buff.ly/Crz8rDh
buff.ly/Crz8rDh
buff.ly/agWWCnp
buff.ly/agWWCnp
buff.ly/mpEzALh
buff.ly/mpEzALh
🎯 Trusted-contact impersonation: Calisto used ProtonMail accounts to send missing or faulty attachments, prompting victims to request a resend containing the malicious link.
🎯 Trusted-contact impersonation: Calisto used ProtonMail accounts to send missing or faulty attachments, prompting victims to request a resend containing the malicious link.
We also detailed the fraud scheme targeting hotel customers.
We also detailed the fraud scheme targeting hotel customers.
Those credentials are used to launch personalised fraud campaigns against hotel guests, impersonating billing services and tricking them into paying twice for their reservation.
Those credentials are used to launch personalised fraud campaigns against hotel guests, impersonating billing services and tricking them into paying twice for their reservation.
🔬 This follow-up provides a detailed analysis of the backdoor, including the anti-analysis techniques it employs.
🔬 This follow-up provides a detailed analysis of the backdoor, including the anti-analysis techniques it employs.
🎯 This botnet has been active since at least November 2023 and exploits multiple vulnerabilities across a wide range of edge devices, notably Asus, QNAP, and Synology.
🎯 This botnet has been active since at least November 2023 and exploits multiple vulnerabilities across a wide range of edge devices, notably Asus, QNAP, and Synology.
🕸️ Infrastructure insights: tracking domains and IP clusters reveals a persistent, multi-regional smishing operation
🕸️ Infrastructure insights: tracking domains and IP clusters reveals a persistent, multi-regional smishing operation
✉️ API exploitation: attackers leverage an exposed /cgi endpoint to push malicious SMS without authentication
🌐 Scale of exposure: over 18,000 routers accessible on the internet; 572 confirmed vulnerable
✉️ API exploitation: attackers leverage an exposed /cgi endpoint to push malicious SMS without authentication
🌐 Scale of exposure: over 18,000 routers accessible on the internet; 572 confirmed vulnerable