phishing Archives - GBHackers Security | #1 Globally Trusted Cyber Security News Platform https://gbhackers.com/tag/phishing/ GBhackers Offering Exclusive Cyber Security News Coverage, New Research papers & Technology Updates. Tue, 05 Nov 2024 10:27:50 +0000 en-US hourly 1 https://wordpress.org/?v=6.6.2 https://gbhackers.com/wp-content/uploads/2024/09/cropped-gbh-32x32.png phishing Archives - GBHackers Security | #1 Globally Trusted Cyber Security News Platform https://gbhackers.com/tag/phishing/ 32 32 Hackers Created 100+ Fake Web Stores To Steal Millions Of Dollars From Customers https://gbhackers.com/hackers-fake-stores-million-theft/ https://gbhackers.com/hackers-fake-stores-million-theft/#respond Tue, 05 Nov 2024 10:27:49 +0000 https://gbhackers.com/?p=114483 The Phish, ‘n’ Ships fraud operation leverages, compromised websites to redirect users to fake online stores, which, optimized for search engine visibility, trick victims into providing credit card details to third-party payment processors, resulting in financial loss without receiving any products.  Phishing attacks exploit consumer demand for hard-to-find items, redirecting victims to fake online stores. […]

The post Hackers Created 100+ Fake Web Stores To Steal Millions Of Dollars From Customers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Hackers Created 100+ Fake Web Stores To Steal Millions Of Dollars From Customers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/hackers-fake-stores-million-theft/feed/ 0
Hackers Downgrading Remote Desktop Security Setting For Unauthorized Access https://gbhackers.com/remote-desktop-security-breach/ https://gbhackers.com/remote-desktop-security-breach/#respond Mon, 04 Nov 2024 11:46:08 +0000 https://gbhackers.com/?p=114288 The attackers use a multi-stage attack, starting with a malicious LNK file disguised as a healthcare-related document. This file, likely sent via phishing emails, triggers PowerShell commands to download and execute additional payloads from a remote server.  These payloads allow remote access to the system by modifying RDP settings and generating a new administrative account.  […]

The post Hackers Downgrading Remote Desktop Security Setting For Unauthorized Access appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Hackers Downgrading Remote Desktop Security Setting For Unauthorized Access appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/remote-desktop-security-breach/feed/ 0
Beware Of Callback Phishing Attacks Google Groups That Steal Login Details https://gbhackers.com/callback-phishing-google-login-theft/ https://gbhackers.com/callback-phishing-google-login-theft/#respond Tue, 22 Oct 2024 12:18:08 +0000 https://gbhackers.com/?p=113818 Callback phishing is a two-step attack involving phishing emails and phone calls. Victims are lured into calling a bogus number in the email, where attackers impersonate legitimate entities and trick victims into divulging sensitive information or downloading malware. The BazarCall scheme employed a text-based phishing email to lure victims into calling a malicious phone number. […]

The post Beware Of Callback Phishing Attacks Google Groups That Steal Login Details appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Beware Of Callback Phishing Attacks Google Groups That Steal Login Details appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/callback-phishing-google-login-theft/feed/ 0
Beware Of Fake Verify You Are A Human Request That Delivers Malware https://gbhackers.com/fake-human-verification-malware/ https://gbhackers.com/fake-human-verification-malware/#respond Thu, 26 Sep 2024 08:57:39 +0000 https://gbhackers.com/?p=112538 Researchers observed two distinct instances where users were inadvertently led to malicious websites after conducting Google searches for video streaming services. These victims were redirected to malicious URLs that employed a deceptive tactic while attempting to access sports or movie content. The victims were presented with a prompt requesting human verification, which, upon completion, executed […]

The post Beware Of Fake Verify You Are A Human Request That Delivers Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Beware Of Fake Verify You Are A Human Request That Delivers Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/fake-human-verification-malware/feed/ 0
Chinese Hackers Charged for Multi-Year Spear-Phishing Attacks https://gbhackers.com/chinese-hackers-charged/ https://gbhackers.com/chinese-hackers-charged/#respond Tue, 17 Sep 2024 06:27:03 +0000 https://gbhackers.com/?p=111982 Song Wu, a Chinese national, has been indicted on charges of wire fraud and aggravated identity theft. The charges stem from his alleged involvement in a sophisticated spear-phishing campaign targeting sensitive U.S. research and technology. This case highlights ongoing concerns about cybersecurity and protecting valuable intellectual property. Decoding Compliance: What CISOs Need to Know – Join […]

