v4ensics (@v4ensics) 's Twitter Profile
v4ensics

@v4ensics

Vital Digital Forensics: Cyber-security services, specializing in Digital Forensics / Incident Response (DFIR), malware analysis and expert witness testimony

ID: 1448618331855114240

linkhttp://www.v4ensics.gr calendar_today14-10-2021 11:55:35

1,1K Tweet

217 Followers

57 Following

v4ensics (@v4ensics) 's Twitter Profile Photo

New #phishing mail targeting Piraeus in the wild. Phishers use akashkapoor[.]in/prgr to direct victims to signon[.]myservicesgovmyird[.]nz[.]dilii.ip-ddns[.]com/PiraeusGR/. Site is hosted on a #Microsoft #windows server on #Xampp

New #phishing mail targeting <a href="/Piraeus_Bank/">Piraeus</a> in the wild. Phishers use akashkapoor[.]in/prgr to direct victims to signon[.]myservicesgovmyird[.]nz[.]dilii.ip-ddns[.]com/PiraeusGR/. Site is hosted on a #Microsoft #windows server on #Xampp
v4ensics (@v4ensics) 's Twitter Profile Photo

New #phishing campaign targets #hospitality . Phishers now mimick Expedia and use traveelctm[.]com/?reservations/EPC-2025-{5digit_nr} to direct intended victims to expediapartnercentrals[.]reazby[.]com/Account/ and post OTP submission to legit www[.]expediapartnercentral[.]com

New #phishing campaign targets #hospitality . Phishers now mimick <a href="/Expedia/">Expedia</a>  and use traveelctm[.]com/?reservations/EPC-2025-{5digit_nr}
to direct intended victims to
expediapartnercentrals[.]reazby[.]com/Account/
and post OTP submission to legit
www[.]expediapartnercentral[.]com
v4ensics (@v4ensics) 's Twitter Profile Photo

It seems that #Lumma #infostealer infra has been brought to a halt. Kudos Microsoft and EC3 for making this happen (europol.europa.eu/media-press/ne…, blogs.microsoft.com/on-the-issues/…)

It seems that #Lumma #infostealer infra has been brought to a halt. Kudos <a href="/Microsoft/">Microsoft</a> and <a href="/EC3Europol/">EC3</a> for making this happen (europol.europa.eu/media-press/ne…, blogs.microsoft.com/on-the-issues/…)
v4ensics (@v4ensics) 's Twitter Profile Photo

New #phishing campaign targeting Piraeus active since yesterday. Phishers use makaanshop[.]com/haikku to direct intended victims to online[.]myirdrefund[.]nz[.]ilhii[.]ip-ddns[.]com/PiraeusGR/

New #phishing campaign targeting <a href="/Piraeus_Bank/">Piraeus</a> active since yesterday. Phishers use makaanshop[.]com/haikku to direct intended victims to online[.]myirdrefund[.]nz[.]ilhii[.]ip-ddns[.]com/PiraeusGR/
v4ensics (@v4ensics) 's Twitter Profile Photo

Another Meta phisher abuses Meta www[.]facebook[.]com/61576714928950/posts/122102540912890497 to direct victims to recovercaseidhelp3232[.]d1tzhlqwrrp8x9[.]amplifyapp[.]com/. Phished data get processed via #Telegram

Another <a href="/Meta/">Meta</a> phisher abuses <a href="/Meta/">Meta</a> www[.]facebook[.]com/61576714928950/posts/122102540912890497 to direct victims to recovercaseidhelp3232[.]d1tzhlqwrrp8x9[.]amplifyapp[.]com/. Phished data get processed via #Telegram
v4ensics (@v4ensics) 's Twitter Profile Photo

New #phishing campaign targeting #Elta in the wild. Phishers use mediaoffice[.]com[.]uy/elt to direct victims to csclear[.]co[.]za/wwwGR-hellenicPost/

New #phishing campaign targeting #Elta in the wild. Phishers use mediaoffice[.]com[.]uy/elt to direct victims to csclear[.]co[.]za/wwwGR-hellenicPost/
CISA Cyber (@cisacyber) 's Twitter Profile Photo

🚨Ransomware actors exploited an unpatched vulnerability (CVE-2024-57727) in SimpleHelp RMM to compromise a utility billing software provider—part of a pattern of actors targeting downstream customers. See our advisory for mitigations👉go.dhs.gov/wKc

🚨Ransomware actors exploited an unpatched vulnerability (CVE-2024-57727) in SimpleHelp RMM to compromise a utility billing software provider—part of a pattern of actors targeting downstream customers. See our advisory for mitigations👉go.dhs.gov/wKc