toad.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server operated by David Troy, a tech pioneer and investigative journalist addressing threats to democracy. Thoughtful participation and discussion welcome.

Administered by:

Server stats:

335
active users

#malicious

1 post1 participant0 posts today

🚨 New #ClickFix scam targets US users with fake MS Defender and CloudFlare pages.
⚠️ The scam page is hosted on a domain registered back in 2006, pretending to be the Indo-American Chamber of Commerce.
🎯 The #phishing page loads only for US-based victims, as observed during analysis with a residential IP in #ANYRUN Sandbox.

👨‍💻 Analysis session: app.any.run/browses/50395c46-4

📍 URL: iaccindia[.]com
The page hijacks the full-screen mode and displays a fake “Windows Defender Security Center” popup.

🎭 It mimics the Windows UI, locks the screen, and displays urgent messages to panic the user.

Victims are prompted to call a fake tech support number (+1-…), setting the stage for further exploitation.

🎣 The phishing page may also display a fake CloudFlare message tricking users to execute a #malicious Run command.
Take a look: app.any.run/tasks/e83a5861-600

#IOCs:
supermedicalhospital[.]com
adflowtube[.]com
knowhouze[.]com
ecomicrolab[.]com
javascripterhub[.]com
virtual[.]urban-orthodontics[.]com

Streamline threat analysis for your SOC with #ANYRUN 🚀
#ExploreWithANYRUN

"We put a big tariff on Europe. They are coming to the table. They want to talk, but there's no talk unless they pay us a lot of money on a yearly basis. Number one for present but also for past because they’ve taken a lot of our wealth." - #Trump yesterday.

I'm beginning to think that we've accidentally ended up as extras in a bad movie satire. 😳 🤦‍♀️

In German: Bäh, macht das weg! Das ist eklig! 🤢

🚨 Fake Booking.com phishing pages used to deliver malware and steal data
⚠️ Attackers use #cybersquatting, mimicking Booking website to create legitimate-looking phishing pages that trick users into executing malicious actions.
Leveraging #ANYRUN's interactivity, security professionals can follow the entire infection chain and gather #IOCs.

👨‍💻 Case 1: The user is instructed to open the Run tool by pressing Win + R, then Ctrl + V to paste the script, and hit Enter. This sequence of actions executes a #malicious script that downloads and runs malware, in this case, #XWorm.
Take a look at the analysis: app.any.run/tasks/61fd06c8-233

🔍 TI Lookup request to find domains, IPs, and analysis sessions related to this campaign:
intelligence.any.run/analysis/

🎯 Use this search query to find more examples of this fake #CAPTCHA technique and enhance your organization's security response:
intelligence.any.run/analysis/

👨‍💻 Case 2: In this scenario, threat actors aim to steal victims’ banking information. It’s a typical phishing site that mimics Booking website and, after a few steps, prompts users to enter their card details to ‘verify’ their stay.
See example: app.any.run/tasks/87c49110-90f

📌 A key domain in this campaign, Iili[.]io, was also used by #Tycoon2FA #phishkit.
🔍 Use this TI Lookup query to find more examples:
intelligence.any.run/analysis/

Investigate the latest #malware and #phishing attacks with #ANYRUN 🚀

→ ChatGPT search tool vulnerable to manipulation and deception, tests show
theguardian.com/technology/202

“[I]f the current ChatGPT search system was released fully in its current state, there could be a "high risk" of people creating websites specifically geared towards deceiving users.”

“A security researcher has also found that ChatGPT can return malicious code from websites it searches.”

Continued thread

"into communicating with a #malicious WhatsApp relay server controlled by NSO.

A third exploit developed by NSO, revealed in the documents, was called “Erised,” a so-called “zero-click” exploit that could compromise a victim’s phone without any interaction from the victim. WhatsApp blocked the use of NSO’s Erised exploit in May 2020, several months after WhatsApp had filed its #lawsuit."

Trying something new with #GitHub and posting my spam #UCE #UBE and suspect / #malicious #emails and their associated attachments. Putting everything in a #mastodon post was problematic with space limitations, and was hard to find/organize/search.

Providing the redacted headers and URLs to the malware sandboxes used:

github.com/obrientg/Analysis/b

Received two (2) of the same samples, with different file names & hashes but the same detection of JS/Phish.AAL
Both were sent to the email address I use for threat intel & incident response collaboration efforts.
Email SRC on both was Google Cloud (#GCP) with an #openproxy, abuse reporting submitted.

#MD5 5cf33dd39d6db60423ac89fd63e5f500
#SHA1 863c95b7e7ff0bb8299cbae93dfaed12cc619332
#SHA256 c4e40b137e43c89261ee89a34db843477a8c994a21a92c98c7b15193face8c35

#MD5 8a9af78b0a4cdade6df9f71e7e5b1362
#SHA1 b03fdf0891adacc1995fdd1e2f043343c20a45e5
#SHA256 317aaea9d9ef39c9b85b9ce6e0f68ec83a06b2f3298aded981b19063b2f44737

#malware #incidentResponse #malwareAnalysis
#InfoSec #informationSecurity #cybersecurity #cyberz #cyber #cybercrime
#phish #phishing
#threatIntel #IoC #threatIntelligence #cyberthreatintelligence #CTI

GitHubAnalysis/Fri, 25 Oct 2024 JS Phish.AAL at main · obrientg/Analysisdocumenting alaysis of suspect & malicious emails and their attachements - obrientg/Analysis

Seriously, this should be law.

  • "[...] 2.12 The web can be consumed in any way that people choose

  • People must be able to change web pages according to their needs. For example, people should be able to install style sheets, assistive browser extensions, and blockers of unwanted content or scripts. We will build features and write specifications that respect peoples' agency, and will create user agents to represent those preferences on the web user's behalf. [...]"

And slso the entire rest of the code