๐Ÿšจ ๐—ช๐—ต๐˜† ๐—ฃ๐—ต๐—ถ๐˜€๐—ต๐—ถ๐—ป๐—ด ๐—ฆ๐˜๐—ถ๐—น๐—น ๐—š๐—ฒ๐˜๐˜€ ๐—ง๐—ต๐—ฟ๐—ผ๐˜‚๐—ด๐—ต: ๐——๐—ฒ๐˜๐—ฒ๐—ฐ๐˜๐—ถ๐—ผ๐—ป ๐—š๐—ฎ๐—ฝ๐˜€ ๐—ถ๐—ป ๐—ฅ๐—ฒ๐—ฑ๐—ถ๐—ฟ๐—ฒ๐—ฐ๐˜ & ๐—–๐—”๐—ฃ๐—ง๐—–๐—›๐—” ๐—™๐—น๐—ผ๐˜„๐˜€
Redirect chains, fake CAPTCHA, and fast-changing delivery paths make traditional detection unreliable. By the time credentials are targeted, the signal is already lost, which creates a critical gap in triage. The key is detecting #phishing earlier, while patterns are still stable, before the flow fully unfolds.

โšก๏ธ With #ANYRUN TI Lookup, teams can move from isolated indicators to full context, identify attack patterns, and validate detection logic against real attack data from 15K+ organizations.

๐Ÿ“Œ Here are two examples showing how early-stage signals help identify phishing activity before it escalates:
1๏ธโƒฃ ๐—ฅ๐—ฒ๐—ฑ๐—ถ๐—ฟ๐—ฒ๐—ฐ๐˜ ๐—ถ๐—ป๐—ณ๐—ฟ๐—ฎ๐˜€๐˜๐—ฟ๐˜‚๐—ฐ๐˜๐˜‚๐—ฟ๐—ฒ
The chain starts from a Google link leading to a compromised site. A hidden HTML page extracts victim data from the URL fragment and triggers a redirect before any user interaction. Analysis session: https://app.any.run/tasks/05c1017e-397c-4cb9-a666-e715402a943a/?utm_source=mastodon&utm_medium=post&utm_campaign=redirect_and_captcha_phishing&utm_content=linktoservice&utm_term=230426

๐Ÿ” In TI Lookup, this activity can be traced by searching for URL fragments containing the #...Family= parameter, which is used to pass victim data and drive redirection. This helps uncover similar samples and track reuse across campaigns.

โšก๏ธ Use this query to pivot from this signal and uncover related activity: https://intelligence.any.run/analysis/lookup?utm_source=mastodon&utm_medium=post&utm_campaign=redirect_and_captcha_phishing&utm_content=linktotilookup&utm_term=230426#%7B%22query%22%3A%22url%3A%5C%22*%23%3F%3F%3F%3F%3F%3F%3F%3FFamily%3D*%5C%22%22%2C%22dateRange%22%3A180%7D

2๏ธโƒฃ ๐—™๐—ฎ๐—ธ๐—ฒ ๐—–๐—”๐—ฃ๐—ง๐—–๐—›๐—” ๐—ฑ๐—ฒ๐—น๐—ถ๐˜ƒ๐—ฒ๐—ฟ๐˜†
After the initial redirect, the victim is presented with a legit-looking CAPTCHA to build trust before being redirected to a phishing page, a fake Microsoft login page powered by #EvilProxy. Analysis session: https://app.any.run/tasks/3ef22bb3-b331-4211-9526-b95c7b19d4ab/?utm_source=mastodon&utm_medium=post&utm_campaign=redirect_and_captcha_phishing&utm_content=linktoservice&utm_term=230426

๐Ÿ” Detection here relies on consistent URL parameters (v, session, cid, iat, loc, build) that appear early in the execution chain. Searching for this structure helps surface related signals and build early-stage detection, reducing MTTD, improving coverage and MTTR.

โšก๏ธ Use this query to surface related phishing activity and validate detection patterns: https://intelligence.any.run/analysis/lookup?utm_source=mastodon&utm_medium=post&utm_campaign=redirect_and_captcha_phishing&utm_content=linktotilookup&utm_term=230426#%7B%22query%22%3A%22url%3A%5C%22*%2F%5C%5C%3Fv%3D%3F%3F%3F%3F%26session%3D*%26cid%3D*%26iat%3D*%26loc%3D*%26build%3D*%5C%22%22%2C%22dateRange%22%3A60%7D

๐Ÿš€ ๐—ฌ๐—ผ๐˜‚ ๐—ฐ๐—ฎ๐—ป ๐—ป๐—ผ๐˜„ ๐˜๐—ฒ๐˜€๐˜ ๐—ง๐—œโ€™๐˜€ ๐—ถ๐—บ๐—ฝ๐—ฎ๐—ฐ๐˜ ๐—ผ๐—ป ๐˜๐—ฟ๐—ถ๐—ฎ๐—ด๐—ฒ, ๐—ฟ๐—ฒ๐˜€๐—ฝ๐—ผ๐—ป๐˜€๐—ฒ, ๐—ฎ๐—ป๐—ฑ ๐˜๐—ต๐—ฟ๐—ฒ๐—ฎ๐˜ ๐—ต๐˜‚๐—ป๐˜๐—ถ๐—ป๐—ด ๐—ฑ๐—ถ๐—ฟ๐—ฒ๐—ฐ๐˜๐—น๐˜† ๐—ถ๐—ป ๐˜†๐—ผ๐˜‚๐—ฟ ๐˜„๐—ผ๐—ฟ๐—ธ๐—ณ๐—น๐—ผ๐˜„๐˜€. With 20 premium search requests available, SOC and MSSP teams can validate activity against real-world data, reduce uncertainty, and make faster, evidence-based decisions.

โšก๏ธ Learn how to integrate #ANYRUN Threat Intelligence into your SOC to strengthen detection and improve overall performance: https://any.run/cybersecurity-blog/expanded-free-ti-plan/?utm_source=mastodon&utm_medium=post&utm_campaign=redirect_and_captcha_phishing&utm_content=linktoblog&utm_term=230426

#cybersecurity #infosec

Is Your Bank Really Texting You? 3 Red Flags of a Phishing Message.

2,483 words, 13 minutes read time.

The Psychological Architecture of the Smishing Epidemic

The mobile phone is the most intimate piece of hardware in the modern world, a device that lives in our pockets and demands our immediate attention with every haptic buzz and notification chime. This proximity creates a dangerous psychological feedback loop where the user is conditioned to respond to SMS messages with a level of trust that they would never afford an unsolicited email. While email has decades of junk mail filters and visible header data to warn us of danger, the SMS interface is deceptively clean and stripped of context. When a text arrives claiming to be from a major financial institution, it enters a high-trust environment where the barrier between a legitimate service alert and a criminally organized credential harvest is virtually non-existent. Analyzing the current threat landscape, it is clear that the surge in smishing is not merely a technical failure of our telecommunications infrastructure, but a masterful exploitation of human neurobiology. Attackers understand that by bypassing the corporate firewall and landing directly on a victimโ€™s personal device, they are catching the user in a state of cognitive vulnerability, often while they are distracted, tired, or multi-tasking.

The sheer volume of these attacks indicates a shift toward the industrialization of mobile deception. According to recent data, bank impersonation via text message has skyrocketed to become one of the most reported scams, primarily because the return on investment is staggering compared to traditional phishing. It costs almost nothing for an adversary to blast out thousands of messages using automated scripts and cheap gateway services, yet the potential payoff is total access to a victimโ€™s financial life. This is not a hobbyistโ€™s game; it is a highly refined business model that relies on the trusted screen effect. We have been trained to view our phone numbers as a secure second factor for authentication, which ironically makes us more susceptible to the very messages that seek to undermine that security. Consequently, the first step in defending against these attacks is to dismantle the inherent trust we place in the SMS protocol, recognizing that the medium itself is fundamentally insecure and easily manipulated by anyone with a malicious intent and a basic understanding of social engineering.

Red Flag #1: The False Sense of Urgency and Emotional Manipulation

The most potent weapon in a smisherโ€™s arsenal is not a sophisticated zero-day exploit, but the manufactured crisis. Every successful bank-themed phishing message is designed to trigger a physiological response that prioritizes immediate action over rational analysis. When you receive a text stating that your account has been suspended due to suspicious activity or that a large transfer is pending your approval, the attacker is forcing you into a high-stakes decision window. They know that a panicked user is unlikely to look for the subtle technical flaws in the message because their primary focus is on resolving the perceived threat to their financial stability. This artificial urgency is a deliberate tactic to bypass the critical thinking filters that would otherwise identify the message as fraudulent. In the world of social engineering, time is the enemy of the victim and the best friend of the predator. By imposing a deadline, the adversary effectively shuts down the userโ€™s ability to verify the claim through official channels.

Furthermore, these messages often utilize a push-pull dynamic of fear and relief. The initial fear of a compromised account is immediately followed by the perceived relief of a simple solution provided in the form of a link. This emotional roller coaster is a hallmark of sophisticated phishing kits where the goal is to drive the victim toward a pre-built landing page that mimics the bankโ€™s actual login portal. I see this pattern repeated across thousands of observed samples: the language is always direct, the consequence is always severe, and the solution is always a single click away. Professionals must understand that a legitimate financial institution will never use a medium as volatile and insecure as SMS to demand immediate, high-stakes action involving sensitive credentials. If a message makes your heart rate spike before youโ€™ve even finished reading the first sentence, that is not a customer service alert; it is a psychological exploit in progress. The grit of the situation is that these attackers are betting on your human instinct to protect what is yours, and they are winning because our biological hardware hasnโ€™t evolved as fast as their social engineering software.

Red Flag #2: Deconstructing the Malicious URL and Domain Spoofing

The technical linchpin of a bank impersonation scam is the hyperlink, a digital trapdoor designed to look like a bridge to safety. In a legitimate banking environment, URLs are predictable, branded, and hosted on top-level domains that the institution has spent millions of dollars securing. However, attackers rely on the fact that the average mobile user rarely inspects the full string of a URL on a five-inch screen. To obscure their intent, they leverage URL shorteners or link-in-bio services that strip away the destinationโ€™s identity, replacing a recognizable bank domain with a sanitized, high-trust string of characters. When you see a link that begins with a generic shortening service, you are looking at a deliberate attempt to hide a malicious redirection chain. This infrastructure is often backed by sophisticated Phishing-as-a-Service platforms which generate unique, one-time-use links for every target. This makes it significantly harder for automated security filters to flag the domain as malicious because the URL effectively dies after it has been clicked by the intended victim, leaving no trail for threat researchers to follow in real-time.

Beyond simple shortening, more advanced adversaries utilize typosquatting or punycode attacks to create a visual illusion of legitimacy. They might register a domain that replaces a lowercase letter with a similarly shaped number, or they use international character sets that look identical to the English alphabet but lead to an entirely different server in a jurisdiction where law enforcement is non-existent. These spoofed domains are often hosted on legitimate cloud infrastructure, which allows them to bypass reputation-based filters that only look for bad neighborhoods on the internet. Once you click that link, you arenโ€™t just visiting a website; you are entering a controlled environment where every pixel has been engineered to mirror your bankโ€™s actual interface. The gritty reality is that by the time you realize the URL in the address bar is off by a single character, your keystrokes have already been captured by a headless browser or an Adversary-in-the-Middle proxy. Analyzing these landing pages reveals a level of craft that includes working help links and legitimate-looking privacy policies, all designed to keep you in the trust zone just long enough to hand over your credentials.

Red Flag #3: Inconsistencies in Delivery Architecture and Metadata

If you want to spot a fraudster, you have to look at the plumbing of the message itself. Legitimate financial institutions invest heavily in Short Code registriesโ€”those five or six-digit numbers that are strictly regulated and vetted by telecommunications carriers. When a bank sends an automated alert, it almost always originates from one of these verified short codes because they allow for high-throughput, reliable delivery that is difficult for scammers to spoof at scale. In contrast, most smishing attacks originate from standard ten-digit Long Codes or, increasingly, from email addresses masquerading as phone numbers via the SMS gateway. If a message claiming to be from a multi-billion dollar global bank arrives from a random area code in a different state or a Gmail address, the architecture of the delivery is screaming that it is a fraud. These long codes are essentially burner numbers, bought in bulk through VoIP providers or generated via automated botnets of compromised mobile devices. The disconnect between the supposed sender and the technical origin of the message is a massive red flag that is hiding in plain sight.

