home.social

#phishing — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #phishing, aggregated by home.social.

  1. Device Code Phishing is an Evolution in Identity Takeover

    Device code phishing attacks have exploded across the threat landscape, with new toolkits emerging weekly. This surge coincides with publicly released criminal toolkits and multiple phishing-as-a-service offerings like EvilTokens and Tycoon. Threat actors abuse the OAuth 2.0 device authorization grant flow to compromise Microsoft 365 and other enterprise accounts by tricking users into authorizing malicious applications. Current implementations use on-demand code generation, addressing the 15-minute expiration limitation of previous techniques. Most activity appears to be generated using AI-based coding techniques. Successful attacks lead to full account takeover, data theft, business email compromise, and potential ransomware deployment. The technique represents the natural evolution of credential phishing as organizations improve their defenses against traditional multifactor authentication bypass methods.

    Pulse ID: 6a05af080ae591ea2bf00e87
    Pulse Link: otx.alienvault.com/pulse/6a05a
    Pulse Author: AlienVault
    Created: 2026-05-14 11:16:24

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #DataTheft #Email #InfoSec #Microsoft #MultiFactorAuthentication #OTX #OpenThreatExchange #Phishing #RAT #RansomWare #bot #AlienVault

  2. Disclosing new PebbleDash-based tools

    Kaspersky researchers conducted an in-depth analysis of Kimsuky APT activity, revealing tactical shifts and new malware variants based on the PebbleDash platform. The group introduced HelloDoor, a Rust-based backdoor, httpMalice leveraging HTTP and Dropbox communications, and updated MemLoad and httpTroy variants. Kimsuky maintains persistence through legitimate tools including VSCode Tunneling with GitHub authentication and DWAgent remote management software. Initial access occurs via spear-phishing with malicious attachments disguised as documents. The group primarily targets South Korean entities across government and defense sectors, with additional PebbleDash attacks observed in Brazil and Germany. Infrastructure relies on free South Korean hosting services and tunneling services like Cloudflare Quick Tunnels and Ngrok. Both PebbleDash and AppleSeed malware clusters demonstrate ongoing development with shared distribution methods, stolen certificates, and overlapping targets, indicating single-actor c...

    Pulse ID: 6a05af0979e3cc1214a50d4e
    Pulse Link: otx.alienvault.com/pulse/6a05a
    Pulse Author: AlienVault
    Created: 2026-05-14 11:16:25

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #AppleSeed #BackDoor #Brazil #Cloud #CyberSecurity #Dropbox #Germany #GitHub #Government #HTTP #InfoSec #Kaspersky #Kimsuky #Korea #Malware #OTX #OpenThreatExchange #Phishing #RAT #Rust #SouthKorea #SpearPhishing #UK #bot #AlienVault

  3. Disclosing new PebbleDash-based tools

    Kaspersky researchers conducted an in-depth analysis of Kimsuky APT activity, revealing tactical shifts and new malware variants based on the PebbleDash platform. The group introduced HelloDoor, a Rust-based backdoor, httpMalice leveraging HTTP and Dropbox communications, and updated MemLoad and httpTroy variants. Kimsuky maintains persistence through legitimate tools including VSCode Tunneling with GitHub authentication and DWAgent remote management software. Initial access occurs via spear-phishing with malicious attachments disguised as documents. The group primarily targets South Korean entities across government and defense sectors, with additional PebbleDash attacks observed in Brazil and Germany. Infrastructure relies on free South Korean hosting services and tunneling services like Cloudflare Quick Tunnels and Ngrok. Both PebbleDash and AppleSeed malware clusters demonstrate ongoing development with shared distribution methods, stolen certificates, and overlapping targets, indicating single-actor c...

    Pulse ID: 6a05af0979e3cc1214a50d4e
    Pulse Link: otx.alienvault.com/pulse/6a05a
    Pulse Author: AlienVault
    Created: 2026-05-14 11:16:25

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #AppleSeed #BackDoor #Brazil #Cloud #CyberSecurity #Dropbox #Germany #GitHub #Government #HTTP #InfoSec #Kaspersky #Kimsuky #Korea #Malware #OTX #OpenThreatExchange #Phishing #RAT #Rust #SouthKorea #SpearPhishing #UK #bot #AlienVault

  4. Disclosing new PebbleDash-based tools

    Kaspersky researchers conducted an in-depth analysis of Kimsuky APT activity, revealing tactical shifts and new malware variants based on the PebbleDash platform. The group introduced HelloDoor, a Rust-based backdoor, httpMalice leveraging HTTP and Dropbox communications, and updated MemLoad and httpTroy variants. Kimsuky maintains persistence through legitimate tools including VSCode Tunneling with GitHub authentication and DWAgent remote management software. Initial access occurs via spear-phishing with malicious attachments disguised as documents. The group primarily targets South Korean entities across government and defense sectors, with additional PebbleDash attacks observed in Brazil and Germany. Infrastructure relies on free South Korean hosting services and tunneling services like Cloudflare Quick Tunnels and Ngrok. Both PebbleDash and AppleSeed malware clusters demonstrate ongoing development with shared distribution methods, stolen certificates, and overlapping targets, indicating single-actor c...

    Pulse ID: 6a05af0979e3cc1214a50d4e
    Pulse Link: otx.alienvault.com/pulse/6a05a
    Pulse Author: AlienVault
    Created: 2026-05-14 11:16:25

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #AppleSeed #BackDoor #Brazil #Cloud #CyberSecurity #Dropbox #Germany #GitHub #Government #HTTP #InfoSec #Kaspersky #Kimsuky #Korea #Malware #OTX #OpenThreatExchange #Phishing #RAT #Rust #SouthKorea #SpearPhishing #UK #bot #AlienVault

  5. Disclosing new PebbleDash-based tools

    Kaspersky researchers conducted an in-depth analysis of Kimsuky APT activity, revealing tactical shifts and new malware variants based on the PebbleDash platform. The group introduced HelloDoor, a Rust-based backdoor, httpMalice leveraging HTTP and Dropbox communications, and updated MemLoad and httpTroy variants. Kimsuky maintains persistence through legitimate tools including VSCode Tunneling with GitHub authentication and DWAgent remote management software. Initial access occurs via spear-phishing with malicious attachments disguised as documents. The group primarily targets South Korean entities across government and defense sectors, with additional PebbleDash attacks observed in Brazil and Germany. Infrastructure relies on free South Korean hosting services and tunneling services like Cloudflare Quick Tunnels and Ngrok. Both PebbleDash and AppleSeed malware clusters demonstrate ongoing development with shared distribution methods, stolen certificates, and overlapping targets, indicating single-actor c...

    Pulse ID: 6a05af0979e3cc1214a50d4e
    Pulse Link: otx.alienvault.com/pulse/6a05a
    Pulse Author: AlienVault
    Created: 2026-05-14 11:16:25

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #AppleSeed #BackDoor #Brazil #Cloud #CyberSecurity #Dropbox #Germany #GitHub #Government #HTTP #InfoSec #Kaspersky #Kimsuky #Korea #Malware #OTX #OpenThreatExchange #Phishing #RAT #Rust #SouthKorea #SpearPhishing #UK #bot #AlienVault

  6. Disclosing new PebbleDash-based tools

    Kaspersky researchers conducted an in-depth analysis of Kimsuky APT activity, revealing tactical shifts and new malware variants based on the PebbleDash platform. The group introduced HelloDoor, a Rust-based backdoor, httpMalice leveraging HTTP and Dropbox communications, and updated MemLoad and httpTroy variants. Kimsuky maintains persistence through legitimate tools including VSCode Tunneling with GitHub authentication and DWAgent remote management software. Initial access occurs via spear-phishing with malicious attachments disguised as documents. The group primarily targets South Korean entities across government and defense sectors, with additional PebbleDash attacks observed in Brazil and Germany. Infrastructure relies on free South Korean hosting services and tunneling services like Cloudflare Quick Tunnels and Ngrok. Both PebbleDash and AppleSeed malware clusters demonstrate ongoing development with shared distribution methods, stolen certificates, and overlapping targets, indicating single-actor c...

