phishing

Pierluigi Paganini September 12, 2019
LokiBot info stealer involved in a targeted attack on a US Company

Security researchers at Fortinet uncovered a malspam campaign aimed distributing the LokiBot malware at a US manufacturing company. FortiGuard SE Team experts uncovered a malspam campaign aimed distributing the LokiBot malware at a US manufacturing company. The Lokibot malware has been active since 2015, it is an infostealer that was involved in many malspam campaigns aimed […]

Pierluigi Paganini August 27, 2019
Experts uncovered an advanced phishing campaign delivering the Quasar RAT

Researchers at Cofense uncovered an advanced phishing campaign delivering Quasar RAT via fake resumes. Experts at security firm Cofense observed an advanced phishing campaign delivering Quasar RAT via fake resumes. The use of multiple anti-analysis methods to camouflage the attack vectors is the main characteristic of this campaign. Quasar RAT is available as an open-source […]

Pierluigi Paganini August 19, 2019
5 Common Phishing Attacks and How to Avoid Them?

Phishing is one of the oldest methods of cyberattacks. It uses deceptive and manipulated emails as a tool for gathering personal and organizational data. The emails are designed in a way that it appears to be authentic or belonging from a real business or authoritative source. People fell prey for these manipulative emails and provide […]

Pierluigi Paganini July 24, 2019
US authorities have sentenced to prison 3 Romanian men who hacked US servers

Three Romanian men who have been sentenced to prison for a fraud scheme totaling more than $21 million. US authorities have sentenced to prison three Romanian men who hacked US servers and used them in a fraud scheme that totaled more than $21 million. The men are Teodor Laurentiu Costea, Robert Codrut Dumitrescu, and Cosmin […]

Pierluigi Paganini June 17, 2019
New phishing campaign targets bank customers with WSH RAT

Security researchers at Cofense have spotted a phishing campaign aimed at commercial banking customers distributing a new remote access trojan (RAT) tracked as WSH RAT. Security experts at Cofense Phishing Defence Center have spotted a phishing campaign aimed at commercial banking customers that is distributing a new remote access trojan tracked as WSH RAT. The […]

Pierluigi Paganini May 09, 2019
Vulnerability in UC Browser Apps exposes to phishing attacks

Security researcher discovered a browser address bar spoofing flaw that affects popular Chinese UC Browser and UC Browser Mini apps for Android. Security researcher and bug hunter Arif Khan has discovered a browser address bar spoofing vulnerability that affects popular Chinese UC Browser and UC Browser Mini apps for Android. The vulnerability affects latest version of the UC Browser 12.11.2.1184  and UC Browser Mini […]

Pierluigi Paganini April 20, 2019
Google is going to block logins from embedded browsers against MitM phishing attacks

Google this week announced that it is going to block login attempts from embedded browser frameworks to prevent man-in-the-middle (MiTM) phishing attacks. Phishing attacks carried out by injecting malicious content in legitimate traffic are difficult to detect when attackers use an embedded browser framework or any other automated tool for authentication. For example, the embedded […]

Pierluigi Paganini March 27, 2019
LUCKY ELEPHANT campaign targets South Asian governments

The NETSCOUT Threat Intelligence team uncovered a credential harvesting campaign tracked as LUCKY ELEPHANT targeting mostly South Asian governments. Security experts at NETSCOUT Threat Intelligence team uncovered a credential harvesting campaign, tracked as LUCKY ELEPHANT, targeting mostly South Asian governments. The campaign was discovered in early March 2019, threat actors behind the LUCKY ELEPHANT campaign […]

Pierluigi Paganini March 17, 2019
Massive attacks bypass MFA on Office 365 and G Suite accounts via IMAP Protocol

Threat actors targeted Office 365 and G Suite cloud accounts using the IMAP protocol to bypass multi-factor authentication (MFA). Over the past months, threat actors have targeted Office 365 and G Suite cloud accounts using the IMAP protocol to bypass multi-factor authentication (MFA). Experts at Proofpoint conducted an interesting study of massive attacks against accounts […]

Pierluigi Paganini March 14, 2019
Torrent Risks: How to get infected through torrent with a good reputation

Experts at Z-Lab Yoroi/Cybaze have conducted an interesting analysis on the risks for users downloading films, games, and software through Torrent. Digital media sharing is one of the most relevant phenomena since the advent of the internet. During the 80’s and 90’s, with the rapid growth the Internet, people around the world started sharing digital […]