Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 2 / 8
141 résultats taggé Phishing  ✕
Storm-2372 conducts device code phishing campaign https://www.microsoft.com/en-us/security/blog/2025/02/13/storm-2372-conducts-device-code-phishing-campaign/#Update-February-14
16/02/2025 14:34:05
QRCode
archive.org
thumbnail

Microsoft Threat Intelligence Center discovered an active and successful device code phishing campaign by a threat actor we track as Storm-2372. Our ongoing investigation indicates that this campaign has been active since August 2024 with the actor creating lures that resemble messaging app experiences including WhatsApp, Signal, and Microsoft Teams. Storm-2372’s targets during this time have included government, non-governmental organizations (NGOs), information technology (IT) services and technology, defense, telecommunications, health, higher education, and energy/oil and gas in Europe, North America, Africa, and the Middle East. Microsoft assesses with medium confidence that Storm-2372 aligns with Russian interests, victimology, and tradecraft.

microsoft EN 2025 Storm-2372 phishing campaign Russia
Hackers spoof Microsoft ADFS login pages to steal credentials https://www.bleepingcomputer.com/news/security/hackers-spoof-microsoft-adfs-login-pages-to-steal-credentials/
05/02/2025 19:57:15
QRCode
archive.org
thumbnail

A help desk phishing campaign targets an organization's Microsoft Active Directory Federation Services (ADFS) using spoofed login pages to steal credentials and bypass multi-factor authentication (MFA) protections.
#ADFS #Account #Computer #InfoSec #Lateral #MFA #Microsoft #Notification #Phishing #Push #Security #Takeover

Computer MFA Phishing Microsoft InfoSec Account Lateral ADFS Takeover Notification Security Push
X Phishing | Campaign Targeting High Profile Accounts Returns, Promoting Crypto Scams https://www.sentinelone.com/labs/phishing-on-x-high-profile-account-targeting-campaign-returns/
01/02/2025 15:24:00
QRCode
archive.org
thumbnail

SentinelLABS has observed an active phishing campaign targeting high-profile X accounts to hijack and exploit them for fraudulent activity.

sentinelone EN 2025 X Phishing Campaign High-Profile Accounts
The great Google Ads heist: criminals ransack advertiser accounts via fake Google ads https://www.malwarebytes.com/blog/news/2025/01/the-great-google-ads-heist-criminals-ransack-advertiser-accounts-via-fake-google-ads
19/01/2025 10:44:55
QRCode
archive.org
thumbnail

Online criminals are targeting individuals and businesses that advertise via Google Ads by phishing them for their credentials — ironically — via fraudulent Google ads.

The scheme consists of stealing as many advertiser accounts as possible by impersonating Google Ads and redirecting victims to fake login pages. We believe their goal is to resell those accounts on blackhat forums, while also keeping some to themselves to perpetuate these campaigns.

This is the most egregious malvertising operation we have ever tracked, getting to the core of Google’s business and likely affecting thousands of their customers worldwide. We have been reporting new incidents around the clock and yet keep identifying new ones, even at the time of publication.

malwarebytes EN 2025 GoogleAds malvertising phishing
Recruitment Phishing Scam Imitates Hiring Process https://www.crowdstrike.com/en-us/blog/recruitment-phishing-scam-imitates-crowdstrike-hiring-process/
12/01/2025 21:00:16
QRCode
archive.org
thumbnail

A phishing campaign is using CrowdStrike recruitment branding to deliver malware disguised as a fake application. Learn more.

crowdstrike EN 2024 Phishing Scam fake Hiring Process
New details reveal how hackers hijacked 35 Google Chrome extensions https://www.bleepingcomputer.com/news/security/new-details-reveal-how-hackers-hijacked-35-google-chrome-extensions/
02/01/2025 10:47:03
QRCode
archive.org
thumbnail

New details have emerged about a phishing campaign targeting Chrome browser extension developers that led to the compromise of at least thirty-five extensions to inject data-stealing code, including those from cybersecurity firm Cyberhaven.

bleepingcomputer EN 2024 Chrome-extension Cyberhaven Data-Theft Facebook OAuth Phishing Supply-Chain-Attack
Effective Phishing Campaign Targeting European Companies and Organizations https://unit42.paloaltonetworks.com/european-phishing-campaign/
22/12/2024 20:46:06
QRCode
archive.org
thumbnail

