It seems to pull the phishing -fades on a scale.
The latest phishing fierce fierce “is a significant shift in criminal possibilities, reducing the barrier for entering bad actors to focus on any brand with complex, customizable phishing companies,” Netcraft – Note In a new analysis.
Cybersecurity company said it had discovered and blocked more than 95,000 new Darcula phishing domains, nearly 31,000 IPs and reduced more than 20,000 frauds because it was because it was For the first time exposed At the end of March 2024.
The biggest change included in Darcula is the possibility of any user to generate a phishing set for any brand on demand.
“The new and reconstructed version is now ready for testing,” the main developers of the service said on January 19, 2025, in a telegram that has more than 1,200 subscribers.
“Now you can also customize the front. Using Darcula-Suite, you can complete the front-end production in 10 minutes.”
To do this, everything you need to do is provide the brand URL that will be careful in the web interface, and the platform uses the browser automation tool as a puppet, for HTML export and all the necessary assets.
Users can then select the HTML element to replace and introduce phishing content (such as payment and logging fields) so that it corresponds to the species and sense of the brand target. Then the created phishing page is loaded on the administrator panel.
“Like any software product as services, the Phas Darcula-Suite Platform provides administrative dashboards that make it easy for scammers to manage their different companies,” said Harry Fribor’s security researcher.
“After creating these kits are loaded to another platform where criminals can manage their active companies, find the extracted data and control their expanded phishing campaigns.”
In addition to the dashboards that emphasize the aggregate performance statistics of phishing companies, Darcula V3 goes further, offering a way to convert stolen credit card information into a virtual pattern of the victim that may be scanned and added to a digital wallet for illegal purposes. In particular, cards are loaded on vodka phones and sold to other criminals.
It is said that the tool is at the internal test stage. In the next message of February 10, 2025, the author of malware posted the message: “I was busy these days, so the V3 update will be postponed for several days.”