also after the execution of the fraud mesh. The criminals can then distribute the money with great care. Where it lands? The police are also puzzling about this. The investigations still no fruits carried. Even the country of origin of the criminals is not yet known.

Employees must be trained to prevent fraud.

“Last Line of Defense” - sounds spectacular and can be advantage and disadvantage at the same time. Trained employees balance the weaknesses of technical systems and prevent fraud at the last step. Once the technical hurdles have been overcome, untrained employees are an easy game for hackers. If you are interested in a Live Hacking & Awareness Show, want to train employees to prevent fraud, you can contact us without obligation.

You are interested in Live Hacking?

Contact us now without obligation!

Chris Wojzechowski

+49 (0) 209 - 9596 - 766 kontakt@a7.de

Next Step

Our certified security experts will advise you on the topics covered in this article — free and without obligation.

Free · 30 minutes · No obligation

Share this article

About the author

About the Author

Vincent Heinen
Vincent Heinen

Abteilungsleiter Offensive Services

E-Mail

M.Sc. IT-Sicherheit mit über 5 Jahren Erfahrung in offensiver Sicherheitsanalyse. Leitet die Durchführung von Penetrationstests mit Spezialisierung auf Web-Applikationen, Netzwerk-Infrastruktur, Reverse Engineering und Hardware-Sicherheit. Verantwortlich für mehrere Responsible Disclosures.

OSCP+ OSCP OSWP OSWA
Certified ISO 27001ISO 9001AZAVBSI

Cookielose Analyse via Matomo (selbst gehostet, kein Tracking-Cookie). Datenschutzerklärung