home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 1,018 of 2,445   
   Mike Powell to All   
   Morphing phishing campaig   
   29 Mar 25 08:39:00   
   
   TZUTC: -0500   
   MSGID: 743.consprcy@1:2320/105 2c4d32b5   
   PID: Synchronet 3.20a-Linux master/acc19483f Apr 26 202 GCC 12.2.0   
   TID: SBBSecho 3.20-Linux master/acc19483f Apr 26 2024 23:04 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   This new phishing campaign can tailor its messages to target you with your   
   favorite businesses   
      
   Date:   
   Fri, 28 Mar 2025 15:03:00 +0000   
      
   Description:   
   Security researchers from Infoblox found a new phishing kit called Morphing   
   Meerkat.   
      
   FULL STORY   
      
   Cybercriminals have created a new technique to serve phishing emails to   
   business users which are almost indistinguishable from legitimate messages.    
      
   Cybersecurity researchers Infoblox spotted the Phishing-as-a-Service (PhaaS)   
   kit, built by a threat actor dubbed Morphing Meerkat, which deploys DNS Mail   
   exchange (MX) records, dynamically serving fake login pages.    
      
   The technique allows them to spoof more than 100 different brands, making it   
   quite a potent offering for cybercriminals.    
      
   Morphing Meerkats PhaaS platform and phishing kits are unique compared to   
   others because they dynamically serve phishing login webpages based on the    
   DNS MX record of each victims email domain, the researchers explained, saying   
   that it lets the attackers display web content strongly related to the    
   victims email service provider.    
      
   The overall phishing experience feels natural because the design of the   
   landing page is consistent with the spam emails message, they added.    
      
   Morphing Meerkat hasnt exactly drawn much attention to itself yet, which    
   might sound rather surprising given the fact that it sent thousands of spam   
   emails from servers mostly located in the UK and the United States.    
      
   However, the researchers said the operation is difficult to detect at scale,   
   since the attackers know where security blind spots are, and have been   
   exploiting them via open redirects on adtech, DoH communication, and popular   
   file-sharing services.    
      
   To protect themselves, organizations should add a strong layer of DNS    
   security to their systems, Infoblox concludes, which includes tightening DNS   
   controls and not allowing users to communicate with DoH servers.    
      
   If companies can reduce the number of unimportant services in their network,   
   they can reduce their attack surface, giving few options to cybercriminals    
   for threat delivery, Infoblox concluded.   
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/security/this-new-phishing-campaign-can-tailor-i   
   ts-messages-to-target-you-with-your-favorite-businesses   
      
   $$   
   --- SBBSecho 3.20-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/305 153/7715 154/110 218/700 226/30   
   SEEN-BY: 227/114 229/110 111 114 206 300 307 317 400 426 428 470 664   
   SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 712/848 902/26 2320/0 105 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca