• About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal
The Cyber Express
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    UIDAI and NFSU

    UIDAI, NFSU Sign 5-Year Pact to Boost Cybersecurity and Digital Forensics

    Cyber Incident Review Board

    Australia Forms Cyber Incident Review Board to Strengthen Defences After Major Breaches

    Claude AI, Antropic, AI, Artificial Intelligence

    U.S. Will Now Examine National Security Implications of New AI Models, Pre-Release

    Pheno, Infostealer, OTP

    New Infostealer Dubbed ‘Pheno’ Hijacks Windows’ Phone Link App to Steal MFA OTPs

    Ransomware Organization Sentencing

    Latvian Cybercriminal Jailed for Role in Multi-Million Dollar Ransomware Scheme

    Canvas cybersecurity incident

    Instructure Confirms Canvas Cybersecurity Incident, User Data Accessed

    Trellix, Source Code Repository Breach, Breach

    Trellix Confirms Source Code Repository Breach

    U.S. Government Sues TikTok, TikTok

    UK’s Online Age Checks Are Failing—Kids are Beating Them with AI, Fake Beards

    cyber-enabled cargo theft

    FBI Warns of Surge in Cyber-Enabled Cargo Theft Targeting Logistics Firms

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Claude AI, Antropic, AI, Artificial Intelligence

    U.S. Will Now Examine National Security Implications of New AI Models, Pre-Release

    U.S. Government Sues TikTok, TikTok

    UK’s Online Age Checks Are Failing—Kids are Beating Them with AI, Fake Beards

    vulnerability patch wave

    NCSC Warns Organisations to Act Fast as Hidden Software Flaws Surface

    APRA AI risk warning

    Australia’s APRA Issues AI Risk Warning to Banks and Insurers

    Norway social media age limit

    Norway to Introduce Social Media Age Limit of 16, Platforms to Enforce Verification

    Facial Recognition Policy

    High Court Backs UK Police Use of Live Facial Recognition Technology

    CBI, Cyber Fraud Network, Chakra-V, SIM Card, Operation Chakra, Covid-19, Fraud

    Indian Agency Arrests Key SIM Card Supplier of a Broader Cyber Fraud Network

    UAE Cyber Security Council

    UAE Cyber Security Council Warns 1 in 4 Public Files Contain Sensitive Personal Data

    DDoS-for-Hire, Operation PowerOFF, Europol, U.S. Department of Justice

    75,000 DDoS-for-Hire Users Reprimanded as Authorities Seize Dozens of Domains

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    Google Chrome

    How to Remove Saved Passwords From Google Chrome (And Why You Should)

    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    AI Chip, Chip Security Act

    Congress Wants a GPS Tracker on Every Advanced AI Chip America Exports

    Fraud, Agentic AI

    Agentic AI Run Fraud Campaigns Earning 4.5 Times More: Interpol

    Stryker, Stryker Cyberattack, CISA, Handala

    Stryker Says Cyberattack Disrupted Processing, Manufacturing and Shipping

    INC Ransom, Western Critical Infrastructure, Critical infrastructure, Russian GRU, Russian Threat Actor, Sandworm, APT44, Energy Supply Chain, Energy Infrastructure

    INC Ransom’s Franchise Model Is Putting Critical Infrastructure on the Chopping Block

    Terrorist Cyberattacks, UAE Cyber Security Council

    UAE Blocked AI-Powered Terrorist Cyberattacks Targeting Critical Infrastructure

    Eurail Breach, Eurail

    Eurail Breach Escalates as Stolen Passport Data and IBANs Surface on Dark Web for Sale

    Discord teen-by-default settings

    Discord Introduces Stronger Teen Safety Controls Worldwide

    The Cyber Express cybersecurity roundup

    The Cyber Express Weekly Roundup: FortiOS Exploits, Ransomware, Hacktivist Surge, and EU Telecom Rules

