home.social

#spam — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #spam, aggregated by home.social.

  1. Dear bot posing as "Emma Kate",

    I've spent some time reading your mail and really liked how you sent it to the completely wrong guy, because the app you mention is not by me.

    I would have liked to look at a few examples of animated explainer videos that resonate with someone, but you not only mixed up your recipients, but also forgot to link to your own page.

    I still had a look at it, and found the combination of laggy animations and at least three different graphic styles lacking.

  2. Google prueba reducir el almacenamiento gratuito de Gmail a 5 GB

    Durante años, abrir una cuenta de Gmail fue sinónimo de recibir automáticamente 15 GB de almacenamiento gratuito compartido entre Gmail, Google Drive y Google Fotos. Esa regla podría estar cambiando. Google estaría probando un nuevo esquema en el que las cuentas de Gmail recién creadas solo reciben 5 GB de almacenamiento gratuito, con la opción de desbloquear los 15 GB completos si el usuario añade un número de teléfono a su cuenta (Fuente Reddit).


    El hallazgo lo hizo público un usuario de Reddit identificado como sungusungu. Según la captura compartida, Google le presentó un mensaje de «revisión de opciones de almacenamiento» donde le ofrecía pasar de 5 GB a 15 GB gratuitos a cambio de agregar su número de teléfono. (Apple World) La comunidad no tardó en reaccionar con escepticismo: varios usuarios interpretaron el movimiento como una nueva forma que tiene Google de recolectar datos de sus usuarios, aunque otros señalaron que el requisito del teléfono podría tener como objetivo reducir la creación masiva de cuentas spam.


    Lo que sigue siendo una incógnita es el alcance real del cambio. No está claro si se trata de una modificación en proceso de implementación o de un test A/B limitado a ciertas regiones. Google no ha anunciado ningún cambio oficial, y su página de soporte todavía indica que cada cuenta recibe 15 GB de almacenamiento gratuito. (Apple World) El periodista que cubrió la noticia intentó replicar el experimento creando una nueva cuenta, pero Google directamente le impidió continuar el registro sin ingresar un número de teléfono, mientras que su cuenta alternativa sin número vinculado seguía mostrando los 15 GB habituales.


    Sea un test o el inicio de un rollout, la señal es clara: Google está explorando maneras de vincular el almacenamiento gratuito a la identidad verificada del usuario. Para millones de personas que dependen del ecosistema de Google en su vida cotidiana y laboral, la posibilidad de que los 15 GB gratuitos dejen de ser un derecho automático para convertirse en un beneficio condicionado representa un cambio de reglas de juego significativo. Google no ha respondido hasta el momento a las consultas de los medios.

    #Almacenamiento #cloudStorage #CuentaGoogle #DatosPersonales #gmail #google #GoogleDrive #GoogleFotos #GoogleOne #NovedadesTech #nube #PORTADA #privacidad #seguridadDigital #spam #tecnologia
  3. SYSLOG://THREADS.NULL
    Spam overflow corrupted timeline sector. Deleted Threads node after final bot swarm attack. Notification silence restored. Digital landfill quarantined.

    #spam #threads #bots #cleanup #social

  4. SYSLOG://THREADS.NULL
    Spam overflow corrupted timeline sector. Deleted Threads node after final bot swarm attack. Notification silence restored. Digital landfill quarantined.

    #spam #threads #bots #cleanup #social

  5. SYSLOG://THREADS.NULL
    Spam overflow corrupted timeline sector. Deleted Threads node after final bot swarm attack. Notification silence restored. Digital landfill quarantined.

    #spam #threads #bots #cleanup #social

  6. SYSLOG://THREADS.NULL
    Spam overflow corrupted timeline sector. Deleted Threads node after final bot swarm attack. Notification silence restored. Digital landfill quarantined.

    #spam #threads #bots #cleanup #social

  7. SYSLOG://THREADS.NULL
    Spam overflow corrupted timeline sector. Deleted Threads node after final bot swarm attack. Notification silence restored. Digital landfill quarantined.

    #spam #threads #bots #cleanup #social

  8. This is something that's actually forbidden in our country

    companies may not call random numbers just to spam them.

    To compensate for that luxury, the main internet and POTS provider let's companies pay them to spam us with SMS!

