<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Email servers &#8211; First Hackers News</title>
	<atom:link href="https://firsthackersnews.com/category/malicious-cyber-actors/phishing/email-servers/feed/" rel="self" type="application/rss+xml" />
	<link>https://firsthackersnews.com</link>
	<description>Latest cybersecurity news, real attacks, and practical IOCs—made simple and actionable.</description>
	<lastBuildDate>Thu, 01 Jan 2026 09:37:33 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://firsthackersnews.com/wp-content/uploads/2026/03/cropped-FHN_512x512-32x32.png</url>
	<title>Email servers &#8211; First Hackers News</title>
	<link>https://firsthackersnews.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>AI-Driven Phishing Kit Targets Microsoft Accounts</title>
		<link>https://firsthackersnews.com/ai-driven-phishing-kit/</link>
					<comments>https://firsthackersnews.com/ai-driven-phishing-kit/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 30 Dec 2025 07:03:04 +0000</pubDate>
				<category><![CDATA[AI Malware]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Email servers]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[account takeover]]></category>
		<category><![CDATA[ai phishing]]></category>
		<category><![CDATA[credential theft]]></category>
		<category><![CDATA[email security]]></category>
		<category><![CDATA[microsoft security]]></category>
		<category><![CDATA[outlook phishing]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Phishing Kit]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10878</guid>

					<description><![CDATA[<p>Since March 2025, attackers running a Spanish-language phishing campaign have been going after Microsoft Outlook accounts. The phishing</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/ai-driven-phishing-kit/">AI-Driven Phishing Kit Targets Microsoft Accounts</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Since March 2025, attackers running a Spanish-language phishing campaign have been going after Microsoft Outlook accounts. The phishing tool they use appears advanced and likely built with help from AI.</p>



<h2 class="wp-block-heading"><strong>AI-Driven Phishing Kit </strong></h2>



<p>Researchers track the activity using a small but unusual clue: four mushroom emojis hidden inside the text “OUTL.” So far, this marker has been linked to more than 75 separate attack setups.</p>



<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="1020" height="1024" src="https://firsthackersnews.com/wp-content/uploads/2025/12/image-12-1020x1024.png" alt="" class="wp-image-10879" srcset="https://firsthackersnews.com/wp-content/uploads/2025/12/image-12-66x66.png 66w, https://firsthackersnews.com/wp-content/uploads/2025/12/image-12-150x150.png 150w, https://firsthackersnews.com/wp-content/uploads/2025/12/image-12-200x201.png 200w, https://firsthackersnews.com/wp-content/uploads/2025/12/image-12-300x300.png 300w, https://firsthackersnews.com/wp-content/uploads/2025/12/image-12-400x402.png 400w, https://firsthackersnews.com/wp-content/uploads/2025/12/image-12-600x602.png 600w, https://firsthackersnews.com/wp-content/uploads/2025/12/image-12-768x771.png 768w, https://firsthackersnews.com/wp-content/uploads/2025/12/image-12-800x803.png 800w, https://firsthackersnews.com/wp-content/uploads/2025/12/image-12-1020x1024.png 1020w, https://firsthackersnews.com/wp-content/uploads/2025/12/image-12-1200x1205.png 1200w, https://firsthackersnews.com/wp-content/uploads/2025/12/image-12.png 1280w" sizes="(max-width: 1020px) 100vw, 1020px" /><figcaption class="wp-element-caption"><em>Source – The Sage Hollow</em></figcaption></figure>



<p>The attackers collect stolen email usernames and passwords, along with the victim’s IP address and location. This information is then sent to the attackers using Telegram and Discord.</p>



<p>To trick users, the phishing page copies the Outlook login screen and displays prompts in Spanish, making it look legitimate to victims.</p>



<p>After a victim enters their login details, the phishing tool quickly adds extra context to the stolen data. It checks the user’s IP address using api.ipify.org and pulls location details from ipapi.co.</p>



<p>This data collection happens instantly, before the stolen credentials are sent to the attackers.</p>



<p>The campaign shows careful planning. Even though the attackers change how the code is hidden, the way the operation runs stays mostly the same.</p>