    Pulse ID: 6a05af0979e3cc1214a50d4e
    Pulse Link: otx.alienvault.com/pulse/6a05a
    Pulse Author: AlienVault
    Created: 2026-05-14 11:16:25

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #AppleSeed #BackDoor #Brazil #Cloud #CyberSecurity #Dropbox #Germany #GitHub #Government #HTTP #InfoSec #Kaspersky #Kimsuky #Korea #Malware #OTX #OpenThreatExchange #Phishing #RAT #Rust #SouthKorea #SpearPhishing #UK #bot #AlienVault

  7. Cybersicherheitsmonitor (CyMon) 2026 – au weia

    Gerade wurden die Ergebnisse einer hochtrabend "Cybersicherheitsmonitor" (CyMon) genannten Umfrage veröffentlicht. Berichte mit einem Haufen schöner Zahlen und Grafiken gibt es auch von den beiden Initiatoren, dem BSI und der Polizei-Beratung.
    Nach meiner Einschätzung trägt diese Umfrage zur Transparenz oder zur Verbesserung der Situation genau nichts bei. Was wollen die Verantwortlichen damit sagen? Dass alles ganz ganz schlimm ist? Dass viele Menschen zu uninformiert und zu

    pc-fluesterer.info/wordpress/2

    #Allgemein #Empfehlung #Hintergrund #Warnung #antisoziale #betrug #cybercrime #erpresser #exploits #fake #foss #google #identitt #Microsoft #office #outlook #passwort #phishing #politik #sicherheit #trojaner #vorbeugen #windows #wissen #zahlen

  8. Cybersicherheitsmonitor (CyMon) 2026 – au weia

    Gerade wurden die Ergebnisse einer hochtrabend "Cybersicherheitsmonitor" (CyMon) genannten Umfrage veröffentlicht. Berichte mit einem Haufen schöner Zahlen und Grafiken gibt es auch von den beiden Initiatoren, dem BSI und der Polizei-Beratung.
    Nach meiner Einschätzung trägt diese Umfrage zur Transparenz oder zur Verbesserung der Situation genau nichts bei. Was wollen die Verantwortlichen damit sagen? Dass alles ganz ganz schlimm ist? Dass viele Menschen zu uninformiert und zu

    pc-fluesterer.info/wordpress/2

    #Allgemein #Empfehlung #Hintergrund #Warnung #antisoziale #betrug #cybercrime #erpresser #exploits #fake #foss #google #identitt #Microsoft #office #outlook #passwort #phishing #politik #sicherheit #trojaner #vorbeugen #windows #wissen #zahlen

  9. Cybersicherheitsmonitor (CyMon) 2026 – au weia

    Gerade wurden die Ergebnisse einer hochtrabend "Cybersicherheitsmonitor" (CyMon) genannten Umfrage veröffentlicht. Berichte mit einem Haufen schöner Zahlen und Grafiken gibt es auch von den beiden Initiatoren, dem BSI und der Polizei-Beratung.
    Nach meiner Einschätzung trägt diese Umfrage zur Transparenz oder zur Verbesserung der Situation genau nichts bei. Was wollen die Verantwortlichen damit sagen? Dass alles ganz ganz schlimm ist? Dass viele Menschen zu uninformiert und zu

    pc-fluesterer.info/wordpress/2

    #Allgemein #Empfehlung #Hintergrund #Warnung #antisoziale #betrug #cybercrime #erpresser #exploits #fake #foss #google #identitt #Microsoft #office #outlook #passwort #phishing #politik #sicherheit #trojaner #vorbeugen #windows #wissen #zahlen

