Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Hollywood isn’t happy with new Seedance 2.0 video generator

Designer Kate Burton collaborates with IBM and Fiducia AI for NYFW presentation

India doubles state-backed venture capital, approves $1.1 billion fund

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Phishing campaigns use real-time checks to validate victim emails before credential theft
Identity

Phishing campaigns use real-time checks to validate victim emails before credential theft

userBy userApril 14, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

April 14, 2025Ravi LakshmananEmail Security/Cyber ​​Attack

Phishing campaigns use real-time checks

Cybersecurity researchers are bringing attention to a new type of qualification phishing scheme that ensures that stolen information is associated with a valid online account.

This technique is called precision verification phishing by Cofense. It says it employs real-time email verification so that only selected high-value targets are provided on fake login screens.

“This tactic doesn’t just give threat actors a higher success rate in obtaining usable credentials, as they only involve themselves in a specific harvest list of valid email accounts,” the company said.

Unlike “spray and play” qualification harvesting campaigns that usually involve bulk distribution of spam emails, when you get a victim’s login information indiscriminately, the latest attack tactics take spear phishing to the next level by only engaging with email addresses that attackers have verified as active, legal, and high.

Cybersecurity

In this scenario, the email address entered by the victim on the phishing landing page is verified against the attacker’s database, and then a fake login page is displayed. If the email address does not exist in the database, the page will either return an error or be redirected to a harmless page, such as Wikipedia, to help users avoid security analysis.

The check is performed by integrating API- or JavaScript-based verification services into the phishing kit to verify your email address before proceeding to the password capture step.

“It increases the efficiency of the attack and the likelihood that stolen credentials belong to real, actively used accounts, improving the quality of harvested data for resale or further exploitation,” Cofense said.

“Automized security crawlers and sandbox environments struggle to analyze these attacks because they cannot bypass validation filters. This targeted approach reduces the risk of attackers and increases the lifespan of phishing campaigns.”

The development comes as cybersecurity companies have revealed details of email phishing campaigns that they use to use as a lure to qualify and deliver malware using file removal reminders.

The 2nd attack utilizes an embedded URL that appears to point to a PDF file that is removed from a legal file storage service called files.fm. If the message recipient clicks on the links, they will be used for legitimate files.fm links.

However, once the PDF is opened, the user will be presented with two options to preview or download the file. Users who choose the former will be taken to a fake Microsoft login screen designed to steal credentials. When the download option is selected it drops an executable that claims to be Microsoft Onedrive, but it is actually ConnectWise’s ScreenConnect Remote Desktop Software.

Cybersecurity

It’s “as if threat actors are intentionally designing an attack to lock users in, forcing them to choose which “poison” they fall into,” Kofanse said. “Both options lead to the same outcomes and have similar goals, but there are different approaches to achieving them.”

The findings also acquire early access and establish persistence following the discovery of sophisticated multi-stage attacks combining Vising, remote access tools, and living off the land techniques. The commerce observed in the activity is consistent with the cluster tracked as Storm-1811 (also known as STAC5777).

“The threat actor exploited exposed communication channels by providing a malicious PowerShell payload via Microsoft team messages, and then used Quick Assist to remotely access the environment,” says Ontinue. “This unfolded a signed binaries (such as TeamViewer.exe), a sideloaded malicious DLL (TV.DLL), and a JavaScript-based C2 backdoor that was run through node.js.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticlePeter Thiel’s Founders Fund will close $4.6 billion venture funds to growth-stage giants such as SpaceX, Stripe and Anduril
Next Article 70%: Cat Kevern -Conference News
user
  • Website

Related Posts

Google collaborates with Russian actor suspect in failed malware attack on Ukrainian organization

February 13, 2026

Google connects China, Iran, Russia, and North Korea to coordinate defense sector cyber operations

February 13, 2026

UAT-9921 Deploys VoidLink malware targeting technology and financial sectors

February 13, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Hollywood isn’t happy with new Seedance 2.0 video generator

Designer Kate Burton collaborates with IBM and Fiducia AI for NYFW presentation

India doubles state-backed venture capital, approves $1.1 billion fund

This week’s science news: China turns deserts into carbon sinks, Viking-era graves hold giants with brain surgery, the beginnings of the real world, and nature’s last-minute Valentine’s gift ideas

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.