<p>Sage Hollow researchers first spotted the activity by noticing the repeated mushroom emoji marker, which helped them trace more related attacks.</p>



<p>Over time, the phishing kit has appeared in multiple versions. Some use heavy obfuscation and anti-analysis tricks, while others are left completely open and resemble AI-generated code. The latest version, <strong>disBLOCK.js</strong>, uses clean formatting, clear function names, and Spanish comments explaining each step — signs that the code was likely generated with AI rather than written fully by hand.</p>



<h2 class="wp-block-heading"><strong>How the Phishing Kit Works</strong></h2>



<p>The phishing tool is designed with separate pieces, keeping its settings away from the main logic. In earlier versions, a file called <em>xjsx.js</em> was used to store Telegram bot details with only basic hiding techniques.</p>



<p>When someone enters their login details on the fake page, the tool runs through a set process. It checks whether the email address is valid, then reaches out to external services to collect IP and location information.</p>



<p>All stolen data is bundled into a standard message format and sent over regular HTTPS connections. The attackers use either Telegram bots or Discord webhooks to receive this information.</p>



<p>Newer samples rely more on Discord webhooks because they work as one-way channels. Even if the link is discovered, past data cannot be viewed.</p>



<p>This setup points to a shared phishing platform, where multiple attackers reuse the same toolkit across different campaigns.</p>



<h2 class="wp-block-heading"><strong>Security Recommendations</strong></h2>



<ul class="wp-block-list">
<li>Organizations should enable phishing-resistant MFA on Microsoft accounts to reduce the impact of stolen passwords.</li>



<li>Email gateways should be tuned to detect look-alike Outlook login pages and block messages that redirect users to external authentication sites.</li>



<li>Security teams should monitor outbound traffic for suspicious connections to Telegram bot APIs and Discord webhooks, especially from user workstations.</li>



<li>User awareness remains critical. Employees should be reminded to verify login pages and avoid entering credentials through email links.</li>



<li>Incident response teams should reset affected credentials immediately and review sign-in logs for abnormal locations and IP addresses.</li>
</ul>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/ai-driven-phishing-kit/">AI-Driven Phishing Kit Targets Microsoft Accounts</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/ai-driven-phishing-kit/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>iCloud Calendar Phishing Scam: Cybercriminals Use Apple’s Servers</title>
		<link>https://firsthackersnews.com/icloud-calendar-phishing-scam-cybercriminals-use-apples-servers/</link>
					<comments>https://firsthackersnews.com/icloud-calendar-phishing-scam-cybercriminals-use-apples-servers/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 08 Sep 2025 05:45:12 +0000</pubDate>
				<category><![CDATA[Cybercriminals]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Email servers]]></category>
		<category><![CDATA[icloud]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[#AppleSecurity]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreat]]></category>
		<category><![CDATA[#iCloudCalenda]]></category>
		<category><![CDATA[#iCloudPhishing]]></category>
		<category><![CDATA[#PhishingAttack]]></category>
		<category><![CDATA[#PhishingScam]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10485</guid>

					<description><![CDATA[<p>Cybercriminals are misusing iCloud Calendar to send phishing emails from Apple’s servers. These fake emails look like purchase</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/icloud-calendar-phishing-scam-cybercriminals-use-apples-servers/">iCloud Calendar Phishing Scam: Cybercriminals Use Apple’s Servers</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Cybercriminals are misusing <strong>iCloud Calendar</strong> to send <strong>phishing emails</strong> from <strong>Apple’s servers</strong>. These fake emails look like purchase alerts and trick users. Consequently, they often slip past <strong>spam filters</strong>. This <strong>cybersecurity threat</strong> shows how clever <strong>phishing scams</strong> have become. Therefore, let’s explore how it works, why it’s dangerous, and how to stay safe.</p>



<h2 class="wp-block-heading"><strong>How the iCloud Calendar Phishing Scam Works</strong></h2>



<p>Attackers use <strong>iCloud Calendar invites</strong> to send fake emails. These emails come from <strong>Apple’s servers</strong>, so they seem real. Here’s how the scam operates:</p>



<ul class="wp-block-list">
<li><strong>Fake Alerts</strong>: The emails pretend to be purchase or account notifications. Thus, users think they’re from Apple.</li>