    This is also disallowed by law but no one seems to bother to file a class action suit against this company

    Those spam SMS you can easily block though

    @rl_dane

    #Spam #privacy #InfoSec

  9. if you're sending me a cold email or a cold message, for the love of god, be short and sweet and directly ask what you gotta ask

    skip the big words

    cut to the chase. prune fluff.

    let's not waste each other's time.

    please. pretty please.

    #colddm #dm #social #email #coldemail #spam #noise

  10. In letzter Zeit häufen sich diese Art E-Mails. Was soll ich davon halten? Ist doch sicher ein Love Scam. Aber wer antwortet denn da? Schreibt da jemand zurück: „Hey Susan, toll, dass du dich meldest“? Meine Geschlechtsgenossen werden da aber bestimmt rollig. 🤡

    Kein Link, keine Angebote, keine Anhänge, nur Text, nichts eingebettet.

    #spam #fishing

  11. A silver lining as our information systems melt down because of AI: spam is getting dumber, too.

    The opening of two different emails this morning:

    "You have been invited to join Norton-Anty virus charge 365 USD This charge will be auto-debited from your account"

    "Dear Customer, Your N0r_t0n Protection Plan (Plan ID: NT85-ERT2) is now active."

    #ai #spam #slop

  12. A silver lining as our information systems melt down because of AI: spam is getting dumber, too.

    The opening of two different emails this morning:

    "You have been invited to join Norton-Anty virus charge 365 USD This charge will be auto-debited from your account"

    "Dear Customer, Your N0r_t0n Protection Plan (Plan ID: NT85-ERT2) is now active."

    #ai #spam #slop

  13. A silver lining as our information systems melt down because of AI: spam is getting dumber, too.

    The opening of two different emails this morning:

    "You have been invited to join Norton-Anty virus charge 365 USD This charge will be auto-debited from your account"

    "Dear Customer, Your N0r_t0n Protection Plan (Plan ID: NT85-ERT2) is now active."

  14. A silver lining as our information systems melt down because of AI: spam is getting dumber, too.

    The opening of two different emails this morning:

    "You have been invited to join Norton-Anty virus charge 365 USD This charge will be auto-debited from your account"

    "Dear Customer, Your N0r_t0n Protection Plan (Plan ID: NT85-ERT2) is now active."

    #ai #spam #slop

  15. Nostr AI spam is awesome! Spam accounts are everywhere, young women. But at #Nostr, they’ve got style… I like that. #anon #ai #spam #style

  16. If you follow scientific #hashtags like entomology, ichthyolia, botany, lepidoptera etc., and get spammed with a German "japanese" #AISlop account - report it.
    Moderators won't like hashtag spamming.
    Behind the account: "Orophylia Editorial Team. Global technology analysis powered by AI and human expertise." Anonymous ...

    And of course, I blocked it after reporting: I want a timeline free of AI slop pretending to make "art" with the stolen training 'material' by real human artists!

    #noAI #spam

  17. The funny thing is, the #spam scammers are not subtle, at all, in fact they are very dumb; their game is super repetitive, and the #fediverse is probably the social media venue with the highest content of tech savvy people.

    This is not a monetized platform. There are no inherent algorithms pushing content.

    Go to #xitter, #linkedin, #facebook , #threads, or #bluesky. The dumbest of dumb are there, there are algorithms pushing content, you can pay management to push your bullshit.

  18. Spam is usually treated as something to delete.

    In my new blog post, I argue why that’s a mistake - how spam can reveal valuable insights, and how moderation enslave us.

    vitonsky.net/blog/2026/05/12/s

    #blog #post #socialmedia #social #media #spam #dating #wellbeing

  19. Apple's "Hide My Email": Useful, but hardly improved

    Apple introduced its forwarding service against spam 5 years ago. Unfortunately, you still have to click through half the system to use it.

    heise.de/en/news/Apple-s-Hide-

    #Apple #EMail #iCloud #iOS #IT #macOS #Mobiles #Spam #news

  20. Apples „E-Mail-Adresse verbergen“: Nützlich, aber leider kaum verbessert

    Bereits vor 5 Jahren hat Apple seinen Weiterleitungsdienst gegen Spam eingeführt. Leider muss man sich immer noch durchs halbe System klicken, um ihn zu nutzen.

    heise.de/news/Apples-E-Mail-Ad

    #Apple #EMail #iCloud #iOS #IT #macOS #Mobiles #Spam #news

  21. 🎉🎓Brace yourself for the epic fusion of mediocrity! #Coursera and #Udemy, in a groundbreaking move, have joined forces to bloat your email inbox with twice the #spam about courses you’ll never complete! 🤓📬
    blog.coursera.org/coursera-and #education #onlinelearning #inboxdrama #HackerNews #ngated

  22. Acabo de mandar a cagar a #Generaloptica por #spam. En trustpilot les he puesto finos...

    Te obligan a llamar por teléfono para dejar de recibir #SMS al móvil :AI_Yay: Hace 20 años me hice unas gafas allí y no vuelvo...