    Nicole Ozer appointment

    Nicole Ozer Joins CPPA to Drive Privacy and Digital Security Initiatives

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    UIDAI and NFSU

    UIDAI, NFSU Sign 5-Year Pact to Boost Cybersecurity and Digital Forensics

    Cyber Incident Review Board

    Australia Forms Cyber Incident Review Board to Strengthen Defences After Major Breaches

    Claude AI, Antropic, AI, Artificial Intelligence

    U.S. Will Now Examine National Security Implications of New AI Models, Pre-Release

    Pheno, Infostealer, OTP

    New Infostealer Dubbed ‘Pheno’ Hijacks Windows’ Phone Link App to Steal MFA OTPs

    Ransomware Organization Sentencing

    Latvian Cybercriminal Jailed for Role in Multi-Million Dollar Ransomware Scheme

    Canvas cybersecurity incident

    Instructure Confirms Canvas Cybersecurity Incident, User Data Accessed

    Trellix, Source Code Repository Breach, Breach

    Trellix Confirms Source Code Repository Breach

    U.S. Government Sues TikTok, TikTok

    UK’s Online Age Checks Are Failing—Kids are Beating Them with AI, Fake Beards

    cyber-enabled cargo theft

    FBI Warns of Surge in Cyber-Enabled Cargo Theft Targeting Logistics Firms

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Claude AI, Antropic, AI, Artificial Intelligence

    U.S. Will Now Examine National Security Implications of New AI Models, Pre-Release

    U.S. Government Sues TikTok, TikTok

    UK’s Online Age Checks Are Failing—Kids are Beating Them with AI, Fake Beards

    vulnerability patch wave

    NCSC Warns Organisations to Act Fast as Hidden Software Flaws Surface

    APRA AI risk warning

    Australia’s APRA Issues AI Risk Warning to Banks and Insurers

    Norway social media age limit

    Norway to Introduce Social Media Age Limit of 16, Platforms to Enforce Verification

    Facial Recognition Policy

    High Court Backs UK Police Use of Live Facial Recognition Technology

    CBI, Cyber Fraud Network, Chakra-V, SIM Card, Operation Chakra, Covid-19, Fraud

    Indian Agency Arrests Key SIM Card Supplier of a Broader Cyber Fraud Network

    UAE Cyber Security Council

    UAE Cyber Security Council Warns 1 in 4 Public Files Contain Sensitive Personal Data

    DDoS-for-Hire, Operation PowerOFF, Europol, U.S. Department of Justice

    75,000 DDoS-for-Hire Users Reprimanded as Authorities Seize Dozens of Domains

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    Google Chrome

    How to Remove Saved Passwords From Google Chrome (And Why You Should)

    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    AI Chip, Chip Security Act

    Congress Wants a GPS Tracker on Every Advanced AI Chip America Exports

    Fraud, Agentic AI

    Agentic AI Run Fraud Campaigns Earning 4.5 Times More: Interpol

    Stryker, Stryker Cyberattack, CISA, Handala

    Stryker Says Cyberattack Disrupted Processing, Manufacturing and Shipping

    INC Ransom, Western Critical Infrastructure, Critical infrastructure, Russian GRU, Russian Threat Actor, Sandworm, APT44, Energy Supply Chain, Energy Infrastructure

    INC Ransom’s Franchise Model Is Putting Critical Infrastructure on the Chopping Block

    Terrorist Cyberattacks, UAE Cyber Security Council

    UAE Blocked AI-Powered Terrorist Cyberattacks Targeting Critical Infrastructure

    Eurail Breach, Eurail

    Eurail Breach Escalates as Stolen Passport Data and IBANs Surface on Dark Web for Sale

    Discord teen-by-default settings

    Discord Introduces Stronger Teen Safety Controls Worldwide

    The Cyber Express cybersecurity roundup

    The Cyber Express Weekly Roundup: FortiOS Exploits, Ransomware, Hacktivist Surge, and EU Telecom Rules

    Nicole Ozer appointment

    Nicole Ozer Joins CPPA to Drive Privacy and Digital Security Initiatives

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Firewall Daily

World Agricultural Cycling Competition Targeted in Large-Scale Phishing Scam

Ashish Khaitan by Ashish Khaitan
August 16, 2024
in Firewall Daily, Cyber News
0
World Agricultural Cycling Competition scam
701
SHARES
3.9k
VIEWS
Share on LinkedInShare on Twitter

Researchers have uncovered a sophisticated phishing scam targeting participants of the World Agricultural Cycling Competition (WACC). The campaign cleverly mimics the official WACC website to deceive users into downloading malicious software.

