mystique, to random

New report reveals a 121% surge in cybercriminals using legitimate websites to obfuscate malicious payloads

Quote: "71% of malicious payloads sent from compromised accounts were HTML smuggling attacks
51% increase in attacks sent from compromised accounts
Advanced phishing attacks commoditized by crime-as-a-service gangs"

https://www.globenewswire.com/en/news-release/2023/05/25/2675963/0/en/New-report-reveals-a-121-surge-in-cybercriminals-using-legitimate-websites-to-obfuscate-malicious-payloads.html

avoidthehack, to random

Interview With a #Crypto #Scam Investment Spammer

In light of the crypto spam campaigns that targeted various Mastodon communities.From @briankrebs

#cryptocurrency #opsec #phishing

https://krebsonsecurity.com/2023/05/interview-with-a-crypto-scam-investment-spammer/

InayaShujaat, to random
@InayaShujaat@paktodon.asia avatar

#Phishing scam alter.

This one’s hilarious because I haven’t even been ON an NZ toll road. 🤣🤣🤣

(Also note the number isn’t even an #NZ number! 😂)

#NZToots #NZTwits #WakaKotahi #Aotearoa

fifonetworks, to random

Cybersecurity professionals who promote fear are doing harm to overall cybersecurity awareness training efforts.

As an example, I received this inquiry from a person who was unnecessarily afraid to use a legitimate payment system. Read their question and my reply below:

"Hi Bob, I have a tech question for you. I just had my car serviced at the dealer. They offered a pickup and return service (of the car) which I used, so I did not physically have to go there. When they were done they texted me a copy of the bill and there was a link to make the payment. Since I wasn’t sure how safe that was I called and made the payment, but for future reference I thought I’d ask you if it is a safe/secure way to pay.
Thanks"

My reply:
"Yes! It's safe and secure to use a link in a text message, or QR code, given to you directly by a local business. That business is paying a transaction fee to use an online credit card payment services provider."

Instead of fostering fear, teach people how to distinguish between legitimate payment links and payment links from scammers.

Empower them.
Don't intimidate them.

#callmeifyouneedme #fifonetworks

#cybersecurity #fintech #scams #phishing #smishing #training

Ciantic, to random
@Ciantic@twit.social avatar

Finnish market chain and bank S-Pankki is informing about #phishing attempts. The funny thing is that they are sending their email from: noreply.s-pankki@email.s-pankki.fi

What garbage is that? That is one confusing email address to use to inform about phishing attempts. Can't they come up simpler that is easier to verify by looking at?

anthonyhove, to random

Worst #phishing email I've ever received.
The content doesn't make sense and does not even entice to open attachment

Edent, to random
@Edent@mastodon.social avatar

🆕 blog! “Responsible Disclosure: arXiv - redirect on login”

Suppose you are sent a link to a website - e.g. https://example.com/page/1234 But, before you can access it, you need to log in. So the website redirects you to: https://example.com/login?on_success=/page/1234 If you get the password right, you go to the original page you requested…

👀 Read more: https://shkspr.mobi/blog/2023/05/responsible-disclosure-arxiv-redirect-on-login/

#CyberSecurity #phishing #ResponsibleDisclosure

andrew, to internet
@andrew@esq.social avatar

Lately I've been getting #phishing emails where the obscured URL (i.e. made to look like its from my bank, but its actually directed elsewhere) is a t.co short link.

I'm guessing in the skeleton crew left over at #Twitter there probably isn't a huge team dedicated to monitoring the URL shortener for malicious links.

macst3r, to random German
@macst3r@mastodon.social avatar
5am, to random
@5am@fosstodon.org avatar

I'd be interested in knowing people's experience with #TrendMicro's Phish Insight. It seems like a really valuable free service to have at your disposal for gaining insights and helping improve your team's #cybersecurity awareness. https://phishinsight.trendmicro.com/
#phishing #simulationtraining #training

tzkuat, to random French
5am, to random
@5am@fosstodon.org avatar

I made good progress on tonight. I'm hungry for more after getting three more badges, but my brain needs rest! 🐟🔍🛡️

0x58, to infosec

📨 Latest issue of my curated #cybersecurity and #infosec list of resources for week #19/2023 is out! It includes, but not only:

