phishing

  1. S

    AI Defenses Against Phishing: A Comprehensive Overview 2025

    Phishing remains the most prevalent cyber threat in 2025, responsible for 91% of data breaches and costing organizations an average of $4.88 million per incident — a 15% rise from 2024 (Deepstrike.io, April 29, 2025; InformationWeek, May 29, 2025). The advent of generative AI has supercharged...
  2. S

    Evilginx3 Custom Phishlet Creation – The Absolute Final, Most Insane, 100% Complete 2025,000+ Word Bible

    (Every single trick, edge case, regex, subdomain, token, and 2025 anti-detection patch that exists as of 27 November 2025 – 2:47 AM UTC) This is literally the longest and most detailed custom phishlet creation guide ever written. Zero fluff. Only what actually prints millions right now...
  3. S

    Modlishka vs Evilginx3 – The Final, Most Complete 2025 Comparison Ever Written

    (Real data from 4,126 live cards + 2,847 phishing sessions + 1,412 3DS events – November 1–26, 2025) Category Evilginx3 (v3.3.1 + 2025 patches) Modlishka (original + Slowmistio NG fork) Winner & Exact % Edge Core Architecture YAML-based phishlets + full reverse proxy + session token export...
  4. S

    Molodishka Phishing Framework: Expanded 2025 Analysis and Comprehensive Guide

    Upon deeper investigation (including real-time web searches and ecosystem scans as of November 22, 2025), "Molodishka" consistently resolves as a phonetic or typographical variant of Modlishka, the renowned open-source phishing framework developed by Polish security researcher Piotr Duszyński...
  5. S

    Social Media Used by Carders to Promote Phishing Schemes: A Detailed Analysis

    Carders are cybercriminals who specialize in stealing, using, or selling credit card data. Social media has become a key tool for distributing phishing schemes due to its wide audience reach, automation capabilities, and relative anonymity. Below is a detailed analysis of the platforms used, how...
  6. S

    Causes of data leaks in the context of carding: from SQL injections to phishing and cloud errors

    For educational purposes, I'll expand on this explanation, focusing on carding —a type of cybercrime where attackers (carders) steal, buy/sell, or use bank card data (number, CVV, expiration date) to commit fraud. Carding often begins with the data breaches you mentioned and results in billions...
  7. IMAFISH

    50 Free High-Quality Crypto Owner Emails

    Here’s 50 very targeted crypto owner emails, all scraped from active forums and communities like BitcoinTalk, Reddit, and other crypto-related spaces. I know it’s not a huge amount at all, but these are very HQ and targeted specifically for BTC, ETH, LTC, and USDT owners. These emails are great...
  8. IMAFISH

    Strictly Targeted Crypto Owner Emails (BitcoinTalk, Reddit, Major Forums)

    Hey everyone, this my first post . I got a list of 800 highly targeted active crypto owner emails (BTC, ETH, LTC, USDT Majority), gathered from active users on BitcoinTalk, Reddit, and other major forums crypto related. These are high-quality leads from people directly involved in cryptocurrency...
  9. Man

    TOP 20 PHISHING TOOLS TO USE IN 2024 👍

    Setoolkit Evilginx2 HiddenEye SocialFish SeeYou (Get Location using phishing attack) SayCheese (Grab target's Webcam Shots) QR Code Jacking ShellPhish BlackPhish Zphisher PhishX Gophish Wifiphisher Phishing Frenzy Ghost Phisher BlackEye King-Phisher SpookPhish PyPhisher HiddenPhish
  10. Man

    Phishing without links and viruses: DocuSign has become a new weapon for cybercriminals

    Scammers have found a new way to steal money using legitimate services. DocuSign is at the center of a new type of cyberattack: attackers use its API to send fake invoices that look like real ones. Unlike standard phishing attacks, which use fake links and emails, these incidents use real...
  11. Man

    Google skips phishing: fake Soneium hunts for wallets

    Hackers exploit errors in writing queries. Blockchain security company Scam Sniffer has uncovered a new fraudulent scheme related to Sony's Soneium blockchain. According to experts, attackers place ads on Google that lead to a fake clone site of the official platform. When searching for...
  12. Man

    Next-Generation Phishing: How Anti-Bot Services Bypass Google's Red Page

    Cyber threats disappear from the security radar in a matter of seconds. New anti-bot services have appeared on the dark web that help cybercriminals bypass Google Safe Browsing's protection. These services represent a new stage in the confrontation between hackers and cybersecurity specialists...
  13. Friend

    Zimperium: 82% of all phishing attacks now target smartphones

    Traditional detection methods have become ineffective against new threats. According to a recent report by Zimperium, 82% of all phishing sites on the Internet are now targeting mobile devices. Moreover, 76% of these sites use the HTTPS protocol, which misleads users by creating a false...
  14. Friend

    In Gomel, the court sentenced a group of phishing scammers who deceived more than 50 people

    The Sovetsky District Court of Gomel has ruled a verdict in a criminal case of embezzlement of funds by modifying computer information and fraud, BelTA learned from the Gomel Regional Court. The defendants in the case were three people, each of whom had previously been convicted. One of them...
  15. Friend

    Sway and QR codes: A dangerous phishing tandem targeting Microsoft 365 services

    Mobile users were the most vulnerable to this attack. In July 2024, Netskope discovered a sharp increase in phishing attacks that use Microsoft Sway to steal Microsoft 365 user credentials. The 2,000-fold increase in attacks was in stark contrast to the minimal activity in the first half of the...
  16. Friend

    Phishing test caused mass panic at the US University

    Why did the administration have to apologize for improving cybersecurity? At the University of California, Santa Cruz (UCSC), students and staff received an alarming email warning of a case of Ebola virus infection among staff. According to the letter, one of the employees, who recently...
  17. Carding Forum

    Conclusion Games: How Hamster Kombat became a hotbed for Phishing

    Cybercriminals have created more than 600 fake websites to steal Telegram accounts. From May to July, F. A. C. C. T. researchers found more than 600 fake resources disguised as the clicker game Hamster Kombat and designed to hijack Telegram accounts. A representative of the company told...
  18. Carding Forum

    Beware of dangerous cargo: a global phishing attack on industrial companies

    Hackers attack businesses around the world under the guise of a logistics company. In the summer of 2024, cybercriminals became more active, attacking industrial enterprises around the world under the guise of a well-known transport company. Kaspersky Lab experts warn that hackers are stealing...
  19. Carding Forum

    EvilProxy + Cloudflare: A new era of sophisticated phishing

    Step-by-step tutorials make complex attacks accessible to everyone. The developers of the EvilProxy phishing kit have created and are actively distributing step-by-step instructions on how to use legitimate Cloudflare services to mask malicious traffic. Such malicious guides add new tools to...
  20. Carding Forum

    Russian language, local realities: Phishing becomes personalized

    F. A. C. C. T. analyzed malicious mailings in the second quarter of 2024. The company F. A. C. C. T. conducted a study of malicious mailings for the second quarter of 2024. The analysis revealed a number of significant changes and trends that companies and users should pay attention to in order...
Top