Furthermore, the metadata and lack of personalization provide critical clues to the messageโ€™s illegitimacy. A real bank notification is tied to a specific account and a specific customer profile; it will often include a partial account number or use a specific format that matches previous interactions you have had with that institution. Smishing messages, however, are designed for the spray and pray method. They use generic salutations like โ€œDear Customerโ€ or โ€œValued Memberโ€ because the attacker doesnโ€™t actually know who you are; they only know that your phone number was part of a massive data leak from a social media breach or a compromised e-commerce database. These messages are sent to thousands of people simultaneously, betting on the statistical probability that a certain percentage will actually have an account with the bank being impersonated. This lack of specificity is a hallmark of industrial-scale social engineering. When you receive a text that feels like a form letter with an artificial sense of emergency, it is a clear sign that you are being targeted by an automated script rather than a legitimate service department. The absence of your name or specific account details isnโ€™t just a lapse in customer service; it is a fundamental technical indicator of a malicious campaign.

The Failure of Traditional MFA against Modern Smishing

The most dangerous misconception in modern personal security is the belief that Multi-Factor Authentication (MFA) via SMS is an impenetrable shield. While having any MFA is better than none, the grit of the current threat landscape is that smishing has evolved to bypass these secondary layers with ease. Modern phishing kits are no longer static pages that just steal a password; they are dynamic proxies that facilitate Adversary-in-the-Middle (AiTM) attacks. When a victim enters their credentials into a fraudulent bank portal, the attackerโ€™s server passes those credentials to the real bankโ€™s login page in real-time. The bank then sends a legitimate MFA code to the victimโ€™s phone. The victim, thinking they are on the real site, enters that code into the attackerโ€™s portal. The attacker then intercepts that code and uses it to complete the login on the real site, effectively hijacking the session. Within seconds, the adversary has bypassed the very security measure designed to stop them, proving that SMS-based codes are a liability in a world of proxied attacks.

This technical reality necessitates a shift toward more robust authentication standards. Analyzing the successful breaches of the last few years, it is evident that the only reliable defense against smishing-induced MFA bypass is the implementation of hardware-backed security keys or FIDO2/WebAuthn standards. These methods use public-key cryptography to ensure that the authentication attempt is tied to the specific, legitimate domain of the service provider. If an attacker directs a victim to a spoofed domain, the security key will simply refuse to authenticate because the domain signature doesnโ€™t match. Consequently, relying on โ€œtext-to-verifyโ€ is essentially building a house of cards in a hurricane. We must move toward a zero-trust model for mobile interactions where no incoming text message is considered valid until it is verified through a separate, trusted out-of-band channel, such as calling the official number on the back of your physical debit card or using the bankโ€™s official, sandboxed mobile application.

Hardening the Human and Technical Perimeter

Defeating the smishing threat requires more than just a sharp eye for typos; it requires a fundamental change in how we interact with our mobile devices. The first line of defense is a technical one: treat every unsolicited message as a potential payload. This means never clicking a link in an SMS, regardless of how legitimate it looks or how much pressure the message applies. Instead, the standard operating procedure should be to close the messaging app and navigate directly to the bankโ€™s official website by typing the address into the browser yourself, or by opening the official app. This simple act of โ€œbreaking the chainโ€ completely neutralizes the attackerโ€™s redirection infrastructure. Furthermore, users should take advantage of mobile threat defense (MTD) tools and carrier-level spam reporting features. By forwarding suspicious messages to the โ€œ7726โ€ (SPAM) short code used by most major carriers, you are contributing to a global database that helps telecommunications providers block these malicious origin points before they reach the next victim.