‣ New Phishing-as-a-Service Platform Lets Cybercriminals Generate Convincing #Phishing Pages
#Netgear Routers' Flaws Expose Users to #Malware, Remote Attacks, and Surveillance
‣ 🇮🇹 🏎️ #WordPress Plugin Vulnerability Exposed #Ferrari Website to Hackers
‣ 🇯🇵 🚗 #Toyota Japan exposed data on millions of vehicles for a decade
‣ 📨 #Microsoft patches bypass for recently fixed Outlook zero-click bug
‣ 🇺🇸 🇺🇦 IRS gives #Ukraine tools to expose Russian oligarchs hiding riches in #crypto exchanges
‣ 🇨🇭 Multinational tech firm #ABB hit by Black Basta #ransomware attack
‣ 🐥 #Twitter Finally Rolling Out Encrypted Direct Messages — Starting with Verified Users
‣ 🇺🇸 Cybersecurity firm #Dragos discloses cybersecurity incident, extortion attempt
‣ 🇰🇵 North Korean hackers breached major hospital in Seoul to steal data
‣ 🇺🇸 #Google Now Lets US Users Search #DarkWeb for Their Gmail ID
‣ 🇺🇸 #IBM Delivers Roadmap for Transition to Quantum-safe #Cryptography
‣ 🇪🇸 Spanish police dismantle phishing operation linked to crime ring
‣ 🇺🇸 Microsoft #PatchTuesday: 40 Vulnerabilities, 2 Zero-Days
‣ 🇺🇸 🇷🇺 Justice Department Announces Court-Authorized Disruption of the Snake Malware Network Controlled by #Russia's Federal Security Service
‣ 🇺🇸 Feds seize 13 more DDoS-for-hire platforms in ongoing international crackdown
#MSI Data Breach: Private Code Signing Keys Leaked on the Dark Web
‣ 🇮🇷 Microsoft: Iranian hacking groups join #Papercut attack spree

📚 This week's recommended reading is: "The Pentester BluePrint: Starting a Career as an Ethical Hacker" by @phillipwylie and @crowgirl

#security #data #databreach #surveillance #hospital

Subscribe to the #newsletter to have it piping hot in your inbox every Sunday ⬇️

https://0x58.substack.com/p/infosec-mashup-week-192023

epixoip, to random

Happy !

I've cracked billions of from tens of thousands of in the past 12+ years, and because of this, I likely know at least one for 90% of people on the Internet. And I'm not alone! While I primarily crack breached passwords for research purposes and the thrill of the sport, others are selling your breached passwords to criminals who leverage them in and attacks.

How can you keep your accounts safe?

  • Use a ! I recommend @bitwarden and @1password

  • Use a style - four or more words selected at random - for passwords you have to commit to memory, like your master password!

  • Enable MFA for important online accounts, including cloud-based password managers!

  • Harden your master password by tweaking your password manager's KDF settings! For , use Argon2id with 64MB memory, 3 iterations, 4 parallelism. For and other PBKDF2 based password managers, set the iteration count to at least 600,000.

  • Use unique, randomly generated passwords for all your accounts! Use your password manager to generate random 14-16 character passwords for everything. Modern password cracking is heavily optimized for human-generated passwords, because humans are highly predictable. Randomness defeats this and forces attackers to resort to incremental brute force! There's no trick you can do to make a secure, uncrackable password on your own - your meat glob will only betray you.

  • Use an ad blocker like Origin to keep you safe from password-stealing and other browser based threats!

  • Don't fall for attacks and other social engineering attacks! Browser-based password managers help defend against phishing attacks because they'll never autofill your passwords on fake login pages. Think before you click, and never give your passwords to anyone, not even if they offer you chocolate or weed.

  • : require ad blockers, invest in an enterprise password management solution, audit password manager logs to ensure employes aren't sharing passwords outside the org, implement a Fine Grained Password Policy that requires a minimum of 20 characters to encourage the use of long passphrases, implement a password filter to block commonly used password patterns and compromised passwords, disable authentication and disable RC4 for , disable legacy broadcast protocols like LLMNR and NBT-NS, require mandatory signing, use Group Managed Service Accounts instead of shared passwords, monitor public data breaches for employee credentials, and crack your own passwords to audit the effectiveness of your password policy and user training!

circatee, to random

Does anyone here use iCloud email? Worth it?
Spam growth on Outlook Dot Com, is a serious pain. Hence, my question, time to move I think...