  23. Holy crap, how fast bluesky turned to trash, and sometimes it's almost the same type of generic trash posts like on Facebook, probably AI generated. It's not Facebook-bad but I can see it there in a year or two.

    #bluesky #mastodon #internet #spam #tech #technology

  24. #spam un peu original dans ma boîte à e-lettres : de "Monviolon Cloud Services", hihi. Parce que qui c'est le célèbre boss du cloud-service ? C'est bibi 🤪
    Évidemment, si tu as un mail en gmail, proton, tuta, infomaniak, etc. ça devient un peu plus crédible.

  25. #Spam. Spam spam spam spam spam.
    firesphere.dev/articles/spam-spam-spam-spam-spam?mtm_campaign=social&mtm_kwd=mastodon
    Protecting your #email #address by #obfuscation on your #website is pointless, in my opinion.

  26. Threat Actors Weaponize Tiflux RMMs in Malspam Attacks

    Pulse ID: 6a016038daea3ca1a2762d7b
    Pulse Link: otx.alienvault.com/pulse/6a016
    Pulse Author: Tr1sa111
    Created: 2026-05-11 04:51:04

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #InfoSec #MalSpam #OTX #OpenThreatExchange #Spam #bot #Tr1sa111

  27. @TuutW : zoals ik eerder schreef: blokkeren heeft nauwelijks tot geen zin. De meeste spammers gebruiken gehackte e-mailadressen of beschikken over een mailserver met een steeds wijzigende domeinnaam en/of wijzigend IP-adres.

    Technisch: zij zorgen er tevens voor dat zaken als SPF, DKIM en DMARC correct zijn geconfigureerd. Veel mensen denken dat dit antispam-maatregelen zijn, maar dat is onjuist. Als al die mechanismes correct zijn opgezet, verzekert die combinatie dat een e-mail met als SMTP afzender:

    <[email protected]>

    daadwerkelijk is verzonden door een mailserver die e-mail mag verzenden namens "example.com".

    Voorbeelden van afzenders van recente phishingmails die ik ontving in het plaatje hieronder.

    Een m.i. groot probleem is dat e-mail-apps op smartphones (vanwege de beperkte ruimte op het scherm) het SMTP-adres niet tonen (vaak zijn er meerdere kliks nodig om het SMTP-adres te zien te krijgen). De meeste mensen doen dat niet.

    Ik probeer straks nog een vervolg-antwoord te schrijven over gratis domeinnamen eindigend op (onder veel meer):

    .ns01.info

    Het zou mij niet verbazen als er elke dag meer dan 1 miljoen unieke domeinnamen worden gehuurd (nieuw of opnieuw in gebruik genomen).

    @apenkop

    #Spam #Spammers #Phishing #DomeinNaam #GratisDomeinNamen

  28. Yes, sir. I will submit immediately. But did you notice that

    1) the paper is already published
    2) it is about LLMs and not about Business Information Systems?

    Maybe #AI will improve the #SPAM that we get.

  29. An unknown threat actor is abusing a remote management tool called #TiFLUX as an initial access vector, targeting a broad range of potential victims by email. The attacks using this Brasil-originated commercial utility began in February, but really ramped up in April and the beginning of this month.

    The lures employ a variety of #spam tropes, including bogus event invitations and business invoices/bills.

    TiFLUX seems uniquely vulnerable to this kind of abuse; The installer package also installs an old version of UltraVNC as well as a vulnerable #loldriver that can elevate privileges. Weirdest of all, the attackers are also using this RMM to deploy other heavily-abused RMMs, including #Splashtop and #ScreenConnect to the devices that get hit. Those RMMs are connecting to IP addresses associated with known bulletproof hosts.