  10. Cybersicherheitsmonitor (CyMon) 2026 – au weia

    Gerade wurden die Ergebnisse einer hochtrabend "Cybersicherheitsmonitor" (CyMon) genannten Umfrage veröffentlicht. Berichte mit einem Haufen schöner Zahlen und Grafiken gibt es auch von den beiden Initiatoren, dem BSI und der Polizei-Beratung.
    Nach meiner Einschätzung trägt diese Umfrage zur Transparenz oder zur Verbesserung der Situation genau nichts bei. Was wollen die Verantwortlichen damit sagen? Dass alles ganz ganz schlimm ist? Dass viele Menschen zu uninformiert und zu

    pc-fluesterer.info/wordpress/2

    #Allgemein #Empfehlung #Hintergrund #Warnung #antisoziale #betrug #cybercrime #erpresser #exploits #fake #foss #google #identitt #Microsoft #office #outlook #passwort #phishing #politik #sicherheit #trojaner #vorbeugen #windows #wissen #zahlen

  11. Google is training millions of people to scan random QR codes on websites to "prove they're human." 🚨

    You know who loves that behavior? Phishers. Every scammer on the planet just got a gift from Google's new reCAPTCHA.

    We break it all down in Ep 26.

    🎧 impracticalprivacy.com

    #CyberSecurity #Phishing #Google #Privacy #ImpracticalPrivacy #PrivacyTools #Surveillance #reCAPTCHA #deGoogle #OpenWeb

  12. Google is training millions of people to scan random QR codes on websites to "prove they're human." 🚨

    You know who loves that behavior? Phishers. Every scammer on the planet just got a gift from Google's new reCAPTCHA.

    We break it all down in Ep 26.

    🎧 impracticalprivacy.com

    #CyberSecurity #Phishing #Google #Privacy #ImpracticalPrivacy #PrivacyTools #Surveillance #reCAPTCHA #deGoogle #OpenWeb

  13. Google is training millions of people to scan random QR codes on websites to "prove they're human." 🚨

    You know who loves that behavior? Phishers. Every scammer on the planet just got a gift from Google's new reCAPTCHA.

    We break it all down in Ep 26.

    🎧 impracticalprivacy.com

    #CyberSecurity #Phishing #Google #Privacy #ImpracticalPrivacy #PrivacyTools #Surveillance #reCAPTCHA #deGoogle #OpenWeb

  14. Google is training millions of people to scan random QR codes on websites to "prove they're human." 🚨

    You know who loves that behavior? Phishers. Every scammer on the planet just got a gift from Google's new reCAPTCHA.

    We break it all down in Ep 26.

    🎧 impracticalprivacy.com

    #CyberSecurity #Phishing #Google #Privacy #ImpracticalPrivacy #PrivacyTools #Surveillance #reCAPTCHA #deGoogle #OpenWeb

  15. Stolen phones - and specifically iPhones - have robust anti-theft protections. They are worthless once they're flagged - locked to their owner. So why are millions still being stolen every year?
    In this paper, we uncover a thriving underground marketplace focused on unlocking stolen phones. It is powered by:

    Lookalike domains impersonating Apple, Xiaomi, Samsung and other brands
    Smishing campaigns targeting device owners
    Pay‑as‑you‑go “unlocking” tools sold on Telegram
    By pivoting on DNS data, we identified 10,000+ malicious domains and a growing ecosystem turning locked devices into profit at scale.

    👉 Read how this supply chain works—from theft to resale—and why it’s growing fast. infoblox.com/blog/threat-intel

    #ThreatIntel #CyberSecurity #Phishing #MobileSecurity #iOS #Smishing #dns #threatintelligence #cybercrime #infosec #infoblox #infobloxthreatintel #threatintelligence #cybercrime  #infosec #infoblox #infobloxthreatintel

  16. Stolen phones - and specifically iPhones - have robust anti-theft protections. They are worthless once they're flagged - locked to their owner. So why are millions still being stolen every year?
    In this paper, we uncover a thriving underground marketplace focused on unlocking stolen phones. It is powered by:

    Lookalike domains impersonating Apple, Xiaomi, Samsung and other brands
    Smishing campaigns targeting device owners
    Pay‑as‑you‑go “unlocking” tools sold on Telegram
    By pivoting on DNS data, we identified 10,000+ malicious domains and a growing ecosystem turning locked devices into profit at scale.