#iCloud #Email #Spam #Phishing #Junk

mjgardner, to infosec
@mjgardner@social.sdf.org avatar
Rairii, to random

from what i've seen about the new wave of DM spam:

another cryptocurrency based advance fee fraud, the threat actor appears to be chinese this time (terms are used on the site that are typically used on chinese sites, like "VIP" levels for paid membership)

this time you're given creds to an account with lots of assets; you can't "withdraw" without a password you don't have, you can "transfer out" but only to another paid account

i reported it to google safe browsing and to MS equivalent

#phishing #ThreatIntel

mjgardner, to infosec
@mjgardner@social.sdf.org avatar

Over the past year, I’ve received dozens of spear #phishing/#smishing SMS text messages pretending to be from my employer’s CEO or another executive. Today I got my first one marked as an #iMessage (#Apple’s exclusive messaging service—the “blue bubbles” in your #iPhone Messages app).

This is pretty troubling—it means #scammers are getting past Apple’s defenses in addition to abusing the porous patchwork of SMS providers and networks.

#infosec #security #cybersecurity #scam #spam

AAKL, to random
AAKL, to random
taylorparizo, to random

Evilginx 3.0 is finally here!!!
One feature I'm excited for is embedding phishing pages within iFrames. For those familiar with the BITB technique from MrD0x a while back, the same feature is now in Evilginx.

https://breakdev.org/evilginx-3-0-evilginx-mastery/
#Phishing

Sentry23, to random

Nasty #phishing trick:

using a (now seemingly fixed) redirect hole in the Citi bank website to send victims to malicious #office365 login page.

phish url= https://l[.]info16[.]citi[.]com/rts/go2.aspx?h=4009490&tp=i-1NGB-Q4L-lWT-C1jVeU-1r-3KyZzS-1c-C1fuSq-l8roiBjasA-NupOi&x=filedn[.]com/l0KWBcNXzlKQBIHN1fMjRk4/fmfJfxJdq.html

final redirect:
https://njsnr9mpv56441484f69432[.]newfiles[.]ru/087da7a55f8f3f967e773cdd999165176454a814cc560LOG087da7a55f8f3f967e773cdd999165176454a814cc563

good copy of office 365 signin page, hosted at newfiles.ru

ct_Magazin, to random German

heise+ | Ausprobiert: Phishing trotz Zwei-Faktor-Authentifizierung

Phishing bleibt für Hacker die erste Wahl, um fremde Zugangsdaten abzugreifen und den zweiten Faktor zu umgehen. Wir beschreiben, wie so ein Angriff abläuft.

https://www.heise.de/ratgeber/Ausprobiert-Phishing-trotz-Zwei-Faktor-Authentifizierung-8981919.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege

fosserytech, to opensource

is a great tool to limit network activity of programs and websites. It can even block and domains completely. And it also protects against and attacks.

vlrny, to random
@vlrny@disabled.social avatar

Question:

Anybody else get this kind of creepy chat up out of the blue with no other interaction? Bot? Or just socially inappropriate?

Mostly just need to decide between ignore, block, or report.

vlrny,
@vlrny@disabled.social avatar

Pfft! I just remembered when I was on #wattpad I got these so often I engaged in full conversations out of curiosity and amusement.

Say hello to Jerry in Raptures, for example...

#spam #scam #phishing #mastodon

https://www.wattpad.com/1007782435-bot-or-human-with-weird-day-job-jerry-in-raptures

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • everett
  • magazineikmin
  • mdbf
  • thenastyranch
  • khanakhh
  • rosin
  • Youngstown
  • ethstaker
  • slotface
  • modclub
  • kavyap
  • DreamBathrooms
  • Durango
  • provamag3
  • ngwrru68w68
  • InstantRegret
  • tacticalgear
  • GTA5RPClips
  • cubers
  • normalnudes
  • osvaldo12
  • tester
  • anitta
  • cisconetworking
  • megavids
  • Leos
  • lostlight
  • All magazines