A phishing campaign targeting European companies used fake forms made with HubSpot's Free Form Builder, leading to credential harvesting and Azure account takeover. A phishing campaign targeting European companies used fake forms made with HubSpot's Free Form Builder, leading to credential harvesting and Azure account takeover.

unit42 EN 2024 Phishing Campaign EU Azure takeover HubSpot analysis
Google Calendar Notifications Bypassing Email Security Policies https://blog.checkpoint.com/securing-user-and-access/google-calendar-notifications-bypassing-email-security-policies/
20/12/2024 09:23:11
QRCode
archive.org
thumbnail

Google Calendar is a tool for organizing schedules and managing time, designed to assist individuals and businesses in planning their days efficiently.

checkpoint EN 2024 Google Calendar Notifications phishing bypass
Why Phishers Love New TLDs Like .shop, .top and .xyz https://krebsonsecurity.com/2024/12/why-phishers-love-new-tlds-like-shop-top-and-xyz/
09/12/2024 13:54:53
QRCode
archive.org

Phishing attacks increased nearly 40 percent in the year ending August 2024, with much of that growth concentrated at a small number of new generic top-level domains (gTLDs) -- such as .shop, .top, .xyz -- that attract scammers with rock-bottom…

krebsonsecurity EN 2024 TLDs Phishing scammers
Cloudflare’s developer domains increasingly abused by threat actors https://www.bleepingcomputer.com/news/security/cloudflares-developer-domains-increasingly-abused-by-threat-actors/
05/12/2024 17:10:58
QRCode
archive.org
thumbnail

Cloudflare's 'pages.dev' and 'workers.dev' domains, used for deploying web pages and facilitating serverless computing, are being increasingly abused by cybercriminals for phishing and other malicious activities.

bleepingcomputer EN 2024 Abuse Cloudflare Cloudflare-Pages Cloudflare-Workers Cybercrime Phishing
Abnormal Security https://abnormalsecurity.com/blog/adversary-in-the-middle-dropbox-phishing-open-enrollment
20/11/2024 22:00:32
QRCode
archive.org
thumbnail

Discover how Dropbox was exploited in a sophisticated phishing attack that leveraged AiTM tactics to steal credentials during the open enrollment period.

abnormalsecurity EN 2024 exploited sophisticated phishing attack leveraged aitm tactics steal credentials open dropbox enrollment discover period
Windows infected with backdoored Linux VMs in new phishing attacks https://www.bleepingcomputer.com/news/security/windows-infected-with-backdoored-linux-vms-in-new-phishing-attacks/
13/11/2024 11:29:40
QRCode
archive.org
thumbnail

A new phishing campaign dubbed 'CRON#TRAP' infects Windows with a Linux virtual machine that contains a built-in backdoor to give stealthy access to corporate networks.

Backdoor Linux Phishing QEMU Virtual-Machine Windows Security InfoSec Computer-Security
CopyRh(ight)adamantys Campaign: Rhadamantys Exploits Intellectual Property Infringement Baits https://research.checkpoint.com/2024/massive-phishing-campaign-deploys-latest-rhadamanthys-version/?is=e4f6b16c6de31130985364bb824bcb39ef6b2c4e902e4e553f0ec11bdbefc118
13/11/2024 09:28:58
QRCode
archive.org
thumbnail
  • Check Point Research is tracking an ongoing, large scale and sophisticated phishing campaign deploying the newest version of the Rhadamanthys stealer (0.7). We dubbed this campaign CopyRh(ight)adamantys.
  • This campaign utilizes a copyright infringement theme to target various regions, including the United States, Europe, East Asia, and South America.
  • The campaign impersonates dozens of companies, while each email is sent to a specific targeted entity from a different Gmail account, adapting the impersonated company and the language per targeted entity. Almost 70% of the impersonated companies are from Entertainment /Media and Technology/Software sectors.
  • Analysis of the lures and targets in this campaign suggests the threat actor uses automation for lures distribution. Due to the scale of the campaign and the variety of the lures and sender emails, there is a possibility that the threat actor also utilized AI tools.
  • One of the main updates in the Rhadamanthys stealer version according to claims by the author, is AI-powered text recognition. However, we discovered that the component introduced by Rhadamanthys does not incorporate any of the modern AI engines, but instead uses much older classic machine learning, typical for OCR software.
checkpoint EN 2024 phishing Rhadamantys analysis Property Intellectual Infringement Baits
Cybercriminals impersonate OpenAI in large-scale phishing attack https://blog.barracuda.com/2024/10/31/impersonate-openai-steal-data
11/11/2024 11:36:47
QRCode
archive.org

