Detected #KongTuke infection chain
Compromised site
-->
keneedy[.]lol/file.js (ClickFucker)
-->
keneedy[.]lol/api/v1/session (token)
-->
keneedy[.]lol/api/v1/verify (gateway)
-->
keneedy[.]lol/api/v1/status (clipboard)
Detected #KongTuke infection chain
Compromised site
-->
keneedy[.]lol/file.js (ClickFucker)
-->
keneedy[.]lol/api/v1/session (token)
-->
keneedy[.]lol/api/v1/verify (gateway)
-->
keneedy[.]lol/api/v1/status (clipboard)
Detected #KongTuke infection chain
Compromised site
-->
reynoldy[.]lol/file.js (ClickFucker)
-->
reynoldy[.]lol/api/v1/session (token)
-->
reynoldy[.]lol/api/v1/verify (gateway)
-->
reynoldy[.]lol/api/v1/status (clipboard)
Detected #KongTuke infection chain
Compromised site
-->
abernaehy[.]lol/file.js (ClickFucker)
-->
abernaehy[.]lol/api/v1/session (token)
-->
abernaehy[.]lol/api/v1/verify (gateway)
-->
abernaehy[.]lol/api/v1/status (clipboard)
Detected #KongTuke infection chain
Compromised site
-->
correia[.]lol/file.js (ClickFucker)
-->
correia[.]lol/api/v1/session (token)
-->
correia[.]lol/api/v1/verify (gateway)
-->
correia[.]lol/api/v1/status (clipboard)
-->
k020e5b3g0h[.]com/d (tar)
66a344904e9e2f3042cb2e186c7a6809724eb961308abb4f396c420f1c784b91 d
#KongTuke hackers now use #Microsoft #Teams for corporate breaches
Detected #KongTuke infection chain
Compromised site
-->
correia[.]lol/file.js (ClickFucker)
-->
correia[.]lol/api/v1/session (token)
-->
correia[.]lol/api/v1/verify (gateway)
-->
correia[.]lol/api/v1/status (clipboard)
-->
qiig7t2nzog[.]com/d (tar)
833a0e0ed8bc34a1af0fbb43c56f7bea2c73dde2295f4df2e2c27011d70f52fa d
Detected #KongTuke infection chain
Compromised site
-->
correia[.]lol/file.js (ClickFucker)
-->
correia[.]lol/api/v1/session (token)
-->
correia[.]lol/api/v1/verify (gateway)
-->
correia[.]lol/api/v1/status (clipboard)
KongTuke Hackers Exploit Microsoft Teams for Rapid Corporate Breaches
KongTuke hackers have found a lightning-fast way to breach corporations, exploiting Microsoft Teams to go from initial contact to persistent foothold in under five minutes. This alarming new tactic is part of KongTuke's evolving social engineering toolkit, complementing its previous web-based attacks.
#MicrosoftTeams #Kongtuke #SocialEngineering #InitialAccessBroker #EmergingThreats
Detected #KongTuke infection chain
Compromised site
-->
bradtte[.]lol/file.js (ClickFucker)
-->
bradtte[.]lol/api/v1/session (token)
-->
bradtte[.]lol/api/v1/verify (gateway)
-->
bradtte[.]lol/api/v1/status (clipboard)
Detected #KongTuke infection chain
Compromised site
-->
bradtte[.]lol/file.js (ClickFucker)
-->
bradtte[.]lol/api/v1/session (token)
-->
bradtte[.]lol/api/v1/verify (gateway)
-->
bradtte[.]lol/api/v1/status (clipboard)
-->
1eh2e3taw3g[.]com/d (tar)
3aaae158a84409dbc3202b174005ed9acf39ca7f3785dbff07c56be928ff011f d