Ultimately, we have to accept that the SMS protocol was never designed with security in mind; it was designed for convenience. In a professional context, this means that organizations must stop using SMS for sensitive customer communications and move toward encrypted, authenticated in-app messaging. For the individual, it means adopting a mindset of aggressive skepticism. If your bank really needs to reach you, they will use a secure channel or a verified notification system that doesnโ€™t rely on a fragile, easily spoofed text message. The gritty truth is that as long as people keep clicking, criminals will keep texting. By identifying these red flagsโ€”the manufactured urgency, the mangled URLs,

Call to Action

The digital battlefield is no longer confined to server rooms and encrypted tunnels; it is in the palm of your hand, vibrating in your pocket every time a predator decides to test your defenses. You can no longer afford to treat an SMS as a โ€œsimple text.โ€ In an era where organized crime syndicates use automated botnets to exploit human fear, your only real firewall is a shift in mindset. You have the technical red flagsโ€”the artificial urgency, the mangled URLs, and the broken delivery architecture. Now, you have to use them.

Donโ€™t wait until your balance hits zero to start taking mobile security seriously. Audit your accounts today. If youโ€™re still relying on SMS-based two-factor authentication for your primary banking, you are leaving the door unlocked for any adversary with a proxy kit. Switch to a hardware-backed security key or an authenticator app immediately. The next time you receive a โ€œcritical alertโ€ from your bank, donโ€™t click. Donโ€™t reply. Delete the message, open your browser, and go to the source yourself. The criminals are betting that youโ€™ll be too distracted to notice the trap; prove them wrong by staying relentlessly skeptical. Your data is your responsibilityโ€”defend it like it.

SUPPORTSUBSCRIBECONTACT ME

D. Bryan King

Sources

Disclaimer:

The views and opinions expressed in this post are solely those of the author. The information provided is based on personal research, experience, and understanding of the subject matter at the time of writing. Readers should consult relevant experts or authorities for specific guidance related to their unique situations.

#accountSuspensionScam #adversaryInTheMiddle #AiTMAttacks #amygdalaHijack #bankTextScams #botnets #caffeinePhishing #CISAGuidelines #credentialHarvesting #cyberHygiene #cybercrimeSyndicates #cybersecurity #dataBreach #digitalForensics #domainSpoofing #endpointProtection #EvilProxy #fakeBankNotifications #FCCRegulations #FIDO2 #financialFraud #fraudAlerts #fraudPrevention #hardwareSecurityKeys #identityTheft #longCodes #maliciousURLs #MFABypass #mobileSecurity #mobileThreatDefense #mobileVulnerabilities #MTD #multiFactorAuthentication #networkSecurity #NISTCybersecurity #onlineBankingSecurity #PhaaS #phishingKits #phishingRedFlags #phishingAsAService #psychologicalTriggers #robotexts #scamAlerts #shortCodes #smishing #SMSGateway #SMSPhishing #socialEngineering #socialEngineeringTactics #technicalAnalysis #threatIntelligence #typosquatting #unauthorizedAccess #urgentAlerts #urlShorteners #VerizonDBIR #WebAuthn #zeroTrust

โš ๏ธ In 2025, stealer and RAT activity tripled. #Lumma led with 31K+ detections, while #XWorm grew 4.3x YoY.

Phishing kept pace, driven by MFA-bypassing PhaaS kits like #Tycoon2FA and #EvilProxy.

๐Ÿ‘จโ€๐Ÿ’ป See which threats SOC teams should be preparing for next: https://any.run/cybersecurity-blog/malware-trends-2025/?utm_source=mastodon&utm_medium=post&utm_campaign=malware_trends_2025_types&utm_term=030226&utm_content=linktoblog

#cybersecurity #infosec

๐Ÿšจ Attackers hijacked a supplier mailbox and replied inside a real C-suite thread, delivering an #EvilProxy phish behind Turnstile gates

We exposed the full chain + campaign links

See how this impacts business risk, and how your SOC can catch it earlier: https://any.run/cybersecurity-blog/enterprise-email-thread-phishing/?utm_source=mastodon&utm_medium=post&utm_campaign=enterprise_email_thread_phish&utm_term=280126&utm_content=linktoblog

#cybersecurity #infosec

๐Ÿšจ Attackers Took Over a Real Enterprise Email Thread to Deliver #Phishing

โš ๏ธ The hacker replied directly within an active discussion among C-suite executives about a document pending final approval, sharing a phishing link to a fake Microsoft authentication form.
The attackers likely compromised a sales manager account at an enterprise contractor and hijacked a trusted business conversation.

