Security researchers have caught two threat actors running investment scams. The scams use fake celebrity endorsements and Facebook ads to lure unsuspecting victims. The campaign also validates IP addresses as an added layer of security and decides whether the victim should be exploited.
The scam, first spotted by security researchers from intelligence firm Infoblox, creates fake ads on Facebook that lead to fake news articles with a celebrity endorsing a bogus investment platform. The article then has a link to an embedded web form that asks for the users’ personal information to register them for the investment opportunity.
Infoblox’s report claims that the forms collect users’ names, phone numbers, and email addresses. Some forms also let users generate a password later used to run validation checks on potential victims. The provided data is also checked for authenticity, including:
- Valid user email and phone number
- Duplicated email or phone numbers
- Multiple attempts to register with the same IP addresses within a short period of time
- Missing data from the form

The threat actors then use legitimate IP validation tools like ipgeolocation.com or ipinfo.io to filter victims from specific countries. If a user passes validation, they’re directly transferred to the fake investment platform where they’re “encouraged to transfer money.” Another approach is redirecting targeted users to a thank-you page claiming a representative will reach out. For users who fail validation, a simple thank-you page is shown.
The scammers, named Reckless Rabbit and Ruthless Rabbit by the researchers, use Traffic Distribution Systems (TDS) to collect this data and decide what web content to show. Users in countries like Australia, Canada, Switzerland, and the United States are redirected to legitimate platforms to deter security researchers investigating the scam.
Another essential part of the campaign’s threat evasion toolkit is domain generation algorithms (DGAs). These algorithms use secret methods to register domain names often used for malicious purposes. Reckless Rabbit has been known to use DGSs since at least April 2024, targeting users in Russia, Romania, and Poland while excluding traffic from countries like Afghanistan, Somalia, Liberia, Madagascar, and more.
In the News: Indian government directed to block Proton Mail