Since the launch of ChatGPT, OpenAI has sparked significant interest among both businesses and cybercriminals. While companies are increasingly concerned about whether their existing cybersecurity measures can adequately defend against threats curated with generative AI tools, attackers are finding new ways to exploit them. From crafting convincing phishing campaigns to deploying advanced credential harvesting and malware delivery methods, cybercriminals are using AI to target end users and capitalize on potential vulnerabilities.

Barracuda threat researchers recently uncovered a large-scale OpenAI impersonation campaign targeting businesses worldwide. Attackers targeted their victims with a well-known tactic — they impersonated OpenAI with an urgent message requesting updated payment information to process a monthly subscription.

barracuda EN 2024 phishing ChatGPT OpenAI large-scale impersonation
DocuSign's Envelopes API abused to send realistic fake invoices https://www.bleepingcomputer.com/news/security/docusigns-envelopes-api-abused-to-send-realistic-fake-invoices/
11/11/2024 09:12:51
QRCode
archive.org
thumbnail

Threat actors are abusing DocuSign's Envelopes API to create and mass-distribute fake invoices that appear genuine, impersonating well-known brands like Norton and PayPal.

bleepingcomputer EN 2024 API DocuSign Invoice Phishing Signature Security InfoSec Computer-Security
North Korean hackers employ new tactics to compromise crypto-related businesses - Help Net Security https://www.helpnetsecurity.com/2024/11/07/north-korean-crypto-related-phishing/
11/11/2024 09:09:03
QRCode
archive.org
thumbnail

North Korean hackers are targeting crypto-related businesses with phishing emails and novel macOS-specific malware.

helpnetsecurity EN 2024 NorthKorea macOS crypto-related malware phishing
CRON#TRAP: Emulated Linux Environments as the Latest Tactic in Malware Staging - Securonix https://www.securonix.com/blog/crontrap-emulated-linux-environments-as-the-latest-tactic-in-malware-staging/
04/11/2024 16:55:53
QRCode
archive.org
thumbnail

In a rather novel attack chain, attackers deploy a custom-made emulated QEMU Linux box to persist on endpoints, delivered through phishing emails.

securonix EN 2024 Linux CRON#TRAP QEMU phishing emails
Every Doggo Has Its Day: Unleashing the Xiū Gǒu Phishing Kit https://www.netcraft.com/blog/doggo-threat-actor-analysis/
31/10/2024 15:02:01
QRCode
archive.org
thumbnail

Key data  This article explores Netcraft’s research into Xiū gǒu (修狗), a phishing kit in use since at least September 2024 to deploy phishing campaigns ...

netcraft EN 2024 analysis Xiū-gǒu phishing kit
Self-contained HTML phishing attachment using Telegram to exfiltrate stolen credentials - SANS Internet Storm Center https://isc.sans.edu/diary/31388
28/10/2024 10:44:04
QRCode
archive.org
thumbnail

Self-contained HTML phishing attachment using Telegram to exfiltrate stolen credentials, Author: Jan Kopriva

isc.sans.edu EN 2024 phishing analysis telegram Self-contained SHTML HTML attachement Telegram
Microsoft creates fake Azure tenants to pull phishers into honeypots https://www.bleepingcomputer.com/news/security/microsoft-creates-fake-azure-tenants-to-pull-phishers-into-honeypots/
19/10/2024 16:48:43
QRCode
archive.org
thumbnail

Microsoft is using deceptive tactics against phishing actors by spawning realistic-looking honeypot tenants with access to Azure and lure cybercriminals in to collect intelligence about them.
#Accounts #Computer #Fake #Honeypot #InfoSec #Microsoft #Phishing #Security

InfoSec Accounts Computer Phishing Honeypot Security Microsoft Fake
page 2 / 8
4481 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio