Connect with us
Microsoft launches giant phishing as a service Microsoft launches giant phishing as a service

Security

Microsoft launches giant phishing as a service

Published

on

For $ 800, BulletProofLink operators will set up hosting, install a phishing template, send out phishing emails, and collect data.

Microsoft Security Team told about a large-scale operation in which cybercriminals offer phishing services to cybercriminal groups.

The service, known as BulletProofLink, BulletProftLink and Anthrax, uses a hosting-like infrastructure and operates on a Phishing-as-a-Service (PHaaS) business model. It is currently being actively promoted on underground forums.

BulletProofLink is an evolved “phishing kit” – a collection of phishing pages and templates that mimic the login pages of well-known companies. BulletProofLink operators have taken these kits to a whole new level by offering their customers built-in hosting and phishing email services.

The BulletProofLink registration fee is $ 800. After paying the money, customers can no longer worry about anything – the service operators will do everything themselves. The package of services includes setting up a page for hosting a phishing site, installing a phishing template, setting up a domain (URL) configuration for a phishing site, sending phishing emails to the victims specified by the client, stealing credentials and sending them to the client on a weekly basis.

If a cybercriminal group wants to diversify their phishing patterns, they can turn to BulletProofLink’s operator-run template store, which costs $ 80-100. Currently, there are about 120 templates in the store.

However, service operators do not differ in decency. According to Microsoft experts, they deceive their own customers by keeping copies of the stolen credentials with the aim of selling them on hacker forums.

To host phishing pages, service operators use hacked sites. In some cases, they even compromised the DNS records of the compromised sites in order to generate subdomains for hosting phishing pages.

Click to comment

Leave a Reply

Your email address will not be published.

Security

Hacker Hacked Fast Company’s Apple News Account and Spread Racist Messages

Published

on

Hacker Hacked Fast Companys Apple News Account and Spread Racist

An unknown hacker was able to access the business publication Fast Company’s Apple News account and sent out a series of obscene and racist messages via push notifications. Subscribers are the victims.

Hacker Hacked Fast Company's Apple News Account and Spread Racist Messages

Fast Company confirmed the hack, and so did Apple. The incident is currently under investigation.

Fast Company’s Apple News account was hacked Tuesday night. After that, two push notifications with obscene and racist content were sent with a minute interval. The messages are disgusting and do not match Fast Company content. We are investigating the incident and have also paused feed updates and closed FastCompany.com until we are confident the situation has been resolved.“, – noted in the publication.

Shortly before the shutdown, the hacker himself posted an entire article on the Fast Company website, where he described in detail how he managed to bypass the protection. It turned out that the accounts on the site were protected by the same password, this also applies to the account of the site administrator. Having gained access to them, the hacker was able to get to the authentication tokens and log in to Apple News.

At the same time, in addition to hooliganism, no financial losses or manipulations were recorded.

Continue Reading

Security

Young hacker who leaked GTA 6 material denies his guilt

Published

on

Young hacker who leaked GTA 6 material denies his guilt

The 17-year-old hacker, who was previously arrested in the UK on suspicion of hacking Rockstar Games and Uber, has pleaded not guilty. According to police, he appeared in court over the weekend, but refused to plead guilty to PC misuse. At the same time, he admitted that he violated the conditions of release on bail. Now he is being held in a juvenile detention center.

Young hacker who leaked GTA 6 material denies his guilt

According to investigators, the 17-year-old is part of the Lapsus$ hacker group and is behind the recent leak of videos and other details of the $2 billion GTA 6 game.

Earlier, a hacker under the nickname teapotuberhacker published an archive with video and source code from an early version of GTA 6, which has already gone viral. Take-Two tried to stop the spread of the leak, but it was only partially successful.

The hacker also said that it was he who attacked the Uber computer system, gaining access to correspondence, email addresses, and so on.

At the moment, the investigation is ongoing, so it is not yet clear how this story will end.

Continue Reading

Security

Cloudflare introduces world’s first eSIM with better security than VPN

Published

on

Cloudflare introduces worlds first eSIM with better security than VPN

Cloudflare has introduced a new solution that may be suitable for smartphone and mobile Internet users. We are talking about an eSIM card called Zero Trust SIM. Its peculiarity is that it provides an increased level of security, reducing the risk of number substitution.

Cloudflare introduces world's first eSIM with better security than VPN

In technical terms, we are talking about the transfer of DNS requests through the Cloudflare gateway, which allows you to protect them from interception and spoofing. Also promised is a check of all intermediate nodes through which the device accesses the Internet.

According to Cloudflare CTO John Graham-Cumming, Zero Trust SIM technology can outperform VPNs and other security systems as it provides cell-level protection.

Zero Trust SIM will launch first in the US, where only a virtual card for iOS and Android will be available at first. When activated, it will bind to a specific device and allow you to protect it. Physical maps are also expected in the future.

The company is also launching Zero Trust for Mobile Operators, an affiliate program for telecom operators that will enable them to offer subscriptions to the services and tools of the Zero Trust platform. In addition, a similar project is expected for the Internet of Things.

Continue Reading

Most Popular