Voice phishers strike again, this time hitting Cisco

Stopping people from falling for phishing attacks isn’t working. So what are organizations to do?

Ars Technica

#Phishers Target #Aviation Execs to Scam Customers

KrebsOnSecurity recently heard from a reader whose boss’s email account got #phished and was used to trick one of the company’s customers into sending a large payment to #scammers. An investigation into the attacker’s infrastructure points to a long-running #Nigerian #cybercrime ring that is actively #targeting established companies in the transportation and aviation industries.
#security #privacy #scam

https://krebsonsecurity.com/2025/07/phishers-target-aviation-execs-to-scam-customers/

Phishers Target Aviation Execs to Scam Customers – Krebs on Security

Phishers have found a way to downgrade—not bypass—FIDO MFA

Contrary to recent reports, phishing sleight-of-hand doesn’t defeat FIDO.

Ars Technica

I was momentarily worried that my family had uploaded too many Easter videos. Then I remembered two things:
- I already pay for more storage than we can ever use
- This email didn't come to my Gmail account

Tricky #phishers, you almost got me this time

Oh, Troy, you jet-lagged tech guru 🛫, how dare those pesky #phishers invade your sacred #Mailchimp temple 🐟💌! Who knew mailing lists were even a thing in 2025? Maybe next time, try turning off 'phish-friendly' mode 🐠🔒.
https://www.troyhunt.com/a-sneaky-phish-just-grabbed-my-mailchimp-mailing-list/ #jetlaggedtech #cybersecurity #humor #HackerNews #ngated
A Sneaky Phish Just Grabbed my Mailchimp Mailing List

You know when you're really jet lagged and really tired and the cogs in your head are just moving that little bit too slow? That's me right now, and the penny has just dropped that a Mailchimp phish has grabbed my credentials, logged into my account and exported the mailing

Troy Hunt

🚨 ALERT: #Phishers use fake online shops with surveys to steal users’ credit card information
⚠️ The new phishing scheme we named #FoxWhoops targets American customers of the e-commerce with fake sites promising a reward for completing a survey
📌 The attack utilizes a system of checks, sending users who fail them to a Fox News RSS page or a page with a ‘Whoops!’ image. Those who pass the checks are offered to enter their bank card info to purchase the ‘reward’ at a discount

Examples:
Fake Market: https://app.any.run/browses/566dac16-0dee-4343-9dc7-ad9e6c71a780/?utm_source=mastodon&utm_medium=post&utm_campaign=foxwhopps&utm_term=160125&utm_content=linktoservice
FoxNews RSS: https://app.any.run/tasks/e5bab257-0de4-4ef9-801e-756b88598649/?utm_source=mastodon&utm_medium=post&utm_campaign=foxwhopps&utm_term=160125&utm_content=linktoservice
Whoops!: https://app.any.run/tasks/28b68210-807f-4beb-bd6c-720fc0c61f8f/?utm_source=mastodon&utm_medium=post&utm_campaign=foxwhopps&utm_term=160125&utm_content=linktoservice

🔗 Checks and redirects:
1. A script that detects scanning by Google, Bing, Baidu, DuckDuck, etc.
2. If the first check is passed, the script triggers a redirect
3. If the second check is passed, the user is redirected to a #phishing page with a fake online shop payment form
4. If the second check fails, the ‘Whoops’ page is displayed
5. If the first check fails, the user is redirected to a Fox News RSS feed

Here are three scenarios showing how a user’s browser might navigate through this phishing campaign:
1️⃣ 𝗣𝗵𝗶𝘀𝗵𝗶𝗻𝗴 𝘀𝗰𝗲𝗻𝗮𝗿𝗶𝗼 (𝟭 → 𝟮 → 𝟯) Credit card info theft. A phishing survey with a ‘reward’ after a small payment in a fake store

2️⃣ 𝗘𝘃𝗮𝘀𝗶𝗼𝗻 𝘀𝗰𝗲𝗻𝗮𝗿𝗶𝗼 (𝟭 → 𝟱) If the victim fails the first check, they are redirected to what appears to be a Fox News RSS feed. The URL includes a ‘q’ parameter that specifies the reason for the redirect, such as:
IP provider is blacklisted! ASN-CXA-ALL-CCI-22773-RDC

3️⃣ 𝗣𝗹𝗮𝗰𝗲𝗵𝗼𝗹𝗱𝗲𝗿 𝘀𝗰𝗲𝗻𝗮𝗿𝗶𝗼 (𝟭 → 𝟮 → 𝟰) Users are shown a placeholder page

🎯 Use this #TI Lookup query to gather info on this campaign:
https://intelligence.any.run/analysis/lookup?utm_source=mastodon&utm_medium=post&utm_campaign=foxwhoops&utm_content=linktoti&utm_term=160125#%7B%2522query%2522:%2522url:%255C%2522/news?q=%255C%2522%2520and%2520threatName:%255C%2522phishing%255C%2522%2520%2522,%2522dateRange%2522:180%7D
Or find sandbox sessions with the ‘whoops’ tag and gather #IOCs:
https://intelligence.any.run/analysis/lookup?utm_source=mastodon&utm_medium=post&utm_campaign=foxwhoops&utm_content=linktoti&utm_term=160125#%7B%2522query%2522:%2522threatName:%255C%2522foxwhoops%255C%2522%2522,%2522dateRange%2522:180%7D

Analyze and investigate the latest #malware and phishing threats with ANYRUN 🚀

#cybersecurity #infosec

Interactive Online Malware Analysis Sandbox - ANY.RUN

Interactive malware hunting service. Live testing of most type of threats in any environments. No installation and no waiting necessary.

Why Phishers Love New TLDs Like .shop, .top and .xyz – Krebs on Security

Phishers send corrupted documents to bypass email security - Help Net Security

Malware peddlers have come up with a new trick for bypassing email security systems: corrupted MS Office documents.

Help Net Security
Booking.com #Phishers May Leave You With Reservations - https://krebsonsecurity.com/2024/11/booking-com-phishers-may-leave-you-with-reservations/ "there is a great demand for compromised booking.com accounts belonging to hotels and other partners."
Booking.com Phishers May Leave You With Reservations – Krebs on Security

Dear #phishers, if you want to be successful at least try to send me mails in a language I understand.

Thanks, and hope to not read you soon.