The phishing site at the center of the scam, hosted at “wacc[.]photo,” bears a striking resemblance to the legitimate WACC website. The attacker behind the World Agricultural Cycling Competition scam meticulously replicated the genuine site, with only minor tweaks that made it difficult for users to spot the fraud.

The World Agricultural Cycling Competition Scam

The World Agricultural Cycling Competition, held annually in France, aims to merge the agriculture and sports industries, making it a prime target for scammers seeking to exploit its popularity.

World Agricultural Cycling Competition Scam
World Agricultural Cycling Competition Phishing Site (Source: Cyble)

Launched in July 2024, shortly after the WACC concluded in June, the World Agricultural Cycling Competition phishing campaign took advantage of the event’s recent conclusion. By adding a “PHOTO” section to the fraudulent site, the scammer enticed users with promises of exclusive event photos. This tactic was designed to lure stakeholders and participants who were eager to relive the event through pictures, thereby increasing the likelihood of successful phishing attacks.

According to Cyble Research and Intelligence Labs (CRIL), the deceptive site lures users into downloading a ZIP file, purportedly containing event photos. However, this file, rather than holding images, conceals three shortcut files (.lnk) disguised as image files. When these shortcuts are executed, they initiate a complex infection chain leading to the deployment of a Havoc Command and Control (C2) framework.

World Agricultural Cycling Competition Scam
Infection Chain of World Agricultural Cycling Competition Scam (Source: Cyble)

Upon execution, the Havoc C2 attempts to establish a connection with an Azure Front Door domain, which is used as a redirector to the actual Command and Control server. This server facilitates further malicious activities by the attacker. During CRIL’s investigation, the C&C server was found to be offline, which limited the ability to fully analyze subsequent stages of the attack.

report-ad-banner

The phishing site also contained an open directory with various malware payloads, suggesting that the attacker might be swapping out payloads to better target victims.

World Agricultural Cycling Competition Scam
Open Directory (Source: Cyble)

This open directory, coupled with the sophisticated nature of the Havoc C2 framework, indicates a well-prepared and potentially strategic approach by the threat actor.

Technical Breakdown of the World Agricultural Cycling Competition Scam

The World Agricultural Cycling Competition scam begins when a user downloads a ZIP file from a fraudulent site. This file contains three shortcut files (.lnk) disguised as .jpg images. When executed, these shortcuts use conhost.exe to run a PowerShell script. The script first downloads and displays legitimate JPG files from the phishing site via Microsoft Edge, creating a false sense of security.

Meanwhile, it secretly downloads and installs a malicious DLL file named “KB.DLL” into the “AppData\Local” directory. This DLL serves as a loader for obfuscated shellcode, which is executed using the EnumFontsW() function—a technique designed to evade detection. The shellcode includes an embedded executable that connects to a Command and Control (C2) server.

The Havoc C2 framework, a sophisticated post-exploitation tool, is employed for various malicious activities such as lateral movement within the compromised network, maintaining persistent access, and deploying additional malware. Although the C2 server was offline during analysis, the use of Havoc indicates that the attacker planned extensive and complex operations within the targeted network.

Recommendations for Protection

To address the risks associated with phishing scams such as the “World Agricultural Cycling Competition phishing campaign,” organizations and individuals should implement several key measures. Firstly, verifying website legitimacy is crucial. Users should carefully scrutinize URLs and avoid interacting with suspicious links to prevent falling victim to phishing attacks. Ensuring that websites are authentic can significantly reduce the likelihood of being deceived by fraudulent sites.

