Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Critical vulnerability in Anthropic MCP exposes machines for remote feats

July 1, 2025

Ta829 and Unk_greensec share tactics and infrastructure in current malware

July 1, 2025

A new drawback in the IDES as a Visual Studio code allows for malicious bypassing bypassing the verified status

July 1, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Cybercriminals use Webflow to trick users into handing over sensitive login credentials
Global Security

Cybercriminals use Webflow to trick users into handing over sensitive login credentials

AdminBy AdminOctober 28, 2024No Comments4 Mins Read
Cybercriminals
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


Cybercriminals

Cybersecurity researchers are warning of a surge in phishing pages created using a website builder tool called Webflow, as threat actors continue to abuse legitimate services such as Cloudflare and Microsoft Sway for your benefit.

“Companies targeted sensitive information from various crypto wallets, including Coinbase, MetaMask, Phantom, Trezor, and Bitbuy, as well as login credentials for several of the company’s webmail platforms, as well as Microsoft 365 login credentials,” said Netskope Threat Labs researcher Ian Michael Alcantara. said in the analysis.

The cybersecurity company said it tracked a 10-fold increase in traffic to phishing pages created using Webflow between April and September 2024, with attacks targeting more than 120 organizations worldwide. Most are located in North America and Asia, spanning the financial services, banking and technology sectors.

Attackers have been seen using Webflow to create standalone phishing pages as well as redirect unsuspecting users to other phishing pages under their control.

“The former provides attackers with stealth and ease because there are no phishing lines of code to write and detect, while the latter gives the attacker the flexibility to perform more sophisticated actions as needed,” said Michael Alcantara.

Cyber ​​security

What makes Webflow much more attractive than Cloudflare R2 or Microsoft Sway is that it allows users to create their own subdomains at no additional cost, as opposed to automatically generated random alphanumeric subdomains that can be suspicious –

  • Cloudflare R2 – https://pub-<32_alphanumeric_string>.r2.dev/webpage.htm
  • Microsoft Sway – https://sway.cloud.microsoft/{16_alphanumeric_string}?ref={sharing_option}

In an attempt to increase the likelihood of attack success, phishing pages are designed to mimic the login pages of their legitimate counterparts in order to trick users into providing their credentials, which are then, in some cases, forwarded to another server.

Netskope said it has also identified Webflow crypto scam websites that use a screenshot of a legitimate wallet homepage as their own landing pages and redirect the visitor to the scammer’s real site after clicking anywhere on the fake site.

Cybercriminals

The ultimate goal of a crypto-phishing campaign is to steal the victim’s initial phrases, allowing attackers to seize control of cryptocurrency wallets and drain the funds.

In the attacks identified by the cybersecurity firm, users who ended up entering a recovery phrase displayed an error message stating that their account had been suspended due to “unauthorized activity and authentication failure.” The message also prompts the user to contact their support team by initiating an online chat at tawk.to.

Notably, chat services such as LiveChat, Tawk.to and Smartsupp have been misused in a cryptocurrency fraud campaign dubbed CryptoCore from Avast.

“Users should always access important pages, such as a banking portal or webmail, by entering the URL directly into the web browser instead of using search engines or clicking any other links,” said Michael Alcantara.

It comes at a time when cybercriminals are promoting new anti-bot services on the dark web that claim to bypass Google services. Safe Browsing Warnings in the Chrome web browser.

“Anti-bot services like Otus Anti-Bot, Remove Red, and Limitless Anti-Bot have become a cornerstone of sophisticated phishing operations,” SlashNext said in a recent report. “These services aim to prevent security scanners from identifying phishing pages and blocking them.”

“By filtering out cyber security bots and masking phishing pages from scanners, these tools extend the life of malicious sites, helping criminals evade detection for longer.”

Cyber ​​security

Unsolicited and advertising campaigns are also conducted revealed the spread of actively developing malicious programs called HOT COOKIES (aka BadSpace), which then acts as a conduit for malware such as CSharp-Streamer-RAT and Cobalt Strike.

“WarmCookie offers a variety of useful features to adversaries, including payload deployment, file manipulation, command execution, screenshot collection, and persistence, making it attractive for use on systems after initial access to facilitate long-term persistent access in compromised network environments. ,” Cisco Talos said.

Analysis of the source code suggests that the malware is likely developed by the same threat actors as Resident, a post-compromise implant installed as part of an intrusion kit called TA866 (aka Asylum Ambuscade), along with information stealer Rhadamanthys. These companies highlighted the manufacturing sector, followed by government and financial services.

“While the long-term targeting associated with distribution campaigns appears to be erratic, most of the observed payloads have been in the United States, with additional cases spread across Canada, the United Kingdom, Germany, Italy, Austria, and the Netherlands. , “Talos said.

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Critical vulnerability in Anthropic MCP exposes machines for remote feats

July 1, 2025

Ta829 and Unk_greensec share tactics and infrastructure in current malware

July 1, 2025

A new drawback in the IDES as a Visual Studio code allows for malicious bypassing bypassing the verified status

July 1, 2025

New Mattery Model for Browser Safety: Closing Risk in Last Mile

July 1, 2025

Google Patches Critical Lack of Zero Day in the V8 Chrome engine after active operation

July 1, 2025

US arrests in North Korean IT -Work scheme; Captures 29 domains and raids 21 laptops

July 1, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Critical vulnerability in Anthropic MCP exposes machines for remote feats

July 1, 2025

Ta829 and Unk_greensec share tactics and infrastructure in current malware

July 1, 2025

A new drawback in the IDES as a Visual Studio code allows for malicious bypassing bypassing the verified status

July 1, 2025

New Mattery Model for Browser Safety: Closing Risk in Last Mile

July 1, 2025

Google Patches Critical Lack of Zero Day in the V8 Chrome engine after active operation

July 1, 2025

US arrests in North Korean IT -Work scheme; Captures 29 domains and raids 21 laptops

July 1, 2025

Microsoft Removes Password Management from Authenticator app since August 2025

July 1, 2025

American agencies warn of Iranian protection cyber growth, OT networks and critical infrastructure

June 30, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Critical vulnerability in Anthropic MCP exposes machines for remote feats

July 1, 2025

Ta829 and Unk_greensec share tactics and infrastructure in current malware

July 1, 2025

A new drawback in the IDES as a Visual Studio code allows for malicious bypassing bypassing the verified status

July 1, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.