NEW CARDING CHAT IN TELEGRAM

phishing

  1. IMAFISH

    50 Free High-Quality Crypto Owner Emails

    Here’s 50 very targeted crypto owner emails, all scraped from active forums and communities like BitcoinTalk, Reddit, and other crypto-related spaces. I know it’s not a huge amount at all, but these are very HQ and targeted specifically for BTC, ETH, LTC, and USDT owners. These emails are great...
  2. IMAFISH

    Strictly Targeted Crypto Owner Emails (BitcoinTalk, Reddit, Major Forums)

    Hey everyone, this my first post . I got a list of 800 highly targeted active crypto owner emails (BTC, ETH, LTC, USDT Majority), gathered from active users on BitcoinTalk, Reddit, and other major forums crypto related. These are high-quality leads from people directly involved in cryptocurrency...
  3. Man

    TOP 20 PHISHING TOOLS TO USE IN 2024 👍

    Setoolkit Evilginx2 HiddenEye SocialFish SeeYou (Get Location using phishing attack) SayCheese (Grab target's Webcam Shots) QR Code Jacking ShellPhish BlackPhish Zphisher PhishX Gophish Wifiphisher Phishing Frenzy Ghost Phisher BlackEye King-Phisher SpookPhish PyPhisher HiddenPhish
  4. Man

    Phishing without links and viruses: DocuSign has become a new weapon for cybercriminals

    Scammers have found a new way to steal money using legitimate services. DocuSign is at the center of a new type of cyberattack: attackers use its API to send fake invoices that look like real ones. Unlike standard phishing attacks, which use fake links and emails, these incidents use real...
  5. Man

    Google skips phishing: fake Soneium hunts for wallets

    Hackers exploit errors in writing queries. Blockchain security company Scam Sniffer has uncovered a new fraudulent scheme related to Sony's Soneium blockchain. According to experts, attackers place ads on Google that lead to a fake clone site of the official platform. When searching for...
  6. Man

    Next-Generation Phishing: How Anti-Bot Services Bypass Google's Red Page

    Cyber threats disappear from the security radar in a matter of seconds. New anti-bot services have appeared on the dark web that help cybercriminals bypass Google Safe Browsing's protection. These services represent a new stage in the confrontation between hackers and cybersecurity specialists...
  7. Friend

    Zimperium: 82% of all phishing attacks now target smartphones

    Traditional detection methods have become ineffective against new threats. According to a recent report by Zimperium, 82% of all phishing sites on the Internet are now targeting mobile devices. Moreover, 76% of these sites use the HTTPS protocol, which misleads users by creating a false...
  8. Friend

    In Gomel, the court sentenced a group of phishing scammers who deceived more than 50 people

    The Sovetsky District Court of Gomel has ruled a verdict in a criminal case of embezzlement of funds by modifying computer information and fraud, BelTA learned from the Gomel Regional Court. The defendants in the case were three people, each of whom had previously been convicted. One of them...
  9. Friend

    Sway and QR codes: A dangerous phishing tandem targeting Microsoft 365 services

    Mobile users were the most vulnerable to this attack. In July 2024, Netskope discovered a sharp increase in phishing attacks that use Microsoft Sway to steal Microsoft 365 user credentials. The 2,000-fold increase in attacks was in stark contrast to the minimal activity in the first half of the...
  10. Friend

    Phishing test caused mass panic at the US University

    Why did the administration have to apologize for improving cybersecurity? At the University of California, Santa Cruz (UCSC), students and staff received an alarming email warning of a case of Ebola virus infection among staff. According to the letter, one of the employees, who recently...
  11. Carding Forum

    Conclusion Games: How Hamster Kombat became a hotbed for Phishing

    Cybercriminals have created more than 600 fake websites to steal Telegram accounts. From May to July, F. A. C. C. T. researchers found more than 600 fake resources disguised as the clicker game Hamster Kombat and designed to hijack Telegram accounts. A representative of the company told...
  12. Carding Forum

    Beware of dangerous cargo: a global phishing attack on industrial companies

    Hackers attack businesses around the world under the guise of a logistics company. In the summer of 2024, cybercriminals became more active, attacking industrial enterprises around the world under the guise of a well-known transport company. Kaspersky Lab experts warn that hackers are stealing...
  13. Carding Forum

    EvilProxy + Cloudflare: A new era of sophisticated phishing

    Step-by-step tutorials make complex attacks accessible to everyone. The developers of the EvilProxy phishing kit have created and are actively distributing step-by-step instructions on how to use legitimate Cloudflare services to mask malicious traffic. Such malicious guides add new tools to...
  14. Carding Forum

    Russian language, local realities: Phishing becomes personalized

    F. A. C. C. T. analyzed malicious mailings in the second quarter of 2024. The company F. A. C. C. T. conducted a study of malicious mailings for the second quarter of 2024. The analysis revealed a number of significant changes and trends that companies and users should pay attention to in order...
  15. Carding Forum

    Microsoft tops the list of brands for phishing attacks according to Check Point Research

    New names have been added to the list of victims of cyber attacks. Phishing attacks remain one of the most common cyber threats and are often the beginning of larger supply chain campaigns. Recently, Check Point Research (CPR), the threat analysis division of Check Point® Software Technologies...
  16. Carding Forum

    Phishing with approval: one signature can cost $2.7 billion

    Operation Spincaster reveals a scheme to combat asset theft with a couple of taps. Approval phishing scams are becoming increasingly common and dangerous methods of stealing funds in the cryptocurrency space. Criminals fraudulently (Pig Butchering or romance scam) force users to sign malicious...
  17. Carding Forum

    FishXProxy: A bloodthirsty phishing monster has broken free

    The darknet has spawned another monster for advanced cyber fraud. A new phishing tool called FishXProxy has appeared on the darknet, which greatly simplifies the task for cybercriminals. This set of tools was identified by researchers of the SlashNext Security platform. FishXProxy offers...
  18. Carding Forum

    Creating the perfect phishing scam by bypassing 2FA

    Part 1 Nowadays, we very often have to deal with phishing. Of course, more or less savvy people can easily recognize it. But only demand determines supply, and if they use it, it means it works. But the developers of security systems are also not asleep, you say, and you will be absolutely...
  19. Tomcat

    102 years for phishing: scam for $1.5 million ended for scammers with a prison cell

    Living on another continent did not save cyberbandsters from justice. The US Department of Justice has convicted a Nigerian citizen for participating in a business email compromise scam (BEC attack) that caused $1.5 million in damages. Ebuka Raphael Umethi, aged 35, along with two alleged...
  20. Tomcat

    The psychology of phishing: how carders use psychological techniques to deceive users and how to resist them

    Tamara Chechetkina, head of marketing for information security VK, told KP.RU how to avoid becoming a victim of carders. Any phishing attack is based on carding methods of psychological influence on a person. Whatever technical implementation the carders choose, they always strive to ensure...
Top