🔴 A threat isn't much of a threat if it can't reach the right victims. 📦 That's why many modern threat actors rely on cloakers and traffic distribution systems (TDS) to target, route, and hide at scale. In a six‑month joint effort analyzing four months of data with Confiant, we identified 15,500 domains configured to Keitaro instances and actively used in cyber campaigns. Keitaro is a legitimate ad tracker, but it is frequently misused by cybercriminals as an all‑in‑one tracker + TDS + cloaker in scam and malware campaigns. We encounter Keitaro in our investigations nearly every day, and we set out to quantify that abuse in the broader landscape. We're publishing a three‑part series to share what we learned. Part 1 focuses on a subset of actors who leverage AI in their operations, most of whom are tied to investment scams. At the end of the report, you'll find a link to our github repository that contains thousands of related Keitaro iocs.

https://www.infoblox.com/blog/threat-intelligence/inside-keitaro-abuse-a-persistent-stream-of-ai-driven-investment-scams/

#dns #threatintel #threatintelligence #cybercrime #cybersecurity #infosec #infoblox #infobloxthreatintel #scam #ai #keitaro #adtech #tds #trafficdistributionsystem #cloaker #cloaking #landscape #malvertising

There are no right answers to wrong questions; #inclusion without #structural #change, without #equality, is a rhetorical #cloaking device, smokescreen, to maintain structural inequities, and historical & contemporary material injustices.

Another world and #structural #change are possible by refusing the empty platitudes for band-aid solutions, disingenuous pleasantries, and cultures of scheming for professional ladder-climbing that cloak the structural causes-of-causes of global inequalities.

ICYMI: Meta sues scam advertisers in Brazil, China and Vietnam over celeb-bait and cloaking: Meta filed multiple lawsuits on February 26, 2026 against scam advertisers using celeb-bait and cloaking tactics in Brazil, China, and Vietnam, while issuing cease and desist letters to eight marketing consultants. https://ppc.land/meta-sues-scam-advertisers-in-brazil-china-and-vietnam-over-celeb-bait-and-cloaking/ #Meta #Advertising #ScamAlert #CelebBait #Cloaking
Meta sues scam advertisers in Brazil, China and Vietnam over celeb-bait and cloaking

Meta filed multiple lawsuits on February 26, 2026 against scam advertisers using celeb-bait and cloaking tactics in Brazil, China, and Vietnam, while issuing cease and desist letters to eight marketing consultants.

PPC Land

Nowy wektor ataku łączący indirect prompt injection z cloakingiem wymierzony w autonomicznych agentów AI

Myślicie, że Internet może być niebezpieczny dla ludzi? No cóż, sztuczna inteligencja też już może zacząć się bać. Shaked Zychlinski z JFrog opisał nowy wektor ataku, który pozwala wstrzyknąć złośliwe instrukcje do asystentów AI przeglądających strony w Internecie. Dotychczasowe ataki typu indirect prompt injection polegały na ukryciu instrukcji na stronie...

#WBiegu #Ai #Awareness #Cloaking #Promptinjection

https://sekurak.pl/nowy-wektor-ataku-laczacy-indirect-prompt-injection-z-cloakingiem-wymierzony-w-autonomicznych-agentow-ai/

Nowy wektor ataku łączący indirect prompt injection z cloakingiem wymierzony w autonomicznych agentów AI

Myślicie, że Internet może być niebezpieczny dla ludzi? No cóż, sztuczna inteligencja też już może zacząć się bać. Shaked Zychlinski z JFrog opisał nowy wektor ataku, który pozwala wstrzyknąć złośliwe instrukcje do asystentów AI przeglądających strony w Internecie. Dotychczasowe ataki typu indirect prompt injection polegały na ukryciu instrukcji na stronie...

Sekurak

Strategi & Tools Optimasi Link Affiliate: Cloaking, Tracking, A/B Testing

#Topbisnisonline - #Strategi & #Tools Optimasi #Link Affiliate: #Cloaking, #Tracking, #A/B Testing - #Affiliate marketing adalah salah satu #model bisnis online yang paling populer dan menguntungkan. Namun, untuk benar-benar sukses sebagai #affiliate marketer, Anda tidak cukup hanya dengan menempatkan link affiliate di artikel atau media sosial. Anda perlu strategi yang solid dan tools yang tepat…

https://topbisnisonline.com/strategi-tools-optimasi-link-affiliate-cloaking-tracking-a-b-testing

Strategi & Tools Optimasi Link Affiliate: Cloaking, Tracking, A/B Testing - Top Bisnis Online

#Topbisnisonline – #Strategi & #Tools Optimasi #Link Affiliate: #Cloaking, #Tracking, #A/B Testing – #Affiliate marketing adalah salah satu #model bisnis online yang paling populer dan menguntungkan. Namun, untuk benar-benar sukses sebagai #affiliate marketer, Anda tidak cukup hanya dengan menempatkan link affiliate di artikel atau media sosial. Anda perlu strategi yang solid dan tools yang tepat […]

Top Bisnis Online

We must know history to avoid repeating it.

We might need to use a #Cloaking strategy.

Remember when the Black Panthers got the N-R-A to draft g-u-n legislation?

#StrongerTogether
#History
#FightForEquality #FightForDiversity
#GeneralStrike

https://en.wikipedia.org/wiki/Mulford_Act

Mulford Act - Wikipedia

'Invisibility cloak' that could hide tanks and troops looks closer to reality

YouTube
Invisibility Cloak for Magnetic Obstacles

Researchers at the University of Bayreuth have developed a method that makes objects on a magnetic field invisible within a particle stream. Until now, this so-called cloaking had only been studied for waves such as light or sound. They report their results in Nature Communications.

Lumma Stealer is currently one of the most popular malware. Campaigns involving this info stealer have a notable presence in DNS. We’ve been tracking a threat actor that deploys large number of domains to advertise file share links dropping Lumma Stealer. These campaigns are interesting because the actor uses traffic distribution system (TDS), cloaking, and web tracking technology (e.g. Matomo, Bablosoft) to hide and protect the malicious content. Here are recent examples of the TDS and landing page domains.

:::TDS + Cloaking:::
am4[.]myidmcrack[.]site
bjnhuy[.]shop
filefetch[.]click
mplopop[.]shop
oyoclean[.]sbs
psldi3z[.]com
readyf1[.]click
volopi[.]cfd

:::Landing Page:::
14redirect[.]cfd
downf[.]lol
fbfgsnew[.]com
icjvueszx[.]com
lkjpoisjnil[.]site
sikoip[.]cfd
zulmie[.]cfd


An attack that we investigated today showed a new Lumma Stealer payload and C2 domain that is only a day old.

:::Lumma Stealer executable SHA256::: df148680db17e221e6c4e8aed89b4d3623f4a8ad86a3a4d43c64d6b1768c5406

:::Text sites containing Lumma Stealer configuration details:::
hXXps://rentry[.]co/feouewe5/raw
hXXps://pastebin[.]com/raw/uh1GCpxx

:::Newly created Lumma Stealer C2:::
hXXps://urbjanjungle[.]tech/api

#malware #lummastealer #c2 #tds #tracker #cloaking #dns #mastodon #threatintel #cybercrime #threatintelligence #cybersecurity #infosec #infoblox #infobloxthreatintel