Tag: phishing
-
Phishing-Angriffe auf TikTok-Werbekonten nehmen zu
So paradox es klingt trotz aller technologischen Raffinesse hängt der Erfolg solcher Angriffe letztlich an einem sehr menschlichen Moment: dem Klick auf einen ink. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/phishing-angriffe-auf-tiktok-werbekonten-nehmen-zu/a44630/
-
W3LL phishing service sold for $500 dismantled by the FBI
The W3LL phishing kit, a cybercrime tool used to impersonate legitimate login pages and steal usernames and passwords, has been dismantled by the FBI and Indonesian law … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/04/14/fbi-w3ll-phishing-kit-takedown/
-
Sales Outreach Security: 5 Ways to Stop Your Sales Team from Looking Like Phishers
Is your sales team accidentally looking like phishers? Learn 5 proven ways to secure sales outreach emails and start landing in inboxes. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/sales-outreach-security-5-ways-to-stop-your-sales-team-from-looking-like-phishers/
-
Booking.com Confirms Data Breach as Hackers Access Customer Details
Booking.com confirms a data breach exposing customer details to hackers. No payment data accessed, but users face risk of targeted phishing scams now! First seen on hackread.com Jump to article: hackread.com/booking-com-data-breach-hackers-customer-details/
-
How AI is transforming threat detection
Tags: ai, attack, automation, best-practice, business, ceo, cisa, cve, cyber, data, detection, email, endpoint, framework, google, governance, group, incident response, intelligence, international, jobs, kev, malware, network, nist, organized, phishing, risk, skills, soc, switch, technology, threat, toolReducing alert fatigue: In alert triage, AI agents are reducing alert fatigue by clustering alert patterns and enabling risk-based prioritization, adds Dipto Chakravarty, chief product and technology officer at Black Duck.For example, natural language processing agents can summarize threat alerts at scale and correlate them with threat intel feeds such as CVE.org and the CISA KEV Catalog,…
-
Best of the Worst: Five Attacks That Already Knew Your Name
<div cla TL;DR This week’s Attack of the Day posts revealed a clear shift from volume to precision. A phishing PDF auto-launched a credential harvest page the instant it opened, no click required. A QR code inside another PDF had the target’s email address pre-encoded in base64, so the landing page pre-filled the victim’s username…
-
FBI announces takedown of phishing operation that targeted thousands of victims
Cybercriminals allegedly used the W3LL phishing kit to target more than 17,000 victims worldwide, stealing their passwords and multi-factor authentication codes. First seen on techcrunch.com Jump to article: techcrunch.com/2026/04/13/fbi-announces-takedown-of-phishing-operation-that-targeted-thousands-of-victims/
-
FBI takedown of W3LL phishing service leads to developer arrest
The FBI Atlanta Field Office and Indonesian authorities have dismantled the “W3LL” global phishing platform, seizing infrastructure and arresting the alleged developer in what is described as the first coordinated enforcement action between the United States and Indonesia targeting a phishing kit developer. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/fbi-takedown-of-w3ll-phishing-service-leads-to-developer-arrest/
-
Booking.com Hack Exposes Customer Data, Sparks Travel Scam Fears
Booking.com confirms a data breach that exposed traveler details, raising urgent concerns about highly targeted phishing scams and customer safety. The post Booking.com Hack Exposes Customer Data, Sparks Travel Scam Fears appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-booking-com-data-breach-traveler-scam-risk/
-
FBI, Indonesia take down W3LL phishing tool
A widely used phishing tool that allowed hackers to create fake websites that looked like legitimate login portals for just $500 was disrupted by the FBI and law enforcement agencies in Indonesia. First seen on therecord.media Jump to article: therecord.media/phishing-takedown-indonesia-fbi
-
US, Indonesia shut down ‘sophisticated’ phishing kit
For a nominal fee, cybercriminals could rent access to a service that maliciously duplicated popular websites’ login portals. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/phishing-kit-takedown-w3ll-us-indonesia/817318/
-
FBI and Indonesian Police Dismantle W3LL Phishing Network Behind $20M Fraud Attempts
The U.S. Federal Bureau of Investigation (FBI), in partnership with the Indonesian National Police, has dismantled the infrastructure associated with a global phishing operation that leveraged an off-the-shelf toolkit called W3LL to steal thousands of victims’ account credentials and attempt more than $20 million in fraud.In tandem, authorities detained the alleged developer, who has& First…
-
FBI and Indonesian Police Dismantle W3LL Phishing Network Behind $20M Fraud Attempts
The U.S. Federal Bureau of Investigation (FBI), in partnership with the Indonesian National Police, has dismantled the infrastructure associated with a global phishing operation that leveraged an off-the-shelf toolkit called W3LL to steal thousands of victims’ account credentials and attempt more than $20 million in fraud.In tandem, authorities detained the alleged developer, who has& First…
-
Interactive Brokers Phishing Scam: Fake IRS W-8BEN Renewal Alert
The blog describes a phishing campaign identified by Cofense that impersonates Interactive Brokers using a fake IRS W-8BEN renewal email to trick users into clicking a malicious link. The email appears legitimate but uses a suspicious sender address and directs victims to a counterfeit login page designed to steal account credentials. First seen on securityboulevard.com…
