NEW CARDING CHAT IN TELEGRAM

phishing

  1. Teacher

    Reverse SE or whatever the fuck it is on the example of "Phishing as a service" (PhaaS)

    Hello! Everyone knows what phishing is. He has been with us for over 20 years. But now, it seems that phishing has become more accessible than before. This article explains how scammers can benefit from increasing the popularity of phishing service sales in the form of a service. In this...
  2. Teacher

    Carding. We put phishing on hosting.

    Hello! Any carder should have a number of essential items. This is a credit card, good hosting and, of course, a domain. All this will provide the cardboard lover with a cherished second-level name. This article will help you figure it out. This article will also be useful for ordinary people...
  3. Teacher

    Appropriated more than half a million hryvnias: cyber police exposed phishing scammers

    Five attackers obtained bank card data from citizens using phishing links that copied the interface of popular Internet services. 44 people were identified as victims of the actions of intruders. The defendants face up to twelve years behind bars. The fraudsters were exposed by the cyber police...
  4. Teacher

    TA577 changes tactics: Phishing emails to steal NTLM hashes

    The world will have to find out what the new attack technique will lead to. The information security company Proofpoint discovered that the TA577 group has changed the tactics of its attacks. Hackers are now using phishing emails to steal NT LAN Manager (NTLM) authentication hashes, enabling...
  5. Teacher

    CryptoChameleon: a Phishing kit that can Destroy the cryptocurrency industry

    Now you need to be vigilant, even if you go to the sites of federal services. Lookout reports that the new CryptoChameleon phishing kit has become a tool for attacks on employees of the Federal Communications Commission( FCC), during which the fake Okta authentication system is used. The...
  6. Teacher

    The swindler who stole using phishing money allegedly for restoration of the temple is detained

    Employees of the Criminal investigation Department of the Ministry of Internal Affairs of Russia in the Nizhny Novgorod region detained a suspect in fraud under the pretext of collecting money for the restoration of the Orthodox Church of the Assumption of the Blessed Virgin Mary in the village...
  7. Brother

    Quishing - phishing with QR codes

    Check Point experts have identified a new variant of quishing (phishing with QR codes). A link embedded in the QR code leads to a resource that captures the user's digital fingerprint.Based on the results of verification, it works out a particular redirect. According to analysts, in August –...
  8. Brother

    Phishing for dummies: how much does an entrance ticket to the world of cybercrime cost?

    Everyone can now run their own malicious campaign. Cybersecurity experts draw attention to the" democratization " of the phishing ecosystem due to the transformation of Telegram into the epicenter of cybercrime, which allows attackers to organize mass attacks for relatively little money...
  9. Brother

    Adaptive phishing turns off victims guard

    A new threat is gaining momentum in the world of cybersecurity: adaptive phishing campaigns. This method is an evolution of traditional phishing: attackers use a personalized approach to overcome defenses, using information about victims collected from social networks, public sites and past data...
  10. Brother

    New Year's surge of phishing: scammers use clever tricks to fish out the data of company employees

    "You have a bonus! Open the file for more details." Cofense, a company specializing in electronic security, reports an increase in cases of cyber attacks aimed at stealing the credentials of employees of companies. Attackers use New Year's Eve messages about changes in pension accounts, salary...
  11. Brother

    European organizations lose data in new UAC-0050 phishing campaign

    Hackers have been quietly infiltrating vulnerable systems for several months now. The hacker group, known as UAC-0050, actively uses phishing attacks to distribute malicious software Remcos RAT. This software is designed for remote surveillance and management, and plays a key role in the...
  12. Brother

    Email hacking, new domains, and phishing: how to force a company to transfer $7.5 million to its accounts

    Hacker arrested for stealing funds from charitable organizations. A Nigerian citizen has been arrested in Ghana for fraud involving the Business Email Compromise (BEC) attack, which resulted in the loss of more than $7.5 million to a charity in the United States. Olusegun Samson Adejorin was...
  13. Brother

    BMW fell into the phishing trap due to dangerous redirects

    A vulnerability in BMW's systems allows phishing campaigns to be conducted against the company's customers. Cybernews specialists identified two subdomains of BMW that were affected by a vulnerability that allowed attackers to redirect users to malicious sites. The vulnerability, called SAP...
  14. Brother

    New Instagram phishing: scammers under the cover of Meta hunt for backup 2FA codes

    Two-factor authentication doesn't help if the user doesn't recognize the threat themselves. Researchers from Trustwave have identified another phishing campaign aimed at Instagram users*. This time, scammers are trying to get backup two-factor authentication codes to hack accounts. It all...
  15. Brother

    Kinsta warns: Phishing through Google Ads will take your website away in two clicks

    How not to fall for the bait of cybercriminals using popular advertising platforms. Representatives of Kinsta, a hosting provider for WordPress sites, recently discovered that phishing sites are actively distributed through Google Ads, which aims to steal the credentials of MyKinsta, a key...
  16. Brother

    Phishing under the guise of legitimacy: how BazaCall takes over its victims devices via Google Forms

    "Did you sign up for a Netflix subscription? The first write-off is already tomorrow. The scammers behind the BazaCall phishing attacks have started using Google Forms to give their actions the illusion of legitimacy. According to Abnormal Security, this step on the part of hackers is aimed at...
  17. Brother

    Phishing on the edge: Fake Adobe Flash Player update serves as a distribution channel for MrAnon Stealer

    Hackers are adept at exploiting the ignorance of German users by infecting their devices with malware. Security researchers at Fortinet have discovered a new phishing campaign targeting users from Germany that is massively distributing the MrAnon Stealer malware. Kara Lin, a researcher at...
  18. Lord777

    Remcos RAT attacks Ukraine: Hackers disguise phishing emails as SBU requests

    Another wave of cyber attacks affects the country's state institutions. A new cyberattack on Ukrainian government agencies was carried out using Remcos, a remote access tool that is painfully familiar in research circles. Remcos, developed by the German company Breaking Security, is a powerful...
  19. Lord777

    Members of an organized criminal group engaged in phishing will be tried in Ukraine

    The cyber police of Kharkiv region exposed intruders who sent phishing links on online trading platforms and embezzled money from citizens accounts. The indictment against five members of the group was sent to the court. The defendants face up to twelve years in prison. The participants of the...
  20. Lord777

    Scammers, to deceive a rich heir in Yakutia, created a phishing site

    Scammers, to deceive a rich heir in Yakutia, created a phishing site — on November 2, the Yakutsk police accepted a statement from a 39-year-old man about stealing 13,391,000 rubles from him. It should be noted that the applicant went to the police at the insistence of a close relative who was...
Top