<li><strong>Bypassing Filters</strong>: Since they use <strong>Apple’s servers</strong>, <strong>spam filters</strong> often miss them. As a result, they reach your inbox.</li>



<li><strong>Dangerous Links</strong>: The invites have links to <strong>phishing websites</strong>. These sites steal your <strong>login details</strong> or install <strong>malware</strong> like <strong>Agent Tesla</strong>.</li>
</ul>



<p>For example, similar scams have targeted <strong>Google Calendar</strong> and <strong>Microsoft 365</strong>, showing a growing trend.</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" width="1024" height="832" src="https://firsthackersnews.com/wp-content/uploads/2025/09/icloud-calendar-phishing-1024x832.jpg" alt="" class="wp-image-10486" style="width:730px;height:auto" srcset="https://firsthackersnews.com/wp-content/uploads/2025/09/icloud-calendar-phishing-200x163.jpg 200w, https://firsthackersnews.com/wp-content/uploads/2025/09/icloud-calendar-phishing-300x244.jpg 300w, https://firsthackersnews.com/wp-content/uploads/2025/09/icloud-calendar-phishing-400x325.jpg 400w, https://firsthackersnews.com/wp-content/uploads/2025/09/icloud-calendar-phishing-600x488.jpg 600w, https://firsthackersnews.com/wp-content/uploads/2025/09/icloud-calendar-phishing-768x624.jpg 768w, https://firsthackersnews.com/wp-content/uploads/2025/09/icloud-calendar-phishing-800x650.jpg 800w, https://firsthackersnews.com/wp-content/uploads/2025/09/icloud-calendar-phishing-1024x832.jpg 1024w, https://firsthackersnews.com/wp-content/uploads/2025/09/icloud-calendar-phishing-1200x975.jpg 1200w, https://firsthackersnews.com/wp-content/uploads/2025/09/icloud-calendar-phishing-1536x1248.jpg 1536w, https://firsthackersnews.com/wp-content/uploads/2025/09/icloud-calendar-phishing.jpg 1600w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>This <strong>iCloud Calendar phishing scam</strong> is risky for several reasons:</p>



<ul class="wp-block-list">
<li><strong>Trusted Source</strong>: Emails from <strong>Apple’s servers</strong> look genuine. Hence, users trust them more.</li>



<li><strong>Wide Reach</strong>: Millions use <strong>iCloud</strong>. Therefore, attackers can target many people.</li>



<li><strong>Sneaky Methods</strong>: Attackers use <strong>SVG attachments</strong> to dodge <strong>email filters</strong>. This helps them spread <strong>malware</strong> or steal data.</li>
</ul>



<p>In short, this scam exploits trust in Apple, making it very dangerous.</p>



<h2 class="wp-block-heading"><strong>How to Stay Safe from Phishing Scams</strong></h2>



<ul class="wp-block-list">
<li><strong>Check the Sender</strong>: Look closely at the email address. Even if it seems like Apple’s, check for odd details.</li>



<li><strong>Avoid Strange Links</strong>: Don’t click links in unexpected <strong>calendar invites</strong>. Instead, delete them.</li>



<li><strong>Use Two-Factor Authentication</strong>: Turn on <strong>2FA</strong> for your <strong>Apple ID</strong>. This adds extra security.</li>



<li><strong>Update Security Tools</strong>: Keep your <strong>antivirus</strong> software current to catch <strong>malware</strong>.</li>



<li><strong>Report Suspicious Emails</strong>: If an invite looks fishy, report it to Apple and delete it.</li>
</ul>



