• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Fears over cyber crime tool that can build phishing pages in real-time

You are here: Home / General Cyber Security News / Fears over cyber crime tool that can build phishing pages in real-time

Hooks on top of credit cards with a padlock in the background

Cyber criminals have developed a new phishing toolkit that can develop serious-time real looking phishing pages to trick victims into getting into their credentials.

According to a report from security scientists at RiskIQ, the phishing kit, dubbed LogoKit,  is entirely modularized, allowing other threat actors to easily reuse and adapt it.

✔ Approved Seller by TheCyberSecurity.News From Our Partners
Avast Ultimate Suite 2021

Protect yourself against all threads using AVAST Ultimate Suite. AVAST Ultimate Suite protects your Windows, macOS and your Android via Avast Premium. In addition it comes with AVAST's well-known VPN service SecureLineVPN. Therefore, it will be a security and privacy in one package.

Get AVAST Ultimate Suite with 65% discount certified seller: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Scientists claimed that as opposed to other phishing kits that choose gain of sophisticated layouts and several files, the LogoKit spouse and children is an embeddable set of JavaScript capabilities. These kits interact in the Document Item Design (DOM), permitting the script to dynamically change the visible information and HTML type knowledge within just a site without the need of consumer interaction.

RiskIQ security researcher Adam Castleman claimed his company had observed more than 700 domains running with LogoKit. Focused services vary from generic login portals to wrong SharePoint portals, Adobe Doc Cloud, OneDrive, Workplace 365, and cryptocurrency exchanges. RiskIQ has also noticed attackers concentrating on many sectors, together with economic, lawful, and entertainment.

“Due to the simplicity of LogoKit, attackers can conveniently compromise web pages and embed their script or host their very own infrastructure. In some conditions, attackers have been observed making use of legit item storage buckets, making it possible for them to show up fewer destructive by obtaining consumers navigate to a recognized area identify, i.e., Google Firebase,” said Castleman.

Javvad Malik, security awareness advocate at KnowBe4, informed ITPro this new attack demonstrates how invested criminals are in phishing attacks. 

“With each iteration, we see new procedures place in location intended to idiot consumers into believing an email or web page is reputable,” Malik stated.

Malik extra that even though technical controls can aid to block some of these, they will not be thriving all of the time. 

“Which is why it can be important to teach and prepare customers to be equipped to discover and report any suspicious e-mails or websites. Companies also need to have to have monitoring and threat detection controls in area so that if an attack is profitable, then it can be detected and responded to in a timely way ahead of it gets a whole-blown incident,” he included.


Some elements of this short article are sourced from:
www.itpro.co.uk

Previous Post: «Cyber Security News #RSAC365: Organizations Must Prepare for New #COVID19 Data Privacy Challenges
Next Post: #RSAC365: How to Achieve Next Level Security Automation Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Mimecast Confirms SolarWinds Hack as List of Security Vendor Victims Snowball
  • #RSAC365: How to Achieve Next Level Security Automation
  • Fears over cyber crime tool that can build phishing pages in real-time
  • #RSAC365: Organizations Must Prepare for New #COVID19 Data Privacy Challenges
  • Italy CERT Warns of a New Credential Stealing Android Malware
  • 10 ways to protect your company from the next big data breach
  • ‘Don’t take Tom Bossert’s word on Trinity Cyber’: startup snags big-name board additions
  • Weekly threat roundup: Apple, SonicWall, Linux Sudo
  • Citrix employees win $2.3m settlement over 2019 data breach
  • Remote Workers Could Offer Brexit Britain Cybersecurity Lifeline

Copyright © TheCyberSecurity.News, All Rights Reserved.