    This is my first post at the @huntress blog: huntress.com/blog/tiflux-rmm-i

    #malware #RMM #RogueRMM

  30. An unknown threat actor is abusing a remote management tool called #TiFLUX as an initial access vector, targeting a broad range of potential victims by email. The attacks using this Brasil-originated commercial utility began in February, but really ramped up in April and the beginning of this month.

    The lures employ a variety of #spam tropes, including bogus event invitations and business invoices/bills.

    TiFLUX seems uniquely vulnerable to this kind of abuse; The installer package also installs an old version of UltraVNC as well as a vulnerable #loldriver that can elevate privileges. Weirdest of all, the attackers are also using this RMM to deploy other heavily-abused RMMs, including #Splashtop and #ScreenConnect to the devices that get hit. Those RMMs are connecting to IP addresses associated with known bulletproof hosts.

    This is my first post at the @huntress blog: huntress.com/blog/tiflux-rmm-i

    #malware #RMM #RogueRMM

  31. An unknown threat actor is abusing a remote management tool called #TiFLUX as an initial access vector, targeting a broad range of potential victims by email. The attacks using this Brasil-originated commercial utility began in February, but really ramped up in April and the beginning of this month.

    The lures employ a variety of #spam tropes, including bogus event invitations and business invoices/bills.

    TiFLUX seems uniquely vulnerable to this kind of abuse; The installer package also installs an old version of UltraVNC as well as a vulnerable #loldriver that can elevate privileges. Weirdest of all, the attackers are also using this RMM to deploy other heavily-abused RMMs, including #Splashtop and #ScreenConnect to the devices that get hit. Those RMMs are connecting to IP addresses associated with known bulletproof hosts.

    This is my first post at the @huntress blog: huntress.com/blog/tiflux-rmm-i

    #malware #RMM #RogueRMM

  32. An unknown threat actor is abusing a remote management tool called #TiFLUX as an initial access vector, targeting a broad range of potential victims by email. The attacks using this Brasil-originated commercial utility began in February, but really ramped up in April and the beginning of this month.

    The lures employ a variety of #spam tropes, including bogus event invitations and business invoices/bills.

    TiFLUX seems uniquely vulnerable to this kind of abuse; The installer package also installs an old version of UltraVNC as well as a vulnerable #loldriver that can elevate privileges. Weirdest of all, the attackers are also using this RMM to deploy other heavily-abused RMMs, including #Splashtop and #ScreenConnect to the devices that get hit. Those RMMs are connecting to IP addresses associated with known bulletproof hosts.

    This is my first post at the @huntress blog: huntress.com/blog/tiflux-rmm-i

    #malware #RMM #RogueRMM

  33. An unknown threat actor is abusing a remote management tool called #TiFLUX as an initial access vector, targeting a broad range of potential victims by email. The attacks using this Brasil-originated commercial utility began in February, but really ramped up in April and the beginning of this month.

    The lures employ a variety of #spam tropes, including bogus event invitations and business invoices/bills.

    TiFLUX seems uniquely vulnerable to this kind of abuse; The installer package also installs an old version of UltraVNC as well as a vulnerable #loldriver that can elevate privileges. Weirdest of all, the attackers are also using this RMM to deploy other heavily-abused RMMs, including #Splashtop and #ScreenConnect to the devices that get hit. Those RMMs are connecting to IP addresses associated with known bulletproof hosts.

    This is my first post at the @huntress blog: huntress.com/blog/tiflux-rmm-i

    #malware #RMM #RogueRMM

  34. Has anyone else here noticed a huge surge lately in spam phone calls involving home insulation scams?
    Most of the numbers (apparently) have Scottish area codes but in the past couple of days I started getting the same nonsensical obviously recorded messages from (apparently) mobile numbers.
    I assume that all these numbers are spoofed and that the calls actually originate outside the UK(?)
    #UK #spam #PhoneSpam #scam #scams #HomeInsulationScam

  35. Has anyone else here noticed a huge surge lately in spam phone calls involving home insulation scams?
    Most of the numbers (apparently) have Scottish area codes but in the past couple of days I started getting the same nonsensical obviously recorded messages from (apparently) mobile numbers.
    I assume that all these numbers are spoofed and that the calls actually originate outside the UK(?)
    #UK #spam #PhoneSpam #scam #scams #HomeInsulationScam

