Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Phishing
Global Security

Phishing

AdminBy AdminApril 14, 2025No Comments4 Mins Read
Phishing Campaigns Use Real-Time Checks
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


April 14, 2025Red LakshmananSecurity by email / cyber -ataka

Phishing companies use checks in real time

Cybersecurity researchers pay attention to the new type of phishing accounting accounting, which guarantees that the stolen information is related to the valid accounts on the Internet.

The technique has been named Precision-Validating Phiscing from Cofense, which says it uses real-time email checks, so only the selected high-value set is provided with a fake screen screen.

“This tactic not only gives the subject a threat to a higher level of success in obtaining useful powers, as they are only engaged in a certain pre -recruited list of valid email accounts,” company company company – Note.

Unlike the “spray and gaps” of accounts, which usually provide for a volumetric distribution of spam letters to get information about the entrance of the victims, the latest attack attacks raises spears to a new level, interacting only with e-mail addresses that the attackers conducted both active, legitimate and high values.

Cybersecurity

In this scenario, the e -mail address entered by the victim on the target phishing page was confirmed in the attacker’s database, after which the Bogus page is displayed. If the email address does not exist in the database, the page either returns the error or the user is redirected to the wort -page, such as Wikipedia to avoid security analysis.

The checks are carried out by integrating the API-or-JavaScript check-up service in a phishing set that confirms the email address before moving to a password seizure step.

“This increases the efficiency of the attack and the likelihood that the abducted powers belong to the real, actively used accounts, enhancing the quality of the collected data for resale or further operation,” the cofens said.

“Automated safety and sandbox scanners also fight for analysis of these attacks as they cannot bypass the check filter. This purposeful approach reduces the risk of the attacker and expands the life of phishing companies.”

The development comes when the cybersecurity company also revealed the details of the phishing company by email that uses reminders of file deletion as bait to capture powers and provide malicious software.

A double -sided attack uses a built -in URL, which seems to indicate a PDF file, which is planned to be deleted from a legal file storage service called files.fm. If the recipient of the message clicks on the link, they will be accepted to legal files.FM link from where they can download the intended PDF file.

However, when PDF opensThe users are presented with two options either for preview or to download the file. Users who choose the first one are transferred to a fake screen to enter Microsoft designed to steal their powers. When the download option is selected, it lowers the executable file that claims that is Microsoft OneDrive, but in fact, is the SCREENCONNECT DEBTING SOFTS from ConnectWise.

Cybersecurity

This “almost as if the actor threatened intentionally an attack – Note. “Both options lead to the same result, for similar purposes, but various approaches to their achievement.”

The data obtained also follow from the detection of a complex multi -stage attack, which combines the visation, remote access tool and the methods of arrivals to gain initial access and to establish persistence. Crack Ship observed in the activity matches cluster tracking Storm-1811 (AKA STAC5777).

“Acting threats operates open communication channels by delivering useful PowerShell load via Microsoft Teams Message followed Ambulance To deletedly access the environment ‘Ontinue – Note. “This has led to the deployment of the signed binary files (for example, TeamViewer.exe), the selection of malicious dll (TV.dll), and ultimately the back rear of C2 based on Javascript, made through node.js.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.