phishing
-
Blog
Hackers are using a new AI chatbot to wage attacks: GhostGPT lets users write malicious code, create malware, and curate phishing emails – and it costs just $50 to use
Hackers are using an uncensored chatbot dubbed GhostGPT to help write malware, highlighting how AI can be twisted to “illegal activities”. That’s according to Abnormal Security, which laid out details of GhostGPT in a blog post, saying the chatbot lacks the guardrails of standard AI tools such as ChatGPT, making it a helpful tool for cyber criminals. It’s not the…
Read More » -
Blog
Phishing Emails in Australia Rise by 30%
The number of phishing emails received by Australians surged by 30% last year, new research by security firm Abnormal Security has found. Cybercriminals have increasingly targeted the Asia-Pacific region, partly because it is becoming a larger player in critical industries like data centres and telecoms. For APAC as a whole, credential phishing attacks rose by 30.5% between 2023 and 2024,…
Read More » -
Blog
Sneaky Log Phishing Scheme Targets Two-Factor Security
Security researchers at French firm Sekoia detected a new phishing-as-a-service kit targeting Microsoft 365 accounts in December 2024, the company announced on Jan. 16. The kit, called Sneaky 2FA, was distributed through Telegram by the threat actor service Sneaky Log. It is associated with about 100 domains and has been active since at least October 2024. Sneaky 2FA is an…
Read More » -
Blog
Phishing campaign targets developers with fake CrowdStrike job offers
Developers are being targeted in a new phishing campaign using fake CrowdStrike job offers, the security company has warned. The firm noted that the campaign, first identified on 7 January, uses CrowdStrike’s recruitment branding to load crypto-mining malware onto the victim’s systems. The campaign begins with phishing emails purporting to be part of a recruitment process informing victims that they…
Read More » -
Blog
Phishing texts trick Apple iMessage users into disabling protection
Cybercriminals are exploiting a trick to turn off Apple iMessage’s built-in phishing protection for a text and trick users into re-enabling disabled phishing links. With so much of our daily activities done from our mobile devices, whether paying bills, shopping, or communicating with friends and colleagues, threat actors increasingly conduct smishing (SMS phishing) attacks against mobile numbers. To protect users from…
Read More » -
Blog
Bringing Real-Time Phishing Detection to Microsoft Outlook
Criminal IP, a globally recognized Cyber Threat Intelligence (CTI) solution by AI SPERA, has launched its Criminal IP Malicious Link Detector add-in on the Microsoft Marketplace. This cutting-edge tool provides real-time phishing email detection and URL blocking for Microsoft Outlook, adding an essential layer of email security in the face of increasing cyber threats. Advances in generative AI have driven a surge…
Read More » -
Blog
Ongoing phishing attack abuses Google Calendar to bypass spam filters
An ongoing phishing scam is abusing Google Calendar invites and Google Drawings pages to steal credentials while bypassing spam filters. According to Check Point, which has been monitoring the phishing attack, the threat actors have targeted 300 brands with over 4,000 emails sent in four weeks. Check Point told BleepingComputer that the attacks targeted a broad range of companies, including educational institutions,…
Read More » -
Blog
Itch.io is currently offline due to a ‘trash AI-powered’ phishing report
Indie game storefront Itch.io is currently offline because of what it describes as a bogus phishing report. While the game store’s servers are still online, the domain for the website is currently pointing towards IP addresses that itch.io doesn’t own — making it inaccessible for most people. Itch.io blames pop culture collectibles company Funko for the issues in a post on…
Read More » -
Blog
New Rockstar 2FA phishing service targets Microsoft 365 accounts
A new phishing-as-a-service (PhaaS) platform named ‘Rockstar 2FA’ has emerged, facilitating large-scale adversary-in-the-middle (AiTM) attacks to steal Microsoft 365 credentials. Like other AiTM platforms, Rockstar 2FA enables attackers to bypass multifactor authentication (MFA) protections on targeted accounts by intercepting valid session cookies. These attacks work by directing victims to a fake login page that mimics Microsoft 365 and tricking them…
Read More » -
Blog
What is PhaaS (Phishing as a Service)?
Imagine buying a complete toolkit for cybercrime as quickly as subscribing to Netflix. That’s exactly what’s happening with Phishing as a Service (PhaaS), a dangerous evolution in cybercrime making headlines in 2024. This isn’t just another cybersecurity buzzword – it’s a lucrative criminal enterprise changing how attacks target everyday internet users like you. In this article, we will explain what…
Read More »