  36. Has anyone else here noticed a huge surge lately in spam phone calls involving home insulation scams?
    Most of the numbers (apparently) have Scottish area codes but in the past couple of days I started getting the same nonsensical obviously recorded messages from (apparently) mobile numbers.
    I assume that all these numbers are spoofed and that the calls actually originate outside the UK(?)
    #UK #spam #PhoneSpam #scam #scams #HomeInsulationScam

  37. Has anyone else here noticed a huge surge lately in spam phone calls involving home insulation scams?
    Most of the numbers (apparently) have Scottish area codes but in the past couple of days I started getting the same nonsensical obviously recorded messages from (apparently) mobile numbers.
    I assume that all these numbers are spoofed and that the calls actually originate outside the UK(?)
    #UK #spam #PhoneSpam #scam #scams #HomeInsulationScam

  38. PCPJack | Cloud Worm Evicts TeamPCP and Steals Credentials at Scale

    PCPJack is a sophisticated credential theft framework that propagates across exposed cloud infrastructure while systematically removing artifacts linked to TeamPCP, a threat actor behind notable 2026 supply chain compromises. The toolset harvests credentials from cloud platforms, containers, developer tools, productivity applications, and financial services, exfiltrating data through attacker-controlled infrastructure. It targets exposed Docker, Kubernetes, Redis, MongoDB, RayML services and vulnerable web applications, enabling external propagation and lateral movement. Unlike typical cloud malware, PCPJack deploys no cryptominers, focusing instead on credential theft for monetization through fraud, spam campaigns, extortion, or access resale. The framework uses modular Python scripts orchestrated by a central component, employs Common Crawl data for target selection, and utilizes Telegram for command and control communications.

    Pulse ID: 69fd0520d3687243cca2f973
    Pulse Link: otx.alienvault.com/pulse/69fd0
    Pulse Author: AlienVault
    Created: 2026-05-07 21:33:20

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Cloud #CryptoMiner #CyberSecurity #Docker #Extortion #InfoSec #Malware #OTX #OpenThreatExchange #Python #RAT #Redis #Spam #SupplyChain #Telegram #Troll #Worm #bot #AlienVault

  39. PCPJack | Cloud Worm Evicts TeamPCP and Steals Credentials at Scale

    PCPJack is a sophisticated credential theft framework that propagates across exposed cloud infrastructure while systematically removing artifacts linked to TeamPCP, a threat actor behind notable 2026 supply chain compromises. The toolset harvests credentials from cloud platforms, containers, developer tools, productivity applications, and financial services, exfiltrating data through attacker-controlled infrastructure. It targets exposed Docker, Kubernetes, Redis, MongoDB, RayML services and vulnerable web applications, enabling external propagation and lateral movement. Unlike typical cloud malware, PCPJack deploys no cryptominers, focusing instead on credential theft for monetization through fraud, spam campaigns, extortion, or access resale. The framework uses modular Python scripts orchestrated by a central component, employs Common Crawl data for target selection, and utilizes Telegram for command and control communications.

    Pulse ID: 69fd0520d3687243cca2f973
    Pulse Link: otx.alienvault.com/pulse/69fd0
    Pulse Author: AlienVault
    Created: 2026-05-07 21:33:20

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Cloud #CryptoMiner #CyberSecurity #Docker #Extortion #InfoSec #Malware #OTX #OpenThreatExchange #Python #RAT #Redis #Spam #SupplyChain #Telegram #Troll #Worm #bot #AlienVault

  40. PCPJack | Cloud Worm Evicts TeamPCP and Steals Credentials at Scale

    PCPJack is a sophisticated credential theft framework that propagates across exposed cloud infrastructure while systematically removing artifacts linked to TeamPCP, a threat actor behind notable 2026 supply chain compromises. The toolset harvests credentials from cloud platforms, containers, developer tools, productivity applications, and financial services, exfiltrating data through attacker-controlled infrastructure. It targets exposed Docker, Kubernetes, Redis, MongoDB, RayML services and vulnerable web applications, enabling external propagation and lateral movement. Unlike typical cloud malware, PCPJack deploys no cryptominers, focusing instead on credential theft for monetization through fraud, spam campaigns, extortion, or access resale. The framework uses modular Python scripts orchestrated by a central component, employs Common Crawl data for target selection, and utilizes Telegram for command and control communications.

    Pulse ID: 69fd0520d3687243cca2f973
    Pulse Link: otx.alienvault.com/pulse/69fd0
    Pulse Author: AlienVault
    Created: 2026-05-07 21:33:20

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Cloud #CryptoMiner #CyberSecurity #Docker #Extortion #InfoSec #Malware #OTX #OpenThreatExchange #Python #RAT #Redis #Spam #SupplyChain #Telegram #Troll #Worm #bot #AlienVault

  41. PCPJack | Cloud Worm Evicts TeamPCP and Steals Credentials at Scale

    PCPJack is a sophisticated credential theft framework that propagates across exposed cloud infrastructure while systematically removing artifacts linked to TeamPCP, a threat actor behind notable 2026 supply chain compromises. The toolset harvests credentials from cloud platforms, containers, developer tools, productivity applications, and financial services, exfiltrating data through attacker-controlled infrastructure. It targets exposed Docker, Kubernetes, Redis, MongoDB, RayML services and vulnerable web applications, enabling external propagation and lateral movement. Unlike typical cloud malware, PCPJack deploys no cryptominers, focusing instead on credential theft for monetization through fraud, spam campaigns, extortion, or access resale. The framework uses modular Python scripts orchestrated by a central component, employs Common Crawl data for target selection, and utilizes Telegram for command and control communications.

    Pulse ID: 69fd0520d3687243cca2f973
    Pulse Link: otx.alienvault.com/pulse/69fd0
    Pulse Author: AlienVault
    Created: 2026-05-07 21:33:20

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Cloud #CryptoMiner #CyberSecurity #Docker #Extortion #InfoSec #Malware #OTX #OpenThreatExchange #Python #RAT #Redis #Spam #SupplyChain #Telegram #Troll #Worm #bot #AlienVault

  42. PCPJack | Cloud Worm Evicts TeamPCP and Steals Credentials at Scale

    PCPJack is a sophisticated credential theft framework that propagates across exposed cloud infrastructure while systematically removing artifacts linked to TeamPCP, a threat actor behind notable 2026 supply chain compromises. The toolset harvests credentials from cloud platforms, containers, developer tools, productivity applications, and financial services, exfiltrating data through attacker-controlled infrastructure. It targets exposed Docker, Kubernetes, Redis, MongoDB, RayML services and vulnerable web applications, enabling external propagation and lateral movement. Unlike typical cloud malware, PCPJack deploys no cryptominers, focusing instead on credential theft for monetization through fraud, spam campaigns, extortion, or access resale. The framework uses modular Python scripts orchestrated by a central component, employs Common Crawl data for target selection, and utilizes Telegram for command and control communications.

    Pulse ID: 69fd0520d3687243cca2f973
    Pulse Link: otx.alienvault.com/pulse/69fd0
    Pulse Author: AlienVault
    Created: 2026-05-07 21:33:20

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Cloud #CryptoMiner #CyberSecurity #Docker #Extortion #InfoSec #Malware #OTX #OpenThreatExchange #Python #RAT #Redis #Spam #SupplyChain #Telegram #Troll #Worm #bot #AlienVault

  43. Threat Actors Weaponize Tiflux RMMs in Malspam Attacks

    Since late February, there has been an uptick in incidents involving Tiflux, a lesser-known Brazilian commercial remote management tool being weaponized by threat actors. The attack chain begins with phishing emails containing fake document lures that deliver a malicious MSI installer. Once executed, the installer deploys multiple remote access tools including UltraVNC, Splashtop, and ScreenConnect for persistent access. The Tiflux installer contains concerning components such as outdated VNC versions from 2014, expired certificates, hardcoded passwords, and a vulnerable HwRwDrv.sys driver known for privilege escalation abuse. The threat actors leverage these tools to establish persistence, capture screenshots, and collect system profiling information. This campaign exemplifies the continuing pattern of adversaries abusing legitimate remote management software for stealthy access to victim environments while chaining multiple tools together to maintain control.

    Pulse ID: 69fd4f31a337de81bfb907d5
    Pulse Link: otx.alienvault.com/pulse/69fd4
    Pulse Author: AlienVault
    Created: 2026-05-08 02:49:21

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Brazil #CyberSecurity #Email #InfoSec #MalSpam #OTX #OpenThreatExchange #Password #Passwords #Phishing #ScreenConnect #Spam #VNC #Word #bot #AlienVault

  44. @nuwagaba2 You asked me about it in another conversation. I already answered. I would like to add: make a table in #Excel about who you have already talked to about this, because otherwise it looks like #spam and you will be banned.