Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

CTEM conversations we all need

National BioSecurity Centre to Protect the People from Animal Diseases

Hackers misuse misunderstood Docker API to mine cryptocurrency via Tor Network

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Phishing campaigns use real-time checks to validate victim emails before credential theft
Identity

Phishing campaigns use real-time checks to validate victim emails before credential theft

userBy userApril 14, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

April 14, 2025Ravi LakshmananEmail Security/Cyber ​​Attack

Phishing campaigns use real-time checks

Cybersecurity researchers are bringing attention to a new type of qualification phishing scheme that ensures that stolen information is associated with a valid online account.

This technique is called precision verification phishing by Cofense. It says it employs real-time email verification so that only selected high-value targets are provided on fake login screens.

“This tactic doesn’t just give threat actors a higher success rate in obtaining usable credentials, as they only involve themselves in a specific harvest list of valid email accounts,” the company said.

Unlike “spray and play” qualification harvesting campaigns that usually involve bulk distribution of spam emails, when you get a victim’s login information indiscriminately, the latest attack tactics take spear phishing to the next level by only engaging with email addresses that attackers have verified as active, legal, and high.

Cybersecurity

In this scenario, the email address entered by the victim on the phishing landing page is verified against the attacker’s database, and then a fake login page is displayed. If the email address does not exist in the database, the page will either return an error or be redirected to a harmless page, such as Wikipedia, to help users avoid security analysis.

The check is performed by integrating API- or JavaScript-based verification services into the phishing kit to verify your email address before proceeding to the password capture step.

“It increases the efficiency of the attack and the likelihood that stolen credentials belong to real, actively used accounts, improving the quality of harvested data for resale or further exploitation,” Cofense said.

“Automized security crawlers and sandbox environments struggle to analyze these attacks because they cannot bypass validation filters. This targeted approach reduces the risk of attackers and increases the lifespan of phishing campaigns.”

The development comes as cybersecurity companies have revealed details of email phishing campaigns that they use to use as a lure to qualify and deliver malware using file removal reminders.

The 2nd attack utilizes an embedded URL that appears to point to a PDF file that is removed from a legal file storage service called files.fm. If the message recipient clicks on the links, they will be used for legitimate files.fm links.

However, once the PDF is opened, the user will be presented with two options to preview or download the file. Users who choose the former will be taken to a fake Microsoft login screen designed to steal credentials. When the download option is selected it drops an executable that claims to be Microsoft Onedrive, but it is actually ConnectWise’s ScreenConnect Remote Desktop Software.

Cybersecurity

It’s “as if threat actors are intentionally designing an attack to lock users in, forcing them to choose which “poison” they fall into,” Kofanse said. “Both options lead to the same outcomes and have similar goals, but there are different approaches to achieving them.”

The findings also acquire early access and establish persistence following the discovery of sophisticated multi-stage attacks combining Vising, remote access tools, and living off the land techniques. The commerce observed in the activity is consistent with the cluster tracked as Storm-1811 (also known as STAC5777).

“The threat actor exploited exposed communication channels by providing a malicious PowerShell payload via Microsoft team messages, and then used Quick Assist to remotely access the environment,” says Ontinue. “This unfolded a signed binaries (such as TeamViewer.exe), a sideloaded malicious DLL (TV.DLL), and a JavaScript-based C2 backdoor that was run through node.js.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticlePeter Thiel’s Founders Fund will close $4.6 billion venture funds to growth-stage giants such as SpaceX, Stripe and Anduril
Next Article 70%: Cat Kevern -Conference News
user
  • Website

Related Posts

CTEM conversations we all need

June 24, 2025

Hackers misuse misunderstood Docker API to mine cryptocurrency via Tor Network

June 24, 2025

US Homes ban WhatsApp on Official Devices Over Security and Data Protection Issues

June 24, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

CTEM conversations we all need

National BioSecurity Centre to Protect the People from Animal Diseases

Hackers misuse misunderstood Docker API to mine cryptocurrency via Tor Network

US Homes ban WhatsApp on Official Devices Over Security and Data Protection Issues

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The Digital Twin Revolution: Reshaping Industry 4.0

1-inch rollout expanded bug bounty features rewards up to $500,000

PhysicsX raises $135 million to bring AI-first engineering to aerospace, automobiles and energy

Deadline approach to speaker proposals for OpenSSL Conference 2025 held in Prague

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.