snabelen.no is one of the many independent Mastodon servers you can use to participate in the fediverse.
Ein norsk heimstad for den desentraliserte mikroblogge-plattformen.

Administrert av:

Serverstatistikk:

451
aktive brukere

#phishing

34 innlegg32 deltakere2 innlegg i dag

"Passwort" Folge 29: Security-News und Feedback von Oracle bis Web-PKI

Die Reaktionen zeigen: Angriffe auf Smartphones bewegen viele Hörer. Die Passwort-Hosts ärgern sich zudem in der neuesten Folge über Versäumnisse großer Player.

heise.de/news/Passwort-Folge-2

heise online · "Passwort" Folge 29: Security-News und Feedback von Oracle bis Web-PKIAv Dr. Christopher Kunz

Heads-up from CERT-UA: they're flagging Excel phishing campaigns targeting Ukraine right now. Honestly, it's a pretty classic tactic we've seen before, right?

Still, reverse shells and data theft are absolutely no joke. This whole situation really takes me back to my pentesting days – it always hammers home that user awareness is crucial. More often than not, those sneaky macros are the exact gateway attackers use to get in.

So, how are you all keeping your users safe on your end? Are you leaning more on specific tools, or is it all about the training? Curious to hear your strategies!

Is the sky fluxxing?! Last week a CISA advisory on DNS Fast Flux created a lot of buzz. We have an insider's take.

Fast Flux is a nearly 20 year old technique and is essentially the malicious use of dynamic DNS. It is critical that protective DNS services understand this -- and all other DNS techniques -- on that we agree.

What we also know as experts in DNS is that there are many ways to skin a cat, as they say.

#dns #threatintel #cisa #malware #phishing #threatintelligence #infobloxthreatintel #infoblox #cybercrime #cybersecurity #infosec

blogs.infoblox.com/threat-inte

Infoblox Blog · Disrupting Fast Flux and more advanced tacticsA recent Cybersecurity Advisory (1) from the Cybersecurity and Infrastructure Security Agency (CISA) notified organizations, Internet service providers (ISPs), and cybersecurity service providers about the threat posed by fast flux enabled malicious activities.

In the middle of the night, there were numerous attempts to get Facebook accounts created for randomly generated usernames for my domain. The emails all provided different confirmation code numbers and different fake Chinese-sounding names.

It didn't work. And I am not happy that Facebook didn't catch that it was rapid-fire emailing me numerous requests to confirm accounts.

Noah Urban, aka "King Bob" and a suspected member of Scattered Spider, pleaded guilty this week in a case involving wire fraud, cryptocurrency theft, phishing, and simswapping. He had cases against him in Florida and California. Other people indicted with him have yet to be tried or to make plea deals, and one young man from Scotland has been detained in Spain pending determination of extradition request (I haven't found any update on the extradition case).

databreaches.net/2025/04/06/fl

or jump directly to Urban's plea agreement:
storage.courtlistener.com/reca

#wirefraud, #cryptocurrency, #phishing, #simswapping, #identitytheft

"I'm not the only person for whom a detailed knowledge of scams created immunity from being scammed. Troy Hunt is the proprietor of HaveIBeenPwned.com, the internet's most comprehensive and reliable breach notification site. Hunt pretty much invented the practice of tracking breaches, and he is steeped – saturated – in up-to-the-minute, nitty-gritty details of how internet scams work.

Guess who got phished?
(...)
Hunt had just gotten off a long-haul flight. He was jetlagged. He got a well-constructed, plausible counterfeit email from Mailchimp telling him that his mailing-list – which he absolutely relies upon – had been frozen after a spam complaint, and advising him to click on a link to contest the suspension. He was taken to a fake login screen that his password manager didn't autopopulate, so he manually pasted the password in (Mailchimp doesn't have 2FA). It was only when the login session hung that he realized he'd been scammed – and by then, it was too late. Within minutes, his mailing list had been exported by the scammers.

In his postmortem of the scam, Hunt identifies the overlapping factors that made him vulnerable. He was jetlagged. The mailing list was important. Bogus spam complaints are common. Big corporate sites like Mailchimp often redirect their logins through different domains, which causes password manager autofill to fail. Hunt had experienced near-identical phishing attempts before and spotted them, but this one just happened to land at the very moment that he was vulnerable. Plus – as with my credit union scam – it seems likely that Mailchimp itself had been breached (or has an insider threat), which allowed the scammers to pad out the scam with plausible details that made it seem legit."

pluralistic.net/2025/04/05/tro

pluralistic.netPluralistic: How the world’s leading breach expert got phished (05 Apr 2025) – Pluralistic: Daily links from Cory Doctorow

This week, we encountered a new phishing campaign utilizing the Tycoon 2FA Phishing-as-a-Service (PhaaS) to bypass multifactor authentication (MFA).

The RDGA domains have Russian TLDs but are hosted on CloudFlare infrastructure. We have been seeing them use shared infrastructure for a few months now, definitely trying to make detection more challenging. They continue to obfuscate every piece of code but have updated their verification page. Previously, we always saw their custom Cloudflare Turnstile page, but now they also use a new captcha challenge, as shown below.(You can also check it here urlscan.io/result/0195ed8b-7a4 )

Their old Cloudflare Turnstile page seems to still be their favorite, even though they now change their message more frequently: "Checking response before request" or "Tracking security across platform" are some of the new messages they use.

Here is a sample of the hundreds of domains we are detecting:
womivor[.]ru
nthecatepi[.]ru
toimlqdo[.]ru
dantherevin[.]ru
xptdieemy[.]ru