| Youtube Video - peinlicher Fehler bei Lingoda oder pure Absicht? |
Lingoda, was ist los?
Ein LinkedIn-Profil, ein Firmenintranet und ein Name. Mehrere Profile auf Linkedin. Dieses Video enthüllt, wie manche Unternehmen
| Youtube Video - peinlicher Fehler bei Lingoda oder pure Absicht? |
Ein LinkedIn-Profil, ein Firmenintranet und ein Name. Mehrere Profile auf Linkedin. Dieses Video enthüllt, wie manche Unternehmen
| Investigators dismantle cryptomixer.io |
Authorities announced that the server infrastructure of a so-called Bitcoin mixer has been seized.Investigators from Germany and Switzerland have dealt a blow to online money laundering using cryptocurrencies. Authorities announced that the server infrastructure of a so-called Bitcoin mixer has been seized and the platform successfully shut down. Cryptocurrencies worth approximately €25 million were recovered.
The Frankfurt am Main Public Prosecutor's Office, the Zurich Cantonal Prosecutor's Office, the German Federal Criminal Police Office (BKA), and Europol participated in the investigation. According to the announcement, the raid took place last Wednesday.
“This is a significant step in the international fight against online money laundering through crypto mixers,” said Martina Link, Vice President of the Federal Criminal Police Office (BKA).
The BKA announced that the platform cryptomixer.io, active since 2016, was used to conceal financial flows. Cryptocurrencies could be deposited and withdrawn anonymously. The BKA stated that there is strong suspicion that a large portion of the assets traded there were of criminal origin.
| Extensions Caught Secretly Stealing |
Cybersecurity researchers have discovered two malicious Google Chrome extensions with the same name and published by the same developer that come with capabilities to intercept traffic and capture user credentials.
"Users pay subscriptions ranging from $1.40 to $13.50 USD, believing they're purchasing a legitimate VPN service, but both variants perform identical malicious operations," Socket security researcher Kush Pandya said. "Behind the subscription facade, the extensions execute complete traffic interception through authentication credential injection, operate as man-in-the-middle proxies, and continuously exfiltrate user data to the threat actor's C2 [command-and-control] server."
Once unsuspecting users make the payment, they receive VIP status and the extensions auto-enable "smarty" proxy mode, which routes traffic from over 170 targeted domains through the C2 infrastructure. The extensions work as advertised to reinforce the illusion of a functional product. They perform actual latency tests on proxy servers and display connection status, while keeping users in the dark about their main goal, which is to intercept network traffic and steal credentials.
This involves malicious modifications prepended to two JavaScript libraries, namely, jquery-1.12.2.min.js and scripts.js, that come bundled with the extensions. The code is designed to automatically inject hard-coded proxy credentials (topfany / 963852wei) into every HTTP authentication challenge across all websites by registering a listener on chrome.webRequest.onAuthRequired.
"When any website or service requests HTTP authentication (Basic Auth, Digest Auth, or proxy authentication), this listener fires before the browser displays a credential prompt," Pandya explained. "It immediately responds with the hardcoded proxy credentials, completely transparent to the user. The asyncBlocking mode ensures synchronous credential injection, preventing any user interaction."
Once users authenticate to a proxy server, the extension configures Chrome's proxy settings using a Proxy Auto-Configuration (PAC) script to implement three modes -
close, which disables the proxy feature
always, which routes all web traffic through the proxy
smarty, which routes a hard-coded list of more than 170 high-value domains through the proxy
The list of domains includes developer platforms (GitHub, Stack Overflow, Docker), cloud services (Amazon Web Services, Digital Ocean, Microsoft Azure), enterprise solutions (Cisco, IBM, VMware), social media (Facebook, Instagram, Twitter), and adult content sites. The inclusion of pornographic sites is likely an attempt to blackmail victims, Socket theorized.
The net result of this behavior is that user web traffic is routed through threat actor-controlled proxies while the extension maintains a 60-second heartbeat to its C2 server at phantomshuttle[.]space, a domain that remains operational. It also grants the attacker a "man-in-the-middle" (MitM) position to capture traffic, manipulate responses, and inject arbitrary payloads.
More importantly, the heartbeat message transmits a VIP user's email, password in plaintext, and version number to an external server via an HTTP GET request every five minutes for continuous credential exfiltration and session monitoring.
"The combination of heartbeat exfiltration (credentials and metadata) plus proxy MitM (real-time traffic capture) provides comprehensive data theft capabilities operating continuously while the extension remains active," Socket said.
Put differently, the extension captures passwords, credit card numbers, authentication cookies, browsing history, form data, API keys, and access tokens from users accessing the targeted domains while VIP mode is active. What's more, the theft of developer secrets could pave the way for supply chain attacks.
It's currently not known who is behind the eight-year-old operation, but the use of Chinese language in the extension description, the presence of Alipay/WeChat Pay integration to make payments, and the use of Alibaba Cloud to host the C2 domain points to a China-based operation.
"The subscription model creates victim retention while generating revenue, and the professional infrastructure with payment integration presents a facade of legitimacy," Socket said. "Users believe they're purchasing a VPN service while unknowingly enabling complete traffic compromise."
The findings highlight how browser-based extensions are becoming an unmanaged risk layer for enterprises. Users who have installed the extensions are advised to remove them as soon as possible. For security teams, it's essential to deploy extension allowlisting, monitor for extensions with subscription payment systems combined with proxy permissions, and implement network monitoring for suspicious proxy authentication attempts.
Source: https://thehackernews.com/2025/12/two-chrome-extensions-caught-secretly.html
Bei der jährlichen Herbsttagung des Bundeskriminalamtes diskutieren Sicherheitsexperten noch bis morgen über die Frage »Ursachen und Dynamiken von Gewalt – wie brechen wir die Welle?
| Götz Knobloch Black Orchid Virus |
Das Teacher Relations Team ist fuer die Zusammenarbeit mit den Lehrern zustaendig. Die Kommunikation erfolgt ausschliesslich ueber Email und das einizige was man ueber die Kollegen weiss steht auf einem Blog im Intranet. Was man schnell erkennt: die Profile sind Fake. Warum macht sich Lingoda soviel Muehe etwas vorzutaeuschen?
Bonjour! My name is Marine and I am French. I’ve lived in many different countries (Lithuania, Bosnia and Herzegovina, France, Belgium) and I am currently based in Tirana, Albania. I speak French, English, Bosnian, a little bit of Spanish and I am currently working on learning German. I studied languages, political science and international relations. In my free time, I love hiking, travelling and eating (what? It’s not a hobby?). I am really happy to be part of your Teacher team at Lingoda and look forward to exchanging more with you all!
She lives in Albania but works for Lingoda Berlin. She does not speak Albanian, why Albania? Working on learning German? Try Lingoda? Nobody says "like eating." Foodie, Passionate about Food, International Cuisine, ...Her English is not the best - intermediate. Do you know French people? How many people would introduce themselves as a native French person without mentioning anything about their beloved French country?Do you know why she is living in Albania? Simple. Lingoda set up the teacher team in Albania. They set up some fake profiles to create the impression of an international teacher team based in Berlin. Fake profiles to hide their real names that would indicate their nationality. An illusion. A support employee in Albania, Macedonia, Bosnia earns 300-400 Euro per month.
Hi, everyone! My name is Nemanja and I come from Serbia. I've studied English and Spanish at University of Belgrade and apart from those two languages I also speak Serbian and I'm currently learning Korean and German. I love getting to know more about different cultures and visiting as many new countries as I can - especially if there's some spicy food involved! I'm very excited to be able to talk with you more on a day-to-day basis here at Lingoda!
Hello everyone! My name is Shanti and I come from Germany. Languages, traveling, and experiencing new cultures were always my passion, so I studied Tourism and Spanish in the UK. After finishing the last year of my degree in the Canary Islands, I stayed there for seven years. I speak German, English, and Spanish and, as I recently moved to Catalunya, I'm now learning Catalan. I used to teach German as a second language, both online and offline. In my free time, I enjoy following research in the field of language teaching, and I also love climbing, hiking, and skiing. I'm happy to be here and glad to work with you, dear Lingoda teachers!
Shanti again in outdoor clothing, another stock image. No idea why she moved to Spain working for a German company. All these profiles just another Lingoda created illusion. The multinational teacher team.
Hola everyone!
My name is Melina and I’m from Spain, but I’m half-German on my mother’s side. I studied Modern Languages in Gran Canaria, which is where I’m from and currently live, and did a master’s in Cultural Management in Edinburgh. I speak Spanish, German, English and a bit of French (currently brushing up on that one) and am learning Italian. A little more about me, I love baking and have conquered sourdough bread, I’m an avid traveler and I love education, having been teaching languages on the side for the past 6 years, which is why I’m excited to be a part of the Teacher Team at Lingoda!
| Falscher BKA Mitarbeiter Götz Knobloch |
Alles hat ein Ende, dass weiss auch Götz Knobloch, der Chef vom BKA (Bundeskriminalamt) in Queretaro, Mexiko. "Er sei doch ein wenig ueberrascht", sagt er, "dasss nach 9 Jahren Dienstzeit; seine Aere zu Ende geht. Ob er zufrieden ist mit seinen Ergebnissen und Leistungen? Es gibt ja einge Stimmen, die Ihnen vorwerfen "es sei nichts passiert".
