Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Malicious Pypi Packages Operating Instagram and Tiktok API to verify users’ accounts

May 20, 2025

Official RVTools Website Hacked to deliver malicious Bumblebe software

May 19, 2025

Band

May 19, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » 5000 Phishchi
Global Security

5000 Phishchi

AdminBy AdminFebruary 28, 2025No Comments4 Mins Read
Phishing PDFs
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


Phishing pdfs

Cybersecurity researchers have discovered a wide phishing campaign that uses fake CAPTCHA images that are divided through PDF -documents located on the Webflow content delivery (CDN) to deliver malicious Lumma software.

Netskope laboratory threatened that it had revealed 260 unique domains that conduct 5000 PDF phishing files that redirect victims to malicious sites.

“The attacker uses SEO to trick the victims to visit pages by clicking on the results of the malicious search engine,” security researcher Jan Michael Alcantar – Note In a report that shared with Hacker News.

“While most phishing pages focus on the theft of credit card information, some PDF files contain fake capes that deceive the victims in the malicious PowerShell commands, eventually leading to lumma malicious software.”

The phishing campaign estimates affected more than 1,150 organizations and more than 7,000 users from the second half of 2024, and the attacks primarily allocate victims in North America, Asia and Southern Europe on technology, financial services and production sectors.

Cybersecurity

With 260 domains found for the placement of fake PDF, most of them have related to WebflowIt follows those related to Godaddy, amazing, Wix and fast.

The attackers also observed the download of some PDF files to the legal online libraries and PDF repositors such as PDFCOFFEE, PDF4PRO, PDFBEAN and Internet -Archives, so users looking for PDF documents in search engines aimed at them.

PDFs contain fraudulent CAPTCHA images that act as a pipeline for theft of credit card information. In addition, those who distribute the theft of Lumma contain images to download the document that, when pressed, accepts the victim on the malicious site.

For its part, the site masks as a fake CAPTCHA checking page that uses Technique Clickfix To trick the victim to execute the MSHTA team, which performs malware for theft using the PowerShell script.

In recent weeks, Lumma Stealer has been mask As the Roblox Games and the hacked version of Total Commander Tool for Windows, emphasizing many delivery mechanisms taken by various threat subjects. Users are redirected to these websites via YouTube videos are probably loaded with previously disturbed accounts.

“Malicious links and infected files are often masked in (video, comments or descriptions on YouTube,” silent Push – Note. “Care and skeptical of unverified sources when interacting with YouTube content, especially when offered to download or click on links, can help protect against these growing threats.”

Cybersecurity company also found that Lumma Ctyler magazines are divided free of charge into a relatively new hacking forum called Stealy () PRO, which were put into operation at the end of December 2024.

Lumma theft A perfectly well -thought -out solution for criminal security This is offered for sale within the malicious software model (MAAS), which gives an opportunity to gather a wide range of information from compromised Windows hosts. In the beginning of 2024, malware operators announced integration with proxy with Golang-based GHostsocks.

“Adding a Backconnect Socks5 feature to existing – Note.

“Using the Internet communication of the victims, attackers can bypass geographical restrictions and verification based on IP, especially those performed by financial institutions and other highly valuable goals. This ability greatly increases the likelihood of success for unauthorized access attempts using the Infosteeral credentials. Lumma.

Cybersecurity

Disclosure of information come as malicious software for theft Visor and atomic theft MacOS (Amos) distributed using the clickfix method through bait for artificial intelligence (AI) Deepseek (AI), according to Zscaler Exharmlabz and free.

Physhing attacks were also noticed by abuse of the JavaScript Watch Method, which uses invisible Unicode characters to present binary values ​​that was the technique that was First documented In October 2024.

The approach entails the use of the Unicode filler characters, in particular half the width (U+FFA0) and the full width of Hangul (U+3164) to present binary values ​​0 and 1 respectively and transforming each ascii character into the HavaScript’s main load into its equivalents Hangul.

“The attacks were very individual – Note.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Malicious Pypi Packages Operating Instagram and Tiktok API to verify users’ accounts

May 20, 2025

Official RVTools Website Hacked to deliver malicious Bumblebe software

May 19, 2025

Band

May 19, 2025

Firefox Patches 2 Zero-Day

May 19, 2025

Why CTEM – This is a winning rate for CISO in 2025

May 19, 2025

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Malicious Pypi Packages Operating Instagram and Tiktok API to verify users’ accounts

May 20, 2025

Official RVTools Website Hacked to deliver malicious Bumblebe software

May 19, 2025

Band

May 19, 2025

Firefox Patches 2 Zero-Day

May 19, 2025

Why CTEM – This is a winning rate for CISO in 2025

May 19, 2025

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Malicious Pypi Packages Operating Instagram and Tiktok API to verify users’ accounts

May 20, 2025

Official RVTools Website Hacked to deliver malicious Bumblebe software

May 19, 2025

Band

May 19, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.