The post Chinese Hackers Charged for Multi-Year Spear-Phishing Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Chinese Hackers Charged for Multi-Year Spear-Phishing Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/chinese-hackers-charged/feed/ 0
Warning: New Emansrepo Malware Uses HTML Files to Target Windows Users https://gbhackers.com/emansrepo-html-attack/ https://gbhackers.com/emansrepo-html-attack/#respond Wed, 04 Sep 2024 12:38:20 +0000 https://gbhackers.com/?p=107816 Emansrepo, a Python infostealer, is distributed via phishing emails containing fake purchase orders and invoices, where the attacker initially sent a phishing email with an HTML file redirecting to the Emansrepo download link.  In recent months, the attack flow has become more complex, involving multiple stages and mailboxes. The stolen data is compressed into a […]

The post Warning: New Emansrepo Malware Uses HTML Files to Target Windows Users appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Warning: New Emansrepo Malware Uses HTML Files to Target Windows Users appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/emansrepo-html-attack/feed/ 0
.NET-based Snake Keylogger Attack Windows Using Weaponized Excel Documents https://gbhackers.com/net-based-snake-keylogger-attack/ https://gbhackers.com/net-based-snake-keylogger-attack/#respond Fri, 30 Aug 2024 09:36:50 +0000 https://gbhackers.com/?p=96525 Researchers uncovered a sophisticated phishing campaign that exploits a .NET-based Snake Keylogger variant. This attack leverages weaponized Excel documents to infiltrate Windows systems, posing significant threats to user data security. This article delves into the mechanics of the attack, the techniques employed by the malware, and the implications for users and organizations. Understanding Snake Keylogger […]

The post .NET-based Snake Keylogger Attack Windows Using Weaponized Excel Documents appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post .NET-based Snake Keylogger Attack Windows Using Weaponized Excel Documents appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/net-based-snake-keylogger-attack/feed/ 0
Threat Actors Exploiting Windows Systems To Deploy Multiple Malwares https://gbhackers.com/windows-malware-exploits/ https://gbhackers.com/windows-malware-exploits/#respond Fri, 09 Aug 2024 13:31:20 +0000 https://gbhackers.com/?p=95469 A sophisticated phishing campaign targeting Windows systems leverages multiple evasion techniques, including Python obfuscation, shellcode generation, and loading, to deploy a payload of malware.  This multi-stage attack, disguised as a customer service request, delivers malicious attachments that, once opened, install XWorm, VenomRAT, AsyncRAT, and PureHVNC, which grant attackers remote system control, posing a significant threat […]

The post Threat Actors Exploiting Windows Systems To Deploy Multiple Malwares appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Threat Actors Exploiting Windows Systems To Deploy Multiple Malwares appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/windows-malware-exploits/feed/ 0
North Korean Kimusky Group Attacking University Professors https://gbhackers.com/north-korean-kimusky-group/ https://gbhackers.com/north-korean-kimusky-group/#respond Fri, 09 Aug 2024 12:34:16 +0000 https://gbhackers.com/?p=95423 Kimsuky, a North Korean APT group, employs targeted phishing campaigns, leveraging DMARC exploitation to conceal social engineering, infiltrate university networks, and steal research for the Reconnaissance General Bureau.  It aligns with North Korea’s goal of intelligence acquisition to advance its scientific capabilities, mirroring past actions of stealing nuclear, healthcare, and pharmaceutical research.  The recent exposure […]

The post North Korean Kimusky Group Attacking University Professors appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post North Korean Kimusky Group Attacking University Professors appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/north-korean-kimusky-group/feed/ 0
Microsoft 365 Vulnerability Let Hackers Bypass Anti-phishing Feature https://gbhackers.com/microsoft-365-phishing-bypass/ https://gbhackers.com/microsoft-365-phishing-bypass/#respond Wed, 07 Aug 2024 11:54:57 +0000 https://gbhackers.com/?p=95246 A vulnerability in Microsoft 365 (formerly Office 365) has been found that allows malicious actors to bypass anti-phishing measures. One of the anti-phishing features available in Exchange Online Protection (EOP) and Microsoft Defender to Office 365 enterprises is the ‘First Contact Safety Tip.’ In the first contact safety tip, users are cautioned when they get […]

The post Microsoft 365 Vulnerability Let Hackers Bypass Anti-phishing Feature appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Microsoft 365 Vulnerability Let Hackers Bypass Anti-phishing Feature appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/microsoft-365-phishing-bypass/feed/ 0