<p>By following these steps, you can stay safe from <strong>phishing attacks</strong>.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/icloud-calendar-phishing-scam-cybercriminals-use-apples-servers/">iCloud Calendar Phishing Scam: Cybercriminals Use Apple’s Servers</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/icloud-calendar-phishing-scam-cybercriminals-use-apples-servers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>SMTP Smuggling Emerges as a Fresh Email Security Concern</title>
		<link>https://firsthackersnews.com/smtp-smuggling/</link>
					<comments>https://firsthackersnews.com/smtp-smuggling/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 08 Jan 2024 18:03:02 +0000</pubDate>
				<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[Compromised]]></category>
		<category><![CDATA[Darknet]]></category>
		<category><![CDATA[Email servers]]></category>
		<category><![CDATA[Evilproxy]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[IOC's]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[email security]]></category>
		<category><![CDATA[email server]]></category>
		<category><![CDATA[email transmission process]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[SMTP]]></category>
		<category><![CDATA[SMTP protocol]]></category>
		<category><![CDATA[targeted attack]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=7274</guid>

					<description><![CDATA[<p>An innovative SMTP Smuggling technique has been reported with the capability to circumvent current security protocols. Additionally, it</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/smtp-smuggling/">SMTP Smuggling Emerges as a Fresh Email Security Concern</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>An innovative SMTP Smuggling technique has been reported with the capability to circumvent current security protocols. Additionally, it empowers attackers to send forged emails that appear to originate from authentic addresses. This could inject renewed vitality into email spam, as its effectiveness has not waned over the recent period.</p>



<h2 class="wp-block-heading"><strong>WHAT IS SMTP SMUGGLING?</strong></h2>



<p>SMTP (Simple Mail Transfer Protocol) Smuggling is a technique used by attackers to manipulate the behavior of mail servers during the email transmission process. It involves exploiting inconsistencies or variations in the way different servers interpret and implement the SMTP protocol.</p>



<p>In a typical SMTP transaction, there are two phases: the client&#8217;s request to the server (DATA phase) and the server&#8217;s response. SMTP Smuggling takes advantage of discrepancies in how proxy servers and mail servers interpret the length of the message content during these phases.</p>



<p>By carefully crafting the headers and body of an email, attackers can deceive the servers into misinterpreting the message length, leading to discrepancies between the front-end proxy server and the back-end mail server. This can result in various security issues, such as bypassing security filters, evading detection, and enabling malicious activities like spoofing or injecting arbitrary content into emails.</p>



<p>SMTP Smuggling attacks are a type of protocol-level manipulation, exploiting the intricacies of communication between different components in the email delivery process. Defending against SMTP Smuggling often involves implementing secure and consistent configurations across all involved mail servers and proxies to prevent the exploitation of these protocol variations.</p>



<figure class="wp-block-image size-large"><img decoding="async" width="823" height="437" src="https://firsthackersnews.com/wp-content/uploads/2024/01/image.png" alt="" class="wp-image-7275" srcset="https://firsthackersnews.com/wp-content/uploads/2024/01/image-200x106.png 200w, https://firsthackersnews.com/wp-content/uploads/2024/01/image-300x159.png 300w, https://firsthackersnews.com/wp-content/uploads/2024/01/image-400x212.png 400w, https://firsthackersnews.com/wp-content/uploads/2024/01/image-600x319.png 600w, https://firsthackersnews.com/wp-content/uploads/2024/01/image-768x408.png 768w, https://firsthackersnews.com/wp-content/uploads/2024/01/image-800x425.png 800w, https://firsthackersnews.com/wp-content/uploads/2024/01/image.png 823w" sizes="(max-width: 823px) 100vw, 823px" /></figure>



<p>SMTP smuggling centers around inconsistencies in how distinct servers process the end-of-data sequence (&lt;CR&gt;&lt;LF&gt;.&lt;CR&gt;&lt;LF&gt;). Through exploiting these variations, attackers can escape the standard message data, introducing unauthorized commands. </p>



<p>This method relies on the inbound server&#8217;s ability to accept multiple SMTP commands in a batch, a functionality widely supported by most servers today.</p>



<p>Thorough investigation into this vulnerability has uncovered that SMTP servers belonging to major email providers such as Microsoft, GMX, and Cisco are susceptible to this exploit. Although Microsoft and GMX have taken steps to address these issues, Cisco has categorized the findings as a feature rather than a vulnerability and has opted not to modify the default configuration.</p>



<h2 class="wp-block-heading"><strong>WHAT IS THE DANGER OF SMTP VULNERABILITY?</strong></h2>