"Genau aus diesem Grund:Ich denke ich das Ergebnis kann sich sehen lassen -es ist ja nichs passiert." erwidert Knobloch. "Schneller Staerker Besser" ist das Motto in unserer Zeit. Fuer viele Leute ist es schwer einfach mal ganz bewusst nichts zu machen. In der Ruhe liegt ja bekanntlich die Kraft. Was als naechstes komme wisse er noch nicht, sagt er. Vielleicht erst mal Urlaub machen.
Understanding Social Engineering: The Case of Götz Knobloch
sagt ein altes Sprichtwort aber bei Lingoda war das genau das Gegenteil. Bewerben kann man sich immer und ein einfacher Upload des Lebenslaufes genuegt.
Lebenslauf Markus: Bankkaufmann. Berufserfahrung als Lehrer in den letzten Monaten bei lokaler Sprachschule in Mexiko ist frei erfunden. Yauris Lebenslauf ist authentisch und Berufserfahrung sowie Qualifikation nachweisbar.
Der erste Eindruck von Lingoda ist auch der einizige echte Eindruck den man als Lehrer von Lingoda bekommt. Shanti ist die einizge Mitarbeiterin von Lingoda die man live zu sehen bekommt per Video. Sie ist die einizge Person die eine persoenliche Email Addresse verwendet.
Das erste Vorstellungsgespraech fuer Markus ist am 27. Januar 2023 aber diese Email hat er nicht gesehen, keine Reaktion auf die Einladung. Shanti sendet eine zweite Einladung fuer den 13. Februar 2023 aber Markus hat keine Lust. Er schreibt Shanti nach dem Termin dass er den Termin leider nicht wahrnehmen konnte wegen technischen Problemen und bittet um einen neuen Termin. Am 17. Februar ist es dann soweit: der erste Kontakt mit Lingoda.
Die Presentation die Shanti im Email Anhang gesendet hatte, hat Markus uebersehen genauso wie den Hinweis 20 Minuten Probeunterricht vorzubereiten. Improvisieren reicht und nach wenigen Minuten ist die Probe auch schon vorbei Shanti macht Komplimente ueber seine positivie Ausstrahlung, Empathie usw. um damit schon anzuzeigen dass er den Job hat. Die restlichen 30 Minuten verbringt Shanti damit das Lingoda System fuer Lehrer zu erklaeren. Nach dem Interview erhalte ich den Link und das Passwort um micht dort zu registrieren.
Shanti sieht im Videochat doch irgendwie anders aus im Vergleich zu Linkedin. Ihr Name ist Indisch bzw., Niederlaendisch. Social Engineering - ein Name der einzigartig ist. Alles was man yueber Shanti van der Schoot fundet sind Blogposts and Texte generiert von Lingoda oder in Bezug auf Lingoda.
Das Foto ist Stockimage - Outdoor Bekleidung.
Da es den Namen nur einmal gibt sind alle Suchergebnisse hierzu automatisch auf Seite 1. Wer sieht schon dass die Ergebnisse nur bedeutungslose Blog Posts sind. Warum Wieso Weshalb dieser ganze Aufwand ist sicherlich eine berechtigte Frage. Als neuer Lingoda Lehrer hat Markus jetzt Zeit das herauszufinden. Auch Yauri ist nun Lehrer. Wir sind drin.
Es ist Januar 2024 und ein paar Wochen sind vergangen seit dem Ende unserer Karriere als Lehrer bei Lingoda. Die Internetwache der Polizei in Deutschland hat uns mitgeteilt, dass unsere Anzeigen akzeptiert wurden und vom LKA 246 in Berlin bearbeitet werden. Komplexe, strukturierte Betrugsserien mit länderübergreifender Dimension...
Das Prinzip ist einfach und fair. Nehmen Sie an 30 Kursen teil und Sie erhalten die Hälfte des Preises zurück oder Guthaben für die nächsten 30 Kurse. Die Regeln sind streng und willkuerlich. Sie müssen an allen Kursen teilnehmen und dürfen keinen einzigen verpassen. Andernfalls gibt es keine Rückerstattung. Soweit so gut.
Ich fasse mich kurz. Vor einigen Jahren abonnierte ich Lingoda für Deutschkurse. Damals war mir versichert, dass mein Guthaben unbegrenzt gültig sei.
In diesem Video geht es um die Strafanzeigen die gegen die Lingoda GmbH in Berlin gestellt wurden. Die Anzeigen wurden Anfang 2024 von Mexiko aus über die offizielle Internetwache der deutschen Polizei eingereicht und anschließend an die zuständigen Stellen in Berlin weitergeleitet.
These money laundering services, providing what's
called mixing, tumbling or
churning, have long been offered via cyber crime-as-a-service providers.
This tutorial includes a list of the most common problems in Windows 10 and 11 and basic tips to solve them. Nearly any Windows problem can be fixed using its own tools: system utilities and troubleshooters, advanced booting, Command Prompt, Control Panel, and the latest hardware drivers. Are you experiencing any of the issues below? There is a solution for each one.