    👉 Read how this supply chain works—from theft to resale—and why it’s growing fast. infoblox.com/blog/threat-intel

    #ThreatIntel #CyberSecurity #Phishing #MobileSecurity #iOS #Smishing #dns #threatintelligence #cybercrime #infosec #infoblox #infobloxthreatintel #threatintelligence #cybercrime  #infosec #infoblox #infobloxthreatintel

  17. Stolen phones - and specifically iPhones - have robust anti-theft protections. They are worthless once they're flagged - locked to their owner. So why are millions still being stolen every year?
    In this paper, we uncover a thriving underground marketplace focused on unlocking stolen phones. It is powered by:

    Lookalike domains impersonating Apple, Xiaomi, Samsung and other brands
    Smishing campaigns targeting device owners
    Pay‑as‑you‑go “unlocking” tools sold on Telegram
    By pivoting on DNS data, we identified 10,000+ malicious domains and a growing ecosystem turning locked devices into profit at scale.

    👉 Read how this supply chain works—from theft to resale—and why it’s growing fast. infoblox.com/blog/threat-intel

    #ThreatIntel #CyberSecurity #Phishing #MobileSecurity #iOS #Smishing #dns #threatintelligence #cybercrime #infosec #infoblox #infobloxthreatintel #threatintelligence #cybercrime  #infosec #infoblox #infobloxthreatintel

  18. Stolen phones - and specifically iPhones - have robust anti-theft protections. They are worthless once they're flagged - locked to their owner. So why are millions still being stolen every year?
    In this paper, we uncover a thriving underground marketplace focused on unlocking stolen phones. It is powered by:

    Lookalike domains impersonating Apple, Xiaomi, Samsung and other brands
    Smishing campaigns targeting device owners
    Pay‑as‑you‑go “unlocking” tools sold on Telegram
    By pivoting on DNS data, we identified 10,000+ malicious domains and a growing ecosystem turning locked devices into profit at scale.

    👉 Read how this supply chain works—from theft to resale—and why it’s growing fast. infoblox.com/blog/threat-intel

    #ThreatIntel #CyberSecurity #Phishing #MobileSecurity #iOS #Smishing #dns #threatintelligence #cybercrime #infosec #infoblox #infobloxthreatintel #threatintelligence #cybercrime  #infosec #infoblox #infobloxthreatintel

  19. Stolen phones - and specifically iPhones - have robust anti-theft protections. They are worthless once they're flagged - locked to their owner. So why are millions still being stolen every year?
    In this paper, we uncover a thriving underground marketplace focused on unlocking stolen phones. It is powered by:

    Lookalike domains impersonating Apple, Xiaomi, Samsung and other brands
    Smishing campaigns targeting device owners
    Pay‑as‑you‑go “unlocking” tools sold on Telegram
    By pivoting on DNS data, we identified 10,000+ malicious domains and a growing ecosystem turning locked devices into profit at scale.

    👉 Read how this supply chain works—from theft to resale—and why it’s growing fast. infoblox.com/blog/threat-intel

    #ThreatIntel #CyberSecurity #Phishing #MobileSecurity #iOS #Smishing #dns #threatintelligence #cybercrime #infosec #infoblox #infobloxthreatintel #threatintelligence #cybercrime  #infosec #infoblox #infobloxthreatintel

  20. Python Backdoor Threat Analysis Following an AI Deepfake Impersonation Campaign

    A sophisticated campaign linked to APT37 delivers Python-based backdoors through spear-phishing emails containing malicious LNK files disguised as legitimate documents. Attackers use themes including airline e-tickets, North Korea research invitations, and impersonation of defense and police officials to induce execution. The LNK files employ environment variable-based obfuscation techniques to download additional BAT files, which establish a Python runtime environment and execute compiled Python bytecode disguised with .cat extensions. The malware functions as a remote command execution backdoor, communicating with C2 servers to receive commands and exfiltrate results. Persistence is maintained through scheduled tasks executing at one-minute intervals. The campaign shows strong tactical similarities to previous APT37 operations, including infrastructure patterns, script obfuscation methods, and the abuse of legitimate tools.

    Pulse ID: 6a04a9a090a64de310cb0568
    Pulse Link: otx.alienvault.com/pulse/6a04a
    Pulse Author: AlienVault
    Created: 2026-05-13 16:41:04

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #APT37 #BackDoor #CyberSecurity #Email #InfoSec #Korea #LNK #Malware #NorthKorea #OTX #OpenThreatExchange #Phishing #Python #RAT #RemoteCommandExecution #SpearPhishing #bot #AlienVault

  21. Python Backdoor Threat Analysis Following an AI Deepfake Impersonation Campaign

    A sophisticated campaign linked to APT37 delivers Python-based backdoors through spear-phishing emails containing malicious LNK files disguised as legitimate documents. Attackers use themes including airline e-tickets, North Korea research invitations, and impersonation of defense and police officials to induce execution. The LNK files employ environment variable-based obfuscation techniques to download additional BAT files, which establish a Python runtime environment and execute compiled Python bytecode disguised with .cat extensions. The malware functions as a remote command execution backdoor, communicating with C2 servers to receive commands and exfiltrate results. Persistence is maintained through scheduled tasks executing at one-minute intervals. The campaign shows strong tactical similarities to previous APT37 operations, including infrastructure patterns, script obfuscation methods, and the abuse of legitimate tools.

    Pulse ID: 6a04a9a090a64de310cb0568
    Pulse Link: otx.alienvault.com/pulse/6a04a
    Pulse Author: AlienVault
    Created: 2026-05-13 16:41:04

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #APT37 #BackDoor #CyberSecurity #Email #InfoSec #Korea #LNK #Malware #NorthKorea #OTX #OpenThreatExchange #Phishing #Python #RAT #RemoteCommandExecution #SpearPhishing #bot #AlienVault

  22. Python Backdoor Threat Analysis Following an AI Deepfake Impersonation Campaign

    A sophisticated campaign linked to APT37 delivers Python-based backdoors through spear-phishing emails containing malicious LNK files disguised as legitimate documents. Attackers use themes including airline e-tickets, North Korea research invitations, and impersonation of defense and police officials to induce execution. The LNK files employ environment variable-based obfuscation techniques to download additional BAT files, which establish a Python runtime environment and execute compiled Python bytecode disguised with .cat extensions. The malware functions as a remote command execution backdoor, communicating with C2 servers to receive commands and exfiltrate results. Persistence is maintained through scheduled tasks executing at one-minute intervals. The campaign shows strong tactical similarities to previous APT37 operations, including infrastructure patterns, script obfuscation methods, and the abuse of legitimate tools.

    Pulse ID: 6a04a9a090a64de310cb0568
    Pulse Link: otx.alienvault.com/pulse/6a04a
    Pulse Author: AlienVault
    Created: 2026-05-13 16:41:04

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #APT37 #BackDoor #CyberSecurity #Email #InfoSec #Korea #LNK #Malware #NorthKorea #OTX #OpenThreatExchange #Phishing #Python #RAT #RemoteCommandExecution #SpearPhishing #bot #AlienVault

  23. Python Backdoor Threat Analysis Following an AI Deepfake Impersonation Campaign

    A sophisticated campaign linked to APT37 delivers Python-based backdoors through spear-phishing emails containing malicious LNK files disguised as legitimate documents. Attackers use themes including airline e-tickets, North Korea research invitations, and impersonation of defense and police officials to induce execution. The LNK files employ environment variable-based obfuscation techniques to download additional BAT files, which establish a Python runtime environment and execute compiled Python bytecode disguised with .cat extensions. The malware functions as a remote command execution backdoor, communicating with C2 servers to receive commands and exfiltrate results. Persistence is maintained through scheduled tasks executing at one-minute intervals. The campaign shows strong tactical similarities to previous APT37 operations, including infrastructure patterns, script obfuscation methods, and the abuse of legitimate tools.