-
GitHub and Jira Alerts Hijacked for Trusted-SaaS Phishing
Hackers are abusing GitHub and Jira’s built”‘in notification systems to send phishing emails that appear completely legitimate. Because these emails are sent from the platforms’ own mail servers, they pass standard checks like SPF, DKIM, and DMARC, making them very hard for traditional email gateways to block. The messages are routed via the official mail…
-
FBI Dismantles $20m Phishing Operation W3LL
The W3LL phishing kit has been associated with fraud attempts totaling $20m First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/fbi-dismantles-phishing-operation/
-
Operation Atlantic Seizes $12m in Crypto Losses
UK, US and Canadian authorities have identified over 20,000 victims of approval phishing scams that trick users into handing over full crypto wallet access First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/operation-atlantic-seizes-12m/
-
FBI Atlanta and Indonesian National Police Take Down W3LLSTORE Phishing Marketplace
FBI Atlanta and Indonesian National Police dismantle W3LLSTORE phishing market linked to $20M fraud, seizing domains and detaining developer. First seen on hackread.com Jump to article: hackread.com/fbi-atlanta-indonesian-police-w3llstore-phishing-market/
-
Globale Phishing-Kampagne: Kunden von Paketzustelldiensten geraten ins Visier
Tags: phishingFirst seen on datensicherheit.de Jump to article: www.datensicherheit.de/global-phishing-kampagne-kunden-paketzustelldienste-visier
-
The Phishing-as-a-Service Pipeline: How a Scalable Fraud Ecosystem Is Driving Global Attacks
Flashpoint analysts, working with partner financial institutions, have observed a growing number of PhaaS operations operating with a level of coordination and specialization more commonly associated with legitimate software platforms. These ecosystems bring together phishing kit developers, infrastructure providers, spam delivery services, and financially motivated actors into a single, scalable pipeline for fraud. First seen…
-
UAT-10362 linked to LucidRook attacks targeting Taiwan-based institutions
LucidRook is Lua malware used in phishing attacks on NGOs and universities in Taiwan, linked to UAT-10362, spread via password-protected emails. LucidRook is a new Lua-based malware used in targeted phishing attacks against NGOs and universities in Taiwan. Cisco Talos links it to a skilled group tracked as UAT-10362. In Oct 2025, attackers used password-protected…
-
GitHub, GitLab Abused for Malware and Phishing Campaigns
Hackers are increasingly abusing trusted software development platforms GitHub and GitLab to host malware and credential phishing campaigns, making defensive detection significantly harder for enterprises. Because these Git-based platforms are deeply integrated into development and business workflows, organizations cannot simply block them at the network edge, giving threat actors a powerful, trusted delivery channel. GitHub…
-
New ‘LucidRook’ malware used in targeted attacks on NGOs, universities
A new Lua-based malware, called LucidRook, is being used in spear-phishing campaigns targeting non-governmental organizations and universities in Taiwan. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/new-lucidrook-malware-used-in-targeted-attacks-on-ngos-universities/
-
New VENOM phishing attacks steal senior executives’ Microsoft logins
Threat actors using a previously undocumented phishing-as-a-service (PhaaS) platform called “VENOM” are targeting credentials of C-suite executives across multiple industries. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/new-venom-phishing-attacks-steal-senior-executives-microsoft-logins/
-
‘Several dozen’ high-value corporations hit by new extortion crew in helpdesk phishing spree
Possible link to Mr. Raccoon’s claimed Adobe break-in First seen on theregister.com Jump to article: www.theregister.com/2026/04/09/several_dozen_highvalue_corporations_targeted/
-
UAT-10362 Targets Taiwanese NGOs with LucidRook Malware in Spear-Phishing Campaigns
A previously undocumented threat cluster dubbed UAT-10362 has been attributed to spear-phishing campaigns targeting Taiwanese non-governmental organizations (NGOs) and suspected universities to deploy a new Lua-based malware called LucidRook.”LucidRook is a sophisticated stager that embeds a Lua interpreter and Rust-compiled libraries within a dynamic-link library (DLL) to download and First seen on thehackernews.com Jump to…
-
When attackers already have the keys, MFA is just another door to open
Stolen credentials turn authentication systems into the attack surface. Token shows how wearable biometric authentication verifies the user”, not the session”, blocking phishing relays and MFA bypass. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/when-attackers-already-have-the-keys-mfa-is-just-another-door-to-open/
-
New Phishing Campaign Exploits Google Storage to Deliver Remcos RAT
A recently observed phishing campaign is abusing Google Cloud Storage to deliver the Remcos remote access trojan (RAT), relying on trusted Google infrastructure and a signed Microsoft binary to evade traditional defenses. Attackers host a fake Google Drive login page on the legitimate domain storage.googleapis.com, making the URL appear trustworthy to both users and security…
-
Middle East HackHire Operation Traced to South Asian Cyber Espionage Group
A spear-phishing campaign which spread across the Middle East between 2023 and 2024 has now been linked to Bitter APT group First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/middle-east-hack-operation-bitter/

