Get a Pentest and security assessment of your IT network.

News

The Business of Phishing

Examining the quarantined mail on the server revealed some interesting details starting from the mail header itself. These phish kits are archives which just need to be extracted to a compromised server. All a cybercriminal needs to do is edit one of the files in that package and input a mail address where harvested information should be sent to. The twist is not only does the information get sent to the designated email address, but to another cybercriminal as well. Less experienced bad guys might not realize that they re sharing their ill-gotten gains with other, more technically savvy, blackhats.

Source: https://threatpost.com/business-phishing-101309/72250/

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

Uber to pay $20,000 in settlement on privacy issues with New York attorney general

News

ICS security: Popular building management system vulnerable to takeover