๐Ÿ‘พ By detonating samples in the #ANYRUN Sandbox and pivoting indicators in TI Lookup, we uncovered a broader campaign powered by the #EvilProxy phishkit. The activity has been ongoing since early December 2025, primarily targeting companies in the Middle East.

๐Ÿ”— Execution chain:
SCA phishing email โžก๏ธ 7 forwarded messages โžก๏ธ Phishing link โžก๏ธ Antibot landing page w/ Cloudflare Turnstile โžก๏ธ Phishing page w/ Cloudflare Turnstile โžก๏ธ EvilProxy

โ—๏ธ Supply chain phishing campaigns now rely on layered social engineering, real conversation hijacking, and infrastructure that closely resembles #PhaaS platforms in both complexity and scale. These attacks exploit business trust, not technical vulnerabilities.

๐ŸŽฏ How companies can reduce supply chain phishing risk:
๐Ÿ”น Flag HTML/PDF files with dynamic content, review unusual approval flows, and detonate suspicious files in a sandbox before interaction.
๐Ÿ”น Split responsibility between initiating and approving document or process changes. Apply the four-eyes principle.
๐Ÿ”น Use realistic supply chain attack scenarios and โ€œperfect-lookingโ€ emails in awareness programs.

โšก๏ธ Further technical insights are coming, stay tuned!

With #ANYRUN Sandbox, the threat's full attack chain becomes visible through real behavior and actionable reports with IOCs in under 60 seconds, significantly cutting MTTD and MTTR. Security teams triage faster, reduce Tier-1 overload and escalations, and contain incidents earlier to limit business impact.

๐Ÿ‘จโ€๐Ÿ’ป Equip your SOC with stronger phishing detection: https://any.run/enterprise/?utm_source=mastodon&utm_medium=post&utm_campaign=b2b_social_engineering_phishing&utm_term=270126&utm_content=linktoenterprise

#ExploreWithANYRUN

๐Ÿ“‹ IOCs:
URI pattern: POST ^(/bot/|/robot/)$
Domains:
himsanam[.]com
bctcontractors[.]com
studiofitout[.]ro
st-fest[.]org
komarautomatika[.]hu
eks-esch[.]de
avtoritet-car[.]com
karaiskou[.]edu[.]gr
Domain pattern: ^loginmicrosoft*

#cybersecurity #infosec

๐Ÿšจ #Phishing on Trusted Cloud Infrastructure: Google, Microsoft, Cloudflare.
Weโ€™re tracking a growing trend where phishing kit infrastructure is hosted on legitimate cloud and CDN platforms, not newly registered domains. In some cases, these campaigns specifically target enterprise users. This creates serious visibility challenges for security teams.

Weโ€™ve observed this pattern across multiple #phishkits:
๐Ÿ”น #Tycoon hosted on alencure[.]blob[.]core[.]windows[.]net (Microsoft Azure Blob Storage): https://app.any.run/tasks/29b53d89-99b4-4827-b0af-72f315fdf529/?utm_source=mastodon&utm_medium=post&utm_campaign=trusted_cloud_infrastructure&utm_term=150126&utm_content=linktoservice
โš ๏ธ #Sneaky2FA hosted on legitimate cloud platforms, filtering out free email domains via a fake Microsoft 365 login to target corporate accounts:
firebasestorage[.]googleapis[.]com (Cloud Storage for Firebase): https://app.any.run/tasks/8189dd5e-0159-480d-8654-7b438a73f11e?utm_source=mastodon&utm_medium=post&utm_campaign=trusted_cloud_infrastructure&utm_term=150126&utm_content=linktoservice
cloudfront[.]net (AWS CloudFront): https://app.any.run/tasks/9a2d1537-e952-455e-bba0-b36f720a07e6/?utm_source=mastodon&utm_medium=post&utm_campaign=trusted_cloud_infrastructure&utm_term=150126&utm_content=linktoservice
๐Ÿ”น #EvilProxy hosted on sites[.]google[.]com (Google Sites): https://app.any.run/tasks/07995c22-6e7d-468b-ad94-29af75525ed3/?utm_source=mastodon&utm_medium=post&utm_campaign=trusted_cloud_infrastructure&utm_term=150126&utm_content=linktoservice

Victims see a โ€œtrustedโ€ provider domain, while the network only sees normal HTML being loaded from cloud infrastructure. What looks clean at first glance is exposed by #ANYRUN Sandbox in under 60 seconds, directly reducing MTTD and MTTR.

