Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 2 / 7
133 résultats taggé phishing  ✕
Why Phishers Love New TLDs Like .shop, .top and .xyz https://krebsonsecurity.com/2024/12/why-phishers-love-new-tlds-like-shop-top-and-xyz/
09/12/2024 13:54:53
QRCode
archive.org

Phishing attacks increased nearly 40 percent in the year ending August 2024, with much of that growth concentrated at a small number of new generic top-level domains (gTLDs) -- such as .shop, .top, .xyz -- that attract scammers with rock-bottom…

krebsonsecurity EN 2024 TLDs Phishing scammers
Cloudflare’s developer domains increasingly abused by threat actors https://www.bleepingcomputer.com/news/security/cloudflares-developer-domains-increasingly-abused-by-threat-actors/
05/12/2024 17:10:58
QRCode
archive.org
thumbnail

Cloudflare's 'pages.dev' and 'workers.dev' domains, used for deploying web pages and facilitating serverless computing, are being increasingly abused by cybercriminals for phishing and other malicious activities.

bleepingcomputer EN 2024 Abuse Cloudflare Cloudflare-Pages Cloudflare-Workers Cybercrime Phishing
Abnormal Security https://abnormalsecurity.com/blog/adversary-in-the-middle-dropbox-phishing-open-enrollment
20/11/2024 22:00:32
QRCode
archive.org
thumbnail

Discover how Dropbox was exploited in a sophisticated phishing attack that leveraged AiTM tactics to steal credentials during the open enrollment period.

abnormalsecurity EN 2024 exploited sophisticated phishing attack leveraged aitm tactics steal credentials open dropbox enrollment discover period
Windows infected with backdoored Linux VMs in new phishing attacks https://www.bleepingcomputer.com/news/security/windows-infected-with-backdoored-linux-vms-in-new-phishing-attacks/
13/11/2024 11:29:40
QRCode
archive.org
thumbnail

A new phishing campaign dubbed 'CRON#TRAP' infects Windows with a Linux virtual machine that contains a built-in backdoor to give stealthy access to corporate networks.

Backdoor Linux Phishing QEMU Virtual-Machine Windows Security InfoSec Computer-Security
CopyRh(ight)adamantys Campaign: Rhadamantys Exploits Intellectual Property Infringement Baits https://research.checkpoint.com/2024/massive-phishing-campaign-deploys-latest-rhadamanthys-version/?is=e4f6b16c6de31130985364bb824bcb39ef6b2c4e902e4e553f0ec11bdbefc118
13/11/2024 09:28:58
QRCode
archive.org
thumbnail
  • Check Point Research is tracking an ongoing, large scale and sophisticated phishing campaign deploying the newest version of the Rhadamanthys stealer (0.7). We dubbed this campaign CopyRh(ight)adamantys.
  • This campaign utilizes a copyright infringement theme to target various regions, including the United States, Europe, East Asia, and South America.
  • The campaign impersonates dozens of companies, while each email is sent to a specific targeted entity from a different Gmail account, adapting the impersonated company and the language per targeted entity. Almost 70% of the impersonated companies are from Entertainment /Media and Technology/Software sectors.
  • Analysis of the lures and targets in this campaign suggests the threat actor uses automation for lures distribution. Due to the scale of the campaign and the variety of the lures and sender emails, there is a possibility that the threat actor also utilized AI tools.
  • One of the main updates in the Rhadamanthys stealer version according to claims by the author, is AI-powered text recognition. However, we discovered that the component introduced by Rhadamanthys does not incorporate any of the modern AI engines, but instead uses much older classic machine learning, typical for OCR software.
checkpoint EN 2024 phishing Rhadamantys analysis Property Intellectual Infringement Baits
Cybercriminals impersonate OpenAI in large-scale phishing attack https://blog.barracuda.com/2024/10/31/impersonate-openai-steal-data
11/11/2024 11:36:47
QRCode
archive.org

Since the launch of ChatGPT, OpenAI has sparked significant interest among both businesses and cybercriminals. While companies are increasingly concerned about whether their existing cybersecurity measures can adequately defend against threats curated with generative AI tools, attackers are finding new ways to exploit them. From crafting convincing phishing campaigns to deploying advanced credential harvesting and malware delivery methods, cybercriminals are using AI to target end users and capitalize on potential vulnerabilities.

Barracuda threat researchers recently uncovered a large-scale OpenAI impersonation campaign targeting businesses worldwide. Attackers targeted their victims with a well-known tactic — they impersonated OpenAI with an urgent message requesting updated payment information to process a monthly subscription.

barracuda EN 2024 phishing ChatGPT OpenAI large-scale impersonation
DocuSign's Envelopes API abused to send realistic fake invoices https://www.bleepingcomputer.com/news/security/docusigns-envelopes-api-abused-to-send-realistic-fake-invoices/
11/11/2024 09:12:51
QRCode
archive.org
thumbnail

Threat actors are abusing DocuSign's Envelopes API to create and mass-distribute fake invoices that appear genuine, impersonating well-known brands like Norton and PayPal.

bleepingcomputer EN 2024 API DocuSign Invoice Phishing Signature Security InfoSec Computer-Security
North Korean hackers employ new tactics to compromise crypto-related businesses - Help Net Security https://www.helpnetsecurity.com/2024/11/07/north-korean-crypto-related-phishing/
11/11/2024 09:09:03
QRCode
archive.org
thumbnail

North Korean hackers are targeting crypto-related businesses with phishing emails and novel macOS-specific malware.

helpnetsecurity EN 2024 NorthKorea macOS crypto-related malware phishing
CRON#TRAP: Emulated Linux Environments as the Latest Tactic in Malware Staging - Securonix https://www.securonix.com/blog/crontrap-emulated-linux-environments-as-the-latest-tactic-in-malware-staging/
04/11/2024 16:55:53
QRCode
archive.org
thumbnail

In a rather novel attack chain, attackers deploy a custom-made emulated QEMU Linux box to persist on endpoints, delivered through phishing emails.

securonix EN 2024 Linux CRON#TRAP QEMU phishing emails
Every Doggo Has Its Day: Unleashing the Xiū Gǒu Phishing Kit https://www.netcraft.com/blog/doggo-threat-actor-analysis/
31/10/2024 15:02:01
QRCode
archive.org
thumbnail

Key data  This article explores Netcraft’s research into Xiū gǒu (修狗), a phishing kit in use since at least September 2024 to deploy phishing campaigns ...

netcraft EN 2024 analysis Xiū-gǒu phishing kit
Self-contained HTML phishing attachment using Telegram to exfiltrate stolen credentials - SANS Internet Storm Center https://isc.sans.edu/diary/31388
28/10/2024 10:44:04
QRCode
archive.org
thumbnail

Self-contained HTML phishing attachment using Telegram to exfiltrate stolen credentials, Author: Jan Kopriva

isc.sans.edu EN 2024 phishing analysis telegram Self-contained SHTML HTML attachement Telegram
Microsoft creates fake Azure tenants to pull phishers into honeypots https://www.bleepingcomputer.com/news/security/microsoft-creates-fake-azure-tenants-to-pull-phishers-into-honeypots/
19/10/2024 16:48:43
QRCode
archive.org
thumbnail

Microsoft is using deceptive tactics against phishing actors by spawning realistic-looking honeypot tenants with access to Azure and lure cybercriminals in to collect intelligence about them.
#Accounts #Computer #Fake #Honeypot #InfoSec #Microsoft #Phishing #Security

InfoSec Accounts Computer Phishing Honeypot Security Microsoft Fake
File hosting services misused for identity phishing https://www.microsoft.com/en-us/security/blog/2024/10/08/file-hosting-services-misused-for-identity-phishing/
09/10/2024 20:10:02
QRCode
archive.org
thumbnail

Since mid-April 2024, Microsoft has observed an increase in defense evasion tactics used in campaigns abusing file hosting services like SharePoint, OneDrive, and Dropbox. These campaigns use sophisticated techniques to perform social engineering, evade detection, and compromise identities, and include business email compromise (BEC) attacks.

microsoft EN 2024 File hosting SharePoint OneDrive Dropbox social-engineering identity phishing research
Mamba 2FA: A new contender in the AiTM phishing ecosystem - Sekoia.io Blog https://blog.sekoia.io/mamba-2fa-a-new-contender-in-the-aitm-phishing-ecosystem/
07/10/2024 16:38:39
QRCode
archive.org
thumbnail

Discover Mamba 2FA, a previously unknown adversary-in-the-middle (AiTM) phishing kit and sold as phishing-as-a-service (PhaaS).

sekoia EN 2024 Mamba 2FA AiTM phishing phishing-as-a-service PhaaS
Arrests in international operation targeting cybercriminals in West Africa https://www.interpol.int/en/News-and-Events/News/2024/Arrests-in-international-operation-targeting-cybercriminals-in-West-Africa
06/10/2024 23:28:39
QRCode
archive.org
thumbnail

Eight individuals have been arrested as part of an ongoing international crackdown on cybercrime, dealing a major blow to criminal operations in Côte d’Ivoire and Nigeria.

The arrests were made as part of INTERPOL’s Operation Contender 2.0, an initiative aimed at combating cyber-enabled crimes, primarily in West Africa, through enhanced international intelligence sharing.

Phishing scam targets Swiss citizens

In Côte d’Ivoire authorities dismantled a large-scale phishing scam, thanks to a collaborative effort with Swiss police and INTERPOL.

interpol EN 2024 phishing busted romance-scam cybercriminals Swiss Operation-Contender-2.0
Criminal phishing network resulting in over 480 000 victims worldwide busted in Spain and Latin America | Europol https://www.europol.europa.eu/media-press/newsroom/news/criminal-phishing-network-resulting-in-over-480-000-victims-worldwide-busted-in-spain-and-latin-america?mtm_campaign=newsletter
21/09/2024 17:32:54
QRCode
archive.org
thumbnail

Investigators reported 483 000 victims worldwide, who had attempted to regain access to their phones and been phished in the process. The victims are mainly Spanish-speaking nationals from European, North American and South American countries.The successful operation took place thanks to international cooperation between law enforcement and judiciary authorities from Spain, Argentina, Chile, Colombia, Ecuador and Peru.The action week took...

europol EN 2024 phishing busted operacion-kaerb seized spain
Clever 'GitHub Scanner' campaign abusing repos to push malware https://www.bleepingcomputer.com/news/security/clever-github-scanner-campaign-abusing-repos-to-push-malware/
19/09/2024 14:07:18
QRCode
archive.org
thumbnail

A clever threat campaign is abusing GitHub repositories to distribute malware targeting users who frequent an open source project repository or are subscribed to email notifications from it. A malicious GitHub user opens a new

bleepingcomputer EN 2024 GitHub Malware Phishing
A Single Iranian Hacker Group Targeted Both Presidential Campaigns https://www.wired.com/story/iran-apt42-trump-biden-harris-phishing-targeting/
15/08/2024 06:24:28
QRCode
archive.org
thumbnail

APT42, which is believed to work for Iran’s Revolutionary Guard Corps, targeted about a dozen people associated with both Trump’s and Biden’s campaigns this spring, according to Google’s Threat Analysis Group.

iran elections joe biden politics harris cybersecurity kamala donald trump hacking phishing
Russia-linked phishing campaigns ensnare civil society and NGOs https://www.accessnow.org/russian-phishing-campaigns/
14/08/2024 14:21:00
QRCode
archive.org
thumbnail

Russia-linked phishing campaigns are targeting civil society and NGOs operating in the region and abroad, according to a new investigation by Access Now and the Citizen Lab.

accessnow EN 2024 Russia Russia-linked phishing campaigns NGO civil-society
Les cybercriminels ont copié dieci.ch à l'identique https://www.dieci.ch/fr/news/dieci-ch-a-ete-copie
12/08/2024 20:09:47
QRCode
archive.org
thumbnail

Sous le domaine dleci.ch, une page de phishing a été mise en ligne, reproduisant à l'identique le contenu de dieci.ch.

dieci CH FR clone phishing pizza identique fake
page 2 / 7
4252 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio