phishing

  1. Carding

    How can an innocent click cost a company millions? Zimbra Phishing Operation.

    Hackers steal the credentials of customers of the service wholesale and retail. A large-scale phishing campaign targeting customers of the popular Zimbra email service has spread to hundreds of organizations in more than a dozen countries around the world. Despite the primitiveness of the...
  2. Carding

    From online menus to phishing: why QR codes should not be trusted

    Cofense told how a harmless tool makes life easier not only for us, but also for scammers. Specialists from Cofense discovered a large-scale phishing campaign using malicious QR codes. The codes that attackers distribute via emails redirect victims to a fake site. Next, users are prompted to...
  3. Carding

    Clouds are gathering over Cloudflare R2: it turns out that storage is well suited for phishing

    Netskope found that scammers are using the service more and more often. Over the past 6 months, attackers have become ten times more likely to use Cloudflare R2 for phishing campaigns. At the same time, the total number of cloud services from which users can download malware has increased to...
  4. Carding

    Russian hackers use Microsoft Teams chats for phishing

    Microsoft claims that the hacker group APT29 (aka Midnight Blizzard, Nobelium and Cozy Bear) attacked dozens of organizations and government agencies around the world, using Microsoft Teams for phishing. "An ongoing investigation shows that fewer than 40 unique international organizations were...
  5. Carding

    Investor lost 20 million USDT due to phishing attack

    Tether froze the scammer's account, but did not have time to save the victim's funds. According to blockchain analytics firm PeckShield, on August 1, an attacker successfully phished with a null transaction and stole 20 million USDT (Tether's stablecoin) before his account was blocked by...
  6. N

    Realtime phishing Package

    does any professional get any recommend about the real time phising code package for ApplePay carding? @Carding thanks
  7. Carding

    New threat: Hackers register ".ZIP" domains for phishing attacks

    Fortinet specialists told you how to protect yourself from malicious traps. Security researchers at FortiGuard Labs have discovered that attackers have discovered a new way to deceive Internet users — they register domains with the ".ZIP " extension, which is usually used to save compressed...
  8. CarderPlanet

    Phishing without words: how not to become a victim of a new way of stealing accounts

    Attackers forge letters from various companies using images or QR codes to bypass the security system. Researchers from Inky have documented the spread of new fraudulent transactions, where attackers bypass email filters against spam and phishing by sending emails without text, but with images...
  9. Lord777

    Phishing is more personalized than previously thought

    Fostering a safety culture among employees is an important part of building an information security system in companies. But research has shown that phishing cyberattacks lead to compromise most often not at the expense of the entire team, but only part of it. On average, no more than 12 % of...
  10. Brother

    How do you make money from phishing, carding? Dangers of working with a drop.

    This is a type of fraud on the Internet, the purpose of which is to obtain personal data of users such as ID, password, login, access keys. The article Phishing, carding How to steal personal data What else can you think of tricky Phishing, carding Phishing (from the English phishing and...
  11. Tomcat

    British teen earns over £ 2m through phishing

    The teenager created a phishing site that imitates the Internet resource of the Love2Shop company. Lincolnshire County police confiscated 48 bitcoins and other crypto assets from the teenager, totaling more than £ 2 million, accusing him of fraud and money laundering through cryptocurrencies...
  12. Tomcat

    WhatsApp-related phishing URLs up 13,000%

    Vade Secure published a report on phishing threats in Q4 2019. Researchers identified the 25 most exploited brands by phishing, compiling this list by analyzing multiple phishing URLs. As a result, WhatsApp ended up in fifth place in the ranking compiled by the researchers with 5,020 unique...
  13. Teacher

    The Complete Guide to Phishing

    Why Another Phishing Guide? I was recently able to get my hands dirty with phishing and witness real phishing campaigns thanks to the incredibly talented people in my workplace. To satisfy my curiosity, I tried to run a small phishing campaign against myself and realized that there doesn't seem...
  14. B

    Advanced Social Engineering Course 1.2

    Course Requirements Settings up hacking lab What is social engineering Gathering Information Phishing Hack computer Hack android Kali Linux Redirect your victim Tools
  15. Mutt

    SHARK - the best phishing in the Thermux

    Hello everyone, the other day I came across a very interesting phishing called SHARK, it allows you not only to create pages, but also mask them so that no one can determine that this is phishing, and it also allows you to access the camera or microphone through the page. Shark is a tool that...
  16. Mutt

    Phishing with a fake meeting invitation

    Ever wondered how meeting invitations work in Microsoft Teams and Google Meet? Recently, I was working on a social engineering issue, and a random thought occurred to me: how do meeting invitations actually work, can they somehow be used in fraudulent schemes? Yes, such a thought has already...
  17. Lord777

    Phishing for beginners

    Vatos Locos, let's go over the basics of phishing, figure out what's what and with what they all eat it. I remember that once I looked at this topic with skepticism and complete misunderstanding. A bit of terminology Phishing is a type of Internet fraud, the purpose of which is to gain access...
  18. CreedX

    Phishing for Beginners: An Introduction to Phishing

    In the process of work, someone is legal, someone is not very, often there is a need to implement phishing attacks. What for? As practice shows, this is often the most disruptive and simplest option for gaining access to the target system. Why? Mostly competent people are engaged in the...
  19. dunkelh3it

    Phishing Full Tutorial

    How To Make A Phishing Page Of Any Websites | Full Tutorial Hi readers, From now onward we’ll learn serious hacking and today I’m going to discuss about a well known hacking method that’s called phishing.Most of internet users aware of that but I told you guys this site is for newbies and...
  20. BadB

    33 PHISHING SITES 2021-04-03

    This are the 33 phishing pages from the known github phishing tools (socialphish, shellphish, blackphish etc.)
Top