Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Employees looking for wages in Google have cheated the salaries of hackers
Global Security

Employees looking for wages in Google have cheated the salaries of hackers

AdminBy AdminMay 27, 2025No Comments6 Mins Read
Payroll Portals on Google
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


Portals payments to Google

The haunting hunting has put up a new company that uses the search engine poisoning methods (SEO) to focus on mobile employees’ mobile devices and facilitate wage fraud.

Activities, for the first time revealed reliaquest in May 2025, focused on the unnamed customer in the production sector, is characterized by the use of counterfeit pages to enter the wage portal and redirect salaries to the actor’s threat control.

“The infrastructure of the attacker used violated home office routers and mobile networks to mask their traffic, shy away from detecting and sliding past traditional security measures,” cybersecurity company – Note in an analysis published last week.

“The opponent, aimed at mobile staff member devices with a fake site that presents itself for the organization’s login page. Armed with stolen powers, the enemy gained access to the organization’s wages portal, changed information about a direct deposit and redirected the salaries of employees to his own accounts.”

While the attacks were not attributed to a specific hacking group, Reliaquest said it was part of a broader, current campaign from the two similar incidents he investigated at the end of 2024.

It all starts when the employee is looking for a wage portal of his company on search engines such as Google, with deceptive sites that reach the top results using sponsorship links. Those who end up pressing fictitious links lead to the WordPress site, which redirects to a phishing page that mimics the Microsoft input portal when visiting a mobile device.

Account data entered on the fake target page Jog.

Cybersecurity

This gives the attackers the opportunity to re -use the powers before they are altered and gained unauthorized access to the salary system.

In addition, the targeting of the employee’s mobile devices is twice because they lack the measures of businesses that are usually available on desktop computers, and they are connected outside the corporate network, effectively reducing visibility and interfere with the efforts of the investigation.

“Aiming at unprotected mobile devices that do not have safety and registration solutions, this tactic not only eliminates the detection, but also violates the efforts to analyze the phishing site,” Reliaquest said. “This prevents the safety teams from scanning the site and add it to the compromise (IOC) indicators, which further complicate the efforts to mitigate the consequences.”

In the further attempt to detect the decrease, harmful entry attempts that occur from residential IPs related to home office routers, including brands like ASUS and PEDGE, were revealed.

This indicates that the threats are used by weaknesses such as security deficiencies, default powers or other incorrect settings that often drive such network devices to launch gross attacks. Then compromised routers are infected with malware proxy -buttawhich ultimately rented on cybercriminals.

“When the attackers use proxy networks, especially those associated with residential or mobile IP, they become much harder for organizations to discover and investigate,” Reliaquest said. “Unlike VPN, which are often indicated because their IP -residues were previously abused, residential or mobile IP -ses allow the attackers to fly under the radars and avoid classification as malicious ones.”

“Moreover, the proxy networks allow the attackers to make them traffic like that it originates from the same geographical location as the target organization, bypassing the security measures designed to enter the system from unusual or suspicious places.”

Disclosure is going on as hunt.io minute A phishing company that uses a fake web page Shared File Service to steal the Microsoft Outlook login credentials to allow the files to access the files. Pages according to the company designed by W3ll Phishing Kit.

It also coincides with the opening of the new CoDename Cogui phishing kit, which is used for active targeting on Japanese organizations, presenting itself by famous consumer and financing brands such as Amazon, PayPay, Myjcb, Apple, Orico and Rakuten. Already 580 million letters were sent from January to April 2025 as part of the company using the kit.

“Cogui is a complex set that uses advanced evading methods, including Geofencing, Feathers Feathers and Fingerprinting to avoid detecting automated viewing systems and sandboxes – Note In an analysis released this month. “The purpose of the companies is to steal users’ names, passwords and payment data.”

Phishing sheets observed in the attacks include links that lead to phishing accounting sites. In view of this, it is noteworthy that COGUI does not include the possibilities of collecting multifactorial codes (Foreign Ministry).

It is said that Cogui has been used at least from October 2024, and is believed Darkula – assuming the first one can become part of the same Chinese Sycas Sycas Sycas System Named Smishing Triad, which also includes experienced and lighthouse.

Considering this, one of the important aspects that separates the Darkul from Cogui is that the first is more focused on mobile and hammer, and seeks to steal credit card data.

“Darcula is becoming more affordable, both in terms of cost and in the presence, so in the future it can imagine a significant threat,” said the Hacker News in the statement. “On the other hand, Lucid continues to remain under the radar. It is still difficult to determine the phishing kits, just looking at SMS or URL posts because they often use total shipping services.”

Cybersecurity

Another new customizing set that appeared from the Chinese cybercrime landscape is Panda Shop, which uses telegrams and interactive bots to automate services. Phishing pages are designed to imitate popular brands and public services for theft of personal information. Discooked credit card data are sent to underground shops and sold to other cybercriminals.

“In particular, Chinese cybercrime syndicates involved in the breakdown – Note. “They emphasized that in their communication they do not care about law enforcement.

Transfiguration, which determined the Panda store in March 2025, said the actor threatens the crime model-like service, similar to breakdown of the triad, offering customers the ability to distribute messages using Apple Imessage and Android RCS using Apple and Gmail accounts.

It is believed that Panda Shop includes breakdown of triad based on similarity in phishing kits. There are also many threatening subjects that use the Smishing kit for Google Wallet and Apple Pay Makod.

“The actors standing behind the beaten companies are closely linked to those who participate in the fraudulent fraud and the money laundering activities,” said the safety resort. “Signination is one of the main catalysts behind the cards, providing cybercrime drugs of significant volumes of violated data collected from the victims.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025

New data Wiper Pathwiper Data Wiper violates Ukrainian critical infrastructure in 2025 attack

June 6, 2025

Popular Chrome Extensions API leaks, user data via HTTP and Hard Codes

June 5, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025

New data Wiper Pathwiper Data Wiper violates Ukrainian critical infrastructure in 2025 attack

June 6, 2025

Popular Chrome Extensions API leaks, user data via HTTP and Hard Codes

June 5, 2025

Researchers in detail in detail decisively developing tactics as it expands its geographical volume

June 5, 2025

Iran related

June 5, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.