phishing tactics

AppWizard
March 25, 2025
The National Security Agency (NSA) issued an operational security bulletin in February 2025, warning employees about vulnerabilities in the encrypted messaging application Signal. This alert followed an incident where Defense Secretary Pete Hegseth accidentally shared sensitive war plans in a Signal chat shortly before U.S. military operations in Yemen. The bulletin labeled Signal as a high-value target for interception and highlighted the sophistication of Russian hacking groups using phishing tactics to breach encrypted conversations. NSA personnel were instructed not to share sensitive information via third-party messaging applications and to avoid connections with unknown individuals. National Intelligence Director Tulsi Gabbard and CIA Director John Ratcliffe testified before a Senate panel, affirming that no classified information was exchanged in the chat, but the NSA emphasized that even unclassified information should not be shared on Signal. Ratcliffe defended Signal as an approved communication tool, while both officials denied knowledge of operational details related to the military strike.
Winsage
November 12, 2024
A new phishing campaign is using an Excel file to distribute a fileless version of the Remcos Remote Access Trojan (RAT). Researchers from Fortinet found that attackers are sending purchase order emails with an Excel attachment that exploits a remote code execution vulnerability in Office (CVE-2017-0199). Activating the file downloads an HTML Application (HTA) file from a remote server, which is launched via mshta.exe.malware. Remcos can log keystrokes, capture screenshots, and execute commands on compromised systems. This variant operates without leaving traditional file traces, making detection more difficult. Email phishing is a common method for cybercriminals to infect devices and steal sensitive information. Users are advised to be cautious with emails and attachments.
Winsage
September 23, 2024
A wave of cyberattacks has emerged, utilizing phishing emails that contain HTML attachments or malicious links. When recipients interact with these emails, a Java-based Remote Access Trojan (RAT) is deployed, allowing attackers to manage the victim's file system, monitor and control processes, remotely access the desktop, transfer files, capture keystrokes, take screenshots, and activate the webcam without the user's knowledge.
AppWizard
September 7, 2024
Researchers from McAfee have identified 280 counterfeit Android apps designed to infiltrate cryptocurrency wallets. These malicious apps exploit vulnerabilities by scanning devices for images containing mnemonic phrases used for account recovery. They masquerade as legitimate services and use phishing tactics to trick users into downloading them. Once installed, the apps can access sensitive information, including: - Contacts: Extracting the entire contact list. - SMS Messages: Capturing all incoming SMS messages, including two-factor authentication codes. - Photos: Uploading stored images to attackers' servers. - Device Information: Collecting details about the device, such as operating system version and phone numbers. McAfee emphasizes the importance of vigilance and recommends that users exercise caution when installing applications and granting permissions. They also highlight the necessity of security software to protect personal devices from such threats.
Search