• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
hackers behind twilio breach also targeted cloudflare employees august 10,

Hackers Behind Twilio Breach Also Targeted Cloudflare Employees
August 10, 2022Ravie Lakshmanan

Web infrastructure company Cloudflare on Tuesday disclosed at least 76 employees and their family members received text messages on their personal and work phones bearing similar characteristics as that of the sophisticated  phishing attack against Twilio . "They came from four phone numbers associated with T-Mobile-issued SIM cards: (754) 268-9387, (205) 946-7573, (754) 364-6683 and (561) 524-5989," it  said . "They pointed to an official-looking domain: cloudflare-okta.com." The attack, which transpired around the same time Twilio was targeted, was ultimately unsuccessful. The wave of over 100 smishing messages commenced less than 40 minutes after the rogue domain was registered via Porkbun, the company noted, adding the phishing page was designed to relay the credentials entered by unsuspecting users to the attacker via Telegram in real-time. This also meant that the attack could defeat 2FA roadblocks, as the Time-based One Time Password ( TOTP ) codes inp

You are here: Home / General Cyber Security News / Hackers Behind Twilio Breach Also Targeted Cloudflare Employees August 10, 2022Ravie Lakshmanan Web infrastructure company Cloudflare on Tuesday disclosed at least 76 employees and their family members received text messages on their personal and work phones bearing similar characteristics as that of the sophisticated  phishing attack against Twilio . "They came from four phone numbers associated with T-Mobile-issued SIM cards: (754) 268-9387, (205) 946-7573, (754) 364-6683 and (561) 524-5989," it  said . "They pointed to an official-looking domain: cloudflare-okta.com." The attack, which transpired around the same time Twilio was targeted, was ultimately unsuccessful. The wave of over 100 smishing messages commenced less than 40 minutes after the rogue domain was registered via Porkbun, the company noted, adding the phishing page was designed to relay the credentials entered by unsuspecting users to the attacker via Telegram in real-time. This also meant that the attack could defeat 2FA roadblocks, as the Time-based One Time Password ( TOTP ) codes inp
August 27, 2009

Hackers Behind Twilio Breach Also Qualified Cloudflare Employees
August 10, 2022Ravie Lakshmanan

Web infrastructure enterprise Cloudflare on Tuesday disclosed at least 76 workers and their family members users received text messages on their individual and function phones bearing related traits as that of the sophisticated  phishing attack towards Twilio . “They arrived from 4 phone quantities associated with T-Cell-issued SIM cards: (754) 268-9387, (205) 946-7573, (754) 364-6683 and (561) 524-5989,” it  stated . “They pointed to an formal-looking domain: cloudflare-okta.com.” The attack, which transpired about the identical time Twilio was specific, was eventually unsuccessful. The wave of about 100 smishing messages commenced less than 40 minutes right after the rogue area was registered by using Porkbun, the company observed, incorporating the phishing site was intended to relay the credentials entered by unsuspecting buyers to the attacker by using Telegram in serious-time. This also intended that the attack could defeat 2FA roadblocks, as the Time-based mostly A single Time Password ( TOTP ) codes inp


Some pieces of this report are sourced from:
thehackernews.com

Next Post: How to upgrade to Windows 10 for free how to upgrade to windows 10 for free»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Qilin Ransomware Adds “Call Lawyer” Feature to Pressure Victims for Larger Ransoms
  • Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist
  • 6 Steps to 24/7 In-House SOC Success
  • Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider
  • 67 Trojanized GitHub Repositories Found in Campaign Targeting Gamers and Developers
  • New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft
  • BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with MacOS Backdoor Malware
  • Secure Vibe Coding: The Complete New Guide
  • Uncover LOTS Attacks Hiding in Trusted Tools — Learn How in This Free Expert Session
  • Russian APT29 Exploits Gmail App Passwords to Bypass 2FA in Targeted Phishing Campaign

Copyright © TheCyberSecurity.News, All Rights Reserved.