    Pulse ID: 6a04a9a090a64de310cb0568
    Pulse Link: otx.alienvault.com/pulse/6a04a
    Pulse Author: AlienVault
    Created: 2026-05-13 16:41:04

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #APT37 #BackDoor #CyberSecurity #Email #InfoSec #Korea #LNK #Malware #NorthKorea #OTX #OpenThreatExchange #Phishing #Python #RAT #RemoteCommandExecution #SpearPhishing #bot #AlienVault

  24. Python Backdoor Threat Analysis Following an AI Deepfake Impersonation Campaign

    A sophisticated campaign linked to APT37 delivers Python-based backdoors through spear-phishing emails containing malicious LNK files disguised as legitimate documents. Attackers use themes including airline e-tickets, North Korea research invitations, and impersonation of defense and police officials to induce execution. The LNK files employ environment variable-based obfuscation techniques to download additional BAT files, which establish a Python runtime environment and execute compiled Python bytecode disguised with .cat extensions. The malware functions as a remote command execution backdoor, communicating with C2 servers to receive commands and exfiltrate results. Persistence is maintained through scheduled tasks executing at one-minute intervals. The campaign shows strong tactical similarities to previous APT37 operations, including infrastructure patterns, script obfuscation methods, and the abuse of legitimate tools.

    Pulse ID: 6a04a9a090a64de310cb0568
    Pulse Link: otx.alienvault.com/pulse/6a04a
    Pulse Author: AlienVault
    Created: 2026-05-13 16:41:04

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #APT37 #BackDoor #CyberSecurity #Email #InfoSec #Korea #LNK #Malware #NorthKorea #OTX #OpenThreatExchange #Phishing #Python #RAT #RemoteCommandExecution #SpearPhishing #bot #AlienVault

  25. Rok temu, w maju 2025, ktoś już wykorzystał błędy w architekturze sprzedaży biletów Orientarium ZOO Łódź. Sam Administrator potwierdził kampanię phishingową na domenie `orientarium-lodz.sbs` - podrobiony komponent sklepowy BASE, ten sam wzór maila, ten sam mechanizm zbierania danych, który zgłosiłem do @UODO

    dadalo.pl/tech/anatomia-ryzyk-

    DW: @zaufanatrzeciastrona @niebezpiecznik_pl

    #cybersecurity #Polska #Łódź #Lodz
    #UODO #RODO #cyberbezpieczeństwo #phishing

  26. «Phishing durch KI setzt Nutzer zunehmend unter Druck:
    Moderne Phishing Angriffe werden durch künstliche Intelligenz immer schwerer erkennbar. Unternehmen und Plattformen reagieren mit neuen Sicherheitsfunktionen.»

    Ach guck, die IT-Sicherheit und deren Gefahr durch kriminellen Einsatz der KI und deren Schutz davor, u.a .durch Passkeys, nun auch in den online Boulevard News.

    📰 nau.ch/news/digital/phishing-d

    #aislop #itsicherheit #passkeys #itsec #online #boulevard #phishing #nauch #it

  27. «Phishing durch KI setzt Nutzer zunehmend unter Druck:
    Moderne Phishing Angriffe werden durch künstliche Intelligenz immer schwerer erkennbar. Unternehmen und Plattformen reagieren mit neuen Sicherheitsfunktionen.»

    Ach guck, die IT-Sicherheit und deren Gefahr durch kriminellen Einsatz der KI und deren Schutz davor, u.a .durch Passkeys, nun auch in den online Boulevard News.

    📰 nau.ch/news/digital/phishing-d

    #aislop #itsicherheit #passkeys #itsec #online #boulevard #phishing #nauch #it

  28. «Phishing durch KI setzt Nutzer zunehmend unter Druck:
    Moderne Phishing Angriffe werden durch künstliche Intelligenz immer schwerer erkennbar. Unternehmen und Plattformen reagieren mit neuen Sicherheitsfunktionen.»

    Ach guck, die IT-Sicherheit und deren Gefahr durch kriminellen Einsatz der KI und deren Schutz davor, u.a .durch Passkeys, nun auch in den online Boulevard News.