๐Ÿ” Hunt for related activity and pivot from #IOCs using these search queries in TI Lookup:
๐Ÿ”น Microsoft Azure Blob Storage abuse: https://intelligence.any.run/analysis/lookup?utm_source=mastodon&utm_medium=post&utm_campaign=trusted_cloud_infrastructure&utm_term=150126&utm_content=linktotilookup#%7B%22query%22:%22threatName:%5C%22phishing-ml%5C%22%20and%20domainName:%5C%22*.blob.core.windows.net$%5C%22%22,%22dateRange%22:30%7D
๐Ÿ”น Firebase Cloud Storage abuse: https://intelligence.any.run/analysis/lookup?utm_source=mastodon&utm_medium=post&utm_campaign=trusted_cloud_infrastructure&utm_term=150126&utm_content=linktotilookup#%7B%2522query%2522:%2522domainName:%255C%2522firebasestorage.googleapis.com$%255C%2522%2520AND%2520(domainName:%255C%2522.icu$%255C%2522%2520OR%2520domainName:%255C%2522.xyz$%255C%2522)%2522,%2522dateRange%2522:60%7D%20%20
๐Ÿ”น Google Sites abuse: https://intelligence.any.run/analysis/lookup?utm_source=mastodon&utm_medium=post&utm_campaign=trusted_cloud_infrastructure&utm_term=150126&utm_content=linktotilookup#%7B%2522query%2522:%2522domainName:%255C%2522sites.google.com$%255C%2522%2520AND%2520suricataMessage:%255C%2522*Possible%2520Fake%2520Microsoft%2520Sign-in%2520domain%2520chain*%255C%2522%2522,%2522dateRange%2522:60%7D%20%20

Many security vendors will flag these domains as legitimate. Technically, they are. Thatโ€™s why security teams need behavioral analysis and network-level signals to reliably uncover phishing before impact.

๐Ÿš€ Speed up detection and gain full visibility into complex threats with #ANYRUN. Sign up: https://app.any.run/?utm_source=mastodon&utm_medium=post&utm_campaign=trusted_cloud_infrastructure&utm_term=150126&utm_content=register#register
#ExploreWithANYRUN

#IOCs:
mphdvh[.]icu
kamitore[.]com
aircosspascual[.]com
Lustefea[.]my[.]id

#cybersecurity #infosec

๐Ÿช #EvilProxy is a #phishing kit that bypasses 2FA via a reverse-proxy architecture.

๐ŸŒ Attackers use it to target credentials of corporate Microsoft 365 users across different industries.

Learn about this threat & see analysis: https://any.run/malware-trends/evilproxy/?utm_source=mastodon&utm_medium=post&utm_campaign=evilproxy&utm_content=tracker&utm_term=230625

#cybersecurity #infosec

Global analysis of Adversary-in-the-Middle phishing threats

Explore the 2025 landscape of Adversary-in-the-Middle phishing threats with data, trends, and top detection insights.

Sekoia.io Blog

Phishing-as-a-service is an area that is increasing rapidly according to research by security vendor Barracuda Networks, which says it has detected a โ€œmassive spikeโ€ in PhaaS attacks in the first two months of this year.

https://www.computing.co.uk/news/2025/security/massive-spike-in-phishing-as-a-service-attacks-in-2025-research

#phishing #phaas #tycoon2fa #evilproxy #infosec #cybersecurity #barracuda #technews

โ€˜Massive spikeโ€™ in phishing-as-a-service attacks in 2025, research

Phishing is by far the most common entry point for hackers, with 84% of businesses reporting having been targeted, according to a recent UK government ...

Account Compromise Arms Race: The Rise of Phishing-as-a-Service
#EvilProxy #ONNXStore
https://abnormalsecurity.com/blog/account-compromise-phishing-as-a-service
Account Compromise Arms Race: The Rise of Phishing-as-a-Service

Discover how phishing-as-a-service (PhaaS) is transforming phishing attacks with cloud-based platforms, multi-factor authentication bypass, and sessionโ€ฆ

Abnormal