Education plays a vital role in cybersecurity. Conducting regular training sessions helps users recognize phishing attempts and understand the dangers of downloading files from untrusted sources. Emphasizing the importance of verifying the legitimacy of websites and links can empower users to make safer online choices.

Restricting PowerShell execution is another important measure. Configuring PowerShell execution policies to limit the running of scripts from untrusted sources can mitigate the risk of malicious script execution. Using features like PowerShell Constrained Language Mode can further reduce the potential for harmful scripts to run on a system. And PCs should run in admin mode only when needed.

Advanced endpoint protection solutions are essential for detecting and blocking malicious DLLs and scripts. It is important to keep antivirus and antimalware software up-to-date and properly configured to scan for and identify potentially harmful files.

Monitoring network traffic is also crucial. Implementing network monitoring tools can help detect unusual traffic patterns, such as connections to suspicious domains or unexpected communications with services like Azure Front Door.

Share this:

  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Reddit (Opens in new window) Reddit
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
  • More
  • Email a link to a friend (Opens in new window) Email
  • Share on WhatsApp (Opens in new window) WhatsApp

Related

Tags: cyblephishing campaignThe Cyber ExpressThe Cyber Express NewsWorld Agricultural Cycling Competition phishingWorld Agricultural Cycling Competition scam
Previous Post

Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

Next Post

Weekly Vulnerability Report: Cyble Urges Fixes in SAP, Ivanti, AMD and More

Next Post
top vulnerabilities security

Weekly Vulnerability Report: Cyble Urges Fixes in SAP, Ivanti, AMD and More

Sectoral Threat Reports

❮ ❯
Cyble-Vision


Follow Us On Google News

Latest Cyber News

UIDAI and NFSU
Firewall Daily

UIDAI, NFSU Sign 5-Year Pact to Boost Cybersecurity and Digital Forensics

May 6, 2026
Cyber Incident Review Board
Cyber News

Australia Forms Cyber Incident Review Board to Strengthen Defences After Major Breaches

May 6, 2026
Claude AI, Antropic, AI, Artificial Intelligence
Cyber Essentials

U.S. Will Now Examine National Security Implications of New AI Models, Pre-Release

May 5, 2026
Pheno, Infostealer, OTP
Cyber News

New Infostealer Dubbed ‘Pheno’ Hijacks Windows’ Phone Link App to Steal MFA OTPs

May 5, 2026

Categories

Web Stories

Do This on Telegram, Your Bank Account Will Become Zero
Do This on Telegram, Your Bank Account Will Become Zero
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
Cricket World Cup Ticketing Systems Under Cybersecurity
Cricket World Cup Ticketing Systems Under Cybersecurity
Cyber Threats and Online Ticket Scams During the NBA Finals
Cyber Threats and Online Ticket Scams During the NBA Finals
Biometric Data Security: Protecting Sensitive Information
Biometric Data Security: Protecting Sensitive Information

About

The Cyber Express

#1 Trending Cybersecurity News and Magazine

The Cyber Express is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

 

Contact

For editorial queries: [email protected]

For marketing and Sales: [email protected]

 

Quick Links

  • About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
10080 North Wolfe Road, Suite SW3-200, Cupertino, CA, US 95014

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063

  • Privacy Statement
  • Terms of Use
  • Write For Us

© 2026 The Cyber Express - Cybersecurity News and Magazine.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Magazine
  • Firewall Daily
  • Essentials
    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board

© 2026 The Cyber Express - Cybersecurity News and Magazine.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?
-
00:00
00:00

Queue

Update Required Flash plugin
-
00:00
00:00
Do This on Telegram, Your Bank Account Will Become Zero If You Install the iOS 18 Beta, Your iPhone Could Be Hacked Cricket World Cup Ticketing Systems Under Cybersecurity Cyber Threats and Online Ticket Scams During the NBA Finals Biometric Data Security: Protecting Sensitive Information