    📰 nau.ch/news/digital/phishing-d

    #aislop #itsicherheit #passkeys #itsec #online #boulevard #phishing #nauch #it

  29. «Phishing durch KI setzt Nutzer zunehmend unter Druck:
    Moderne Phishing Angriffe werden durch künstliche Intelligenz immer schwerer erkennbar. Unternehmen und Plattformen reagieren mit neuen Sicherheitsfunktionen.»

    Ach guck, die IT-Sicherheit und deren Gefahr durch kriminellen Einsatz der KI und deren Schutz davor, u.a .durch Passkeys, nun auch in den online Boulevard News.

    📰 nau.ch/news/digital/phishing-d

    #aislop #itsicherheit #passkeys #itsec #online #boulevard #phishing #nauch #it

  30. «Phishing durch KI setzt Nutzer zunehmend unter Druck:
    Moderne Phishing Angriffe werden durch künstliche Intelligenz immer schwerer erkennbar. Unternehmen und Plattformen reagieren mit neuen Sicherheitsfunktionen.»

    Ach guck, die IT-Sicherheit und deren Gefahr durch kriminellen Einsatz der KI und deren Schutz davor, u.a .durch Passkeys, nun auch in den online Boulevard News.

    📰 nau.ch/news/digital/phishing-d

    #aislop #itsicherheit #passkeys #itsec #online #boulevard #phishing #nauch #it

  31. Raport Nimblr: Na 10 krajów Polska wypada najlepiej w testach phishingu. Średni wskaźnik kliknięć w symulowane wiadomości phishingowe wynosi w Polsce 3,4% – wynika z badania firmy Nimblr. To najlepszy wynik spośród... linuxiarze.pl/raport-nimblr-na #cybersecurity #cyberattack #phishing

  32. Raport Nimblr: Na 10 krajów Polska wypada najlepiej w testach phishingu. Średni wskaźnik kliknięć w symulowane wiadomości phishingowe wynosi w Polsce 3,4% – wynika z badania firmy Nimblr. To najlepszy wynik spośród... linuxiarze.pl/raport-nimblr-na #cybersecurity #cyberattack #phishing

  33. Raport Nimblr: Na 10 krajów Polska wypada najlepiej w testach phishingu. Średni wskaźnik kliknięć w symulowane wiadomości phishingowe wynosi w Polsce 3,4% – wynika z badania firmy Nimblr. To najlepszy wynik spośród... linuxiarze.pl/raport-nimblr-na #cybersecurity #cyberattack #phishing

  34. Raport Nimblr: Na 10 krajów Polska wypada najlepiej w testach phishingu. Średni wskaźnik kliknięć w symulowane wiadomości phishingowe wynosi w Polsce 3,4% – wynika z badania firmy Nimblr. To najlepszy wynik spośród... linuxiarze.pl/raport-nimblr-na #cybersecurity #cyberattack #phishing

  35. Raport Nimblr: Na 10 krajów Polska wypada najlepiej w testach phishingu. Średni wskaźnik kliknięć w symulowane wiadomości phishingowe wynosi w Polsce 3,4% – wynika z badania firmy Nimblr. To najlepszy wynik spośród... linuxiarze.pl/raport-nimblr-na #cybersecurity #cyberattack #phishing

  36. Phishing infrastructure attacks transport and government services in the UAE

    Pulse ID: 6a02d710c4d36779bdca052f
    Pulse Link: otx.alienvault.com/pulse/6a02d
    Pulse Author: Tr1sa111
    Created: 2026-05-12 07:30:24

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #Government #InfoSec #OTX #OpenThreatExchange #Phishing #UAE #bot #Tr1sa111

  37. Inside a phishing panel

    Pulse ID: 6a02ae2646130ca477596d9b
    Pulse Link: otx.alienvault.com/pulse/6a02a
    Pulse Author: Tr1sa111
    Created: 2026-05-12 04:35:50

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #InfoSec #OTX #OpenThreatExchange #Phishing #bot #Tr1sa111