📢 Le NCSC teste « Proactive Notifications » pour alerter les organisations UK sur leurs vulnérabilités exposées
📝 Selon BleepingComputer, le NCSC (National C...
📖 cyberveille : https://cyberveille.ch/posts/2025-12-06-le-ncsc-teste-proactive-notifications-pour-alerter-les-organisations-uk-sur-leurs-vulnerabilites-exposees/
🌐 source : https://www.bleepingcomputer.com/news/security/ncscs-proactive-notifications-warns-orgs-of-flaws-in-exposed-devices/
#NCSC #Netcraft #Cyberveille
Le NCSC teste « Proactive Notifications » pour alerter les organisations UK sur leurs vulnérabilités exposées

Selon BleepingComputer, le NCSC (National Cyber Security Center) du Royaume‑Uni a annoncé la phase de test de « Proactive Notifications », un nouveau service d’alerte préventive destiné à informer les organisations des vulnérabilités et faiblesses de configuration observables publiquement. Le service, délivré via l’entreprise de cybersécurité Netcraft, repose sur des informations publiques et des scans Internet. Le NCSC identifiera les organisations dépourvues de services de sécurité essentiels et les contactera avec des recommandations de mises à jour ciblées pour corriger des vulnérabilités non corrigées. Les notifications peuvent porter sur des CVE spécifiques ou des problèmes généraux comme l’usage d’une chiffrement faible. Les observations se basent notamment sur les numéros de version exposés publiquement, et l’activité est menée en conformité avec le Computer Misuse Act.

CyberVeille

#Netcraft describes itself as "digital risk protection" and "Advanced Cybercrime Defense". Having been flagged by them 4 times now, and each time with an easily recognizable false positive (they also pinged our provider, which then threatened with actions – and added our domain to their blacklist right away!), I'm quite fed up with their seemingly incompetence: first shoot, then ask. All automated, obviously no humans involved on their end.

My experience so far: https://gitlab.com/-/snippets/4909577

(1/2)

Netcraft false positives, Google Safebrowsing shenanigans ($4909577) · Snippets · GitLab

GitLab.com

GitLab

Next week, I'm speaking at #Saintcon about #phishing, #smishing, #quishing (all the -ishings) and propose a broad-based possible solution that could end this problem forever. Nothing big.

If you're going to be there, you can find me in Track 2 at 2:30pm, or most of the rest of the time at the @SAINTCON @malwarevillage Community, where we will be hosting two of our contests (MARC I and BOMBE) and encouraging people to consider the field of malware analysis and threat research as a career.

We also will have minibadges, both at #MalwareVillage and at the #Netcraft booth. If you're a #minibadge fan/collector, you aren't going to want to miss out on the Netcraft minibadge, which is awesome. Just drop by the booth to get a kit to build one. Tell them Spike sent ya.

Until then, stay safe, and please tell everyone you know, don't click links to tax refunds or toll road fees you get on your phone.

/END

https://www.netcraft.com/blog/taxpayers-drivers-targeted-in-refund-and-road-toll-smishing-scams

Tax Refund & Road Toll Smishing Scams Surge Ahead of IRS Deadline

Threat actors deployed over 850 fake tax and toll websites to steal personal and financial data from U.S. and international victims. Netcraft uncovers the latest smishing campaign targeting taxpayers and drivers ahead of the October 15 IRS extension deadline.

And I just wanted to give a quick shoutout to our engineering team for noticing this bizarre trick that all of the #phishing pages do that we connect to this #LoggerEIO group.

The phishing kit in use has several pages that the victims are expected to click through. As one enters information onto the first page, then clicks a Continue button, the browser initiates a WebSocket connection with the server, and transmits the data inside of that WebSocket connection.

It isn't exactly encryption, but more obfuscation: The compression, while reversible, does have the effect of obfuscating the content of the exfiltrated data. That little bit of effort might prevent a Data Loss Prevention (DLP) tool from recognizing outbound sensitive data before it's too late.

And the reason we call them #LoggerEIO is because all of the sites that Netcraft connects to this campaign do this on the same URI string: The page makes a connection to the path /logger/?EIO=4&transport=websocket in its GET request - only when the victim sends the data.

/6

#smishing #phishing #NetcraftConfirmsIt #Netcraft #threatresearch #WebSocket

Germany was not the only non-US country represented in the #LoggerEIO #smishing attack (so far).

There was one version of a page claiming to be the Spanish highway authority, Dirección General del Tráfico (DGT), that warns you owe a 100 Euro fine (multa) for some kind of driving infraction you committed, that must be paid within 24 hours.

More recently, I spotted a flood of pages that claim to be from the UK government's Winter Fuel Payment program. The real program helps impoverished people not freeze to death in winter by subsidizing the high cost of heating. But this page simply wants your credit card to "test" charge your card for £1 on the promise that you'll get up to £300.

/5

#smishing #phishing #roadtoll #HighwayRobbery #WinterFuelPayment #UK #spain #espana #Netcraft #NetcraftConfirmsIt #NetcraftResearch #Germany

Having recently returned from a trip to #Germany, where I spoke at #VirusBulletin, I have become more familiar with the appearance of some German government operated websites.

The Bundeszentralamt für Steuern (or BZSt), Germany's federal tax authority, is also represented in these #TaxScam #phishing pages.

Bizarrely, #LoggerEIO have decided to clone the template of one of the US-themed versions of the #smishing page which prominently features a banner image of a US form #1040 #tax return, and the corner of a $20 bill, neither of which (I suspect) the #BZSt use for tax filing in that country.

Whoopsie! Or, as my German friends might say, Hoppla!

/4

#smishing #phishing #netcraft #NetcraftConfirmsIt #Oops

In this #scam, the #smishing message informs you that you are owed a reimbursement or refund on overpaid state taxes. The #LoggerEIO group seems to have latched on to the idea of using individual states as the lure, rather than the federal #IRS, which is an interesting choice.

In the pages I looked at, the following states were represented with custom #phishing pages that use the same stylesheet, color scheme, and logos of the state tax agency they're impersonating.

Targeted states include Alabama, California, Connecticut, Delaware, Florida, Maryland, Massachusetts, Michigan, Minnesota, Montana, New Jersey, New York, Ohio, Texas, Tennessee, Washington, and Wisconsin.

/3

#smishing #netcraft #NetcraftConfirmsIt #taxrefund #taxrefundscam

First of all, this seems to be part of a much wider #smishing campaign that people are more familiar with: Fake road toll collection #scams

These have been a nuisance all year, and some of the sites hosting the same #phishing kit appear to be using that same ruse, simultaneously with the new one.

Did you get a message telling you that you owe $6.99 (or $6.69 - nice) in tolls? Probably part of this larger network of scammers.

Note how they have expanded to a variety of different locales: the City of Los Angeles, Seattle, Columbus (Ohio), and even the Canadian province of Ontario are all reflected, as well as the E-ZPass and SunPass multi-state toll payment systems, which together cover most of the US states that operate toll roads.

/2

#phishing #fraud #roadtoll #tollscams #netcraft #NetcraftConfirmsIt #EZPass #SunPass

Happy Thursday! I'm celebrating the publication of my first blog post at @Netcraft as Principal Threat Researcher with a story about...#smishing for tax refunds.

Since the beginning of last month, a threat actor we're calling #LoggerEIO began registering domains for use in #phishing attacks.

They're now up to more than 850 domains registered, with thousands of websites in use (using a variety of subdomains) that dangle the prospect of a refund of state income tax overpayments as a lure.

Here's a quick 🧵 about it.

https://www.netcraft.com/blog/taxpayers-drivers-targeted-in-refund-and-road-toll-smishing-scams

#ThreatResearch #NetcraftConfirmsIt #Netcraft

Tax Refund & Road Toll Smishing Scams Surge Ahead of IRS Deadline

Threat actors deployed over 850 fake tax and toll websites to steal personal and financial data from U.S. and international victims. Netcraft uncovers the latest smishing campaign targeting taxpayers and drivers ahead of the October 15 IRS extension deadline.

📢 Les chatbots IA facilitent le phishing selon Netcraft
📝 L'article publié par The Register met en lumière une nouvelle menace en cybersécurité identifiée par l'entreprise de renseignement sur les menaces, Netcraft...
📖 cyberveille : https://cyberveille.ch/posts/2025-07-03-les-chatbots-ia-facilitent-le-phishing-selon-netcraft/
🌐 source : https://go.theregister.com/feed/www.theregister.com/2025/07/03/ai_phishing_websites/
#Netcraft #chatbot #Cyberveille
Les chatbots IA facilitent le phishing selon Netcraft

L’article publié par The Register met en lumière une nouvelle menace en cybersécurité identifiée par l’entreprise de renseignement sur les menaces, Netcraft. Les chatbots alimentés par l’intelligence artificielle (IA) sont souvent sollicités pour fournir des adresses de sites web de grandes entreprises. Cependant, ces chatbots donnent fréquemment des informations incorrectes. Netcraft souligne que cette inexactitude constitue une opportunité pour les cybercriminels, qui pourraient exploiter ces erreurs pour rediriger les utilisateurs vers des sites de phishing. En effet, en fournissant des adresses erronées, les chatbots pourraient involontairement aider à la diffusion de liens malveillants.

CyberVeille