<p>SMTP smuggling poses alarming implications as attackers can send deceptive emails from seemingly credible sources, evading authentication checks like DKIM, DMARC, and SPF.</p>



<p>In essence, employing this technique could allow fraudsters to infiltrate corporate emails previously immune to spam. While companies implementing this security method are likely cognizant of the risks and employ additional protective measures, the exposure itself increases the overall vulnerability to potential cyberattacks.</p>



<h2 class="wp-block-heading"><strong>MITIGATING THE EFFECTS OF VULNERABILITY</strong></h2>



<p>To mitigate the effects of SMTP vulnerability:</p>



<ol class="wp-block-list"><li><strong>Implement Security Updates:</strong> Regularly update and patch SMTP servers to address known vulnerabilities and ensure they are equipped with the latest security measures.</li><li><strong>Enable Encryption:</strong> Utilize encryption mechanisms, such as STARTTLS, to secure the communication channels between SMTP servers and prevent eavesdropping or unauthorized access.</li><li><strong>Protocol Compliance:</strong> Ensure that SMTP servers adhere to standardized protocols and follow best practices to minimize the risk of exploitation through protocol-level vulnerabilities.</li><li><strong>Network Monitoring:</strong> Implement robust network monitoring tools to detect unusual SMTP traffic patterns, which may indicate potential exploitation or malicious activities.</li><li><strong>Authentication Mechanisms:</strong> Strengthen authentication mechanisms, including enforcing strong passwords and implementing multi-factor authentication, to prevent unauthorized access to SMTP servers.</li><li><strong>Implement Access Controls:</strong> Configure access controls to restrict access to SMTP servers only to authorized personnel, reducing the risk of unauthorized manipulation or exploitation.</li><li><strong>Regular Security Audits:</strong> Conduct regular security audits and vulnerability assessments to identify and address potential weaknesses in the SMTP infrastructure.</li><li><strong>User Awareness Training:</strong> Educate users about phishing attacks and social engineering tactics that may exploit SMTP vulnerabilities, emphasizing vigilance in email interactions.</li><li><strong>Intrusion Detection and Prevention:</strong> Deploy intrusion detection and prevention systems to monitor and block suspicious activities or unauthorized access attempts targeting SMTP servers.</li><li><strong>Collaborate with Vendors:</strong> Stay informed about vendor advisories, security updates, and patches related to SMTP vulnerabilities, and promptly apply recommended mitigations.</li><li><strong>Incident Response Plan:</strong> Develop and maintain an incident response plan specific to SMTP vulnerabilities, outlining procedures for detecting, responding to, and recovering from potential security incidents.</li><li><strong>Backup and Recovery:</strong> Regularly back up critical email data and ensure the availability of efficient recovery mechanisms to minimize data loss in the event of a security breach.</li></ol>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"><p>&#x200d;Follow Us on:<strong> <a rel="noreferrer noopener" href="https://twitter.com/Info_FHNews" target="_blank">Twitter</a>,<a rel="noreferrer noopener" href="https://www.instagram.com/first_hackers_news/" target="_blank"> Instagram</a>, <a rel="noreferrer noopener" href="https://www.linkedin.com/in/firsthackers-news/" target="_blank">Facebook</a></strong> to get the latest security news!</p></blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/smtp-smuggling/">SMTP Smuggling Emerges as a Fresh Email Security Concern</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/smtp-smuggling/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Kinsta Alerts About Phishing Campaign on Google Ads</title>
		<link>https://firsthackersnews.com/kinsta-alerts-phishing-campaign/</link>
					<comments>https://firsthackersnews.com/kinsta-alerts-phishing-campaign/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 19 Dec 2023 03:19:06 +0000</pubDate>
				<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[Compromised]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Email servers]]></category>
		<category><![CDATA[Evilproxy]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[IOC's]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Spam]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[google ads]]></category>
		<category><![CDATA[Kinsta alerts]]></category>
		<category><![CDATA[malicious actor]]></category>
		<category><![CDATA[malicious cyber threat]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[phishing campaign]]></category>
		<category><![CDATA[phishing email]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[Suspicious Email]]></category>
		<category><![CDATA[wordpress]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=7217</guid>

					<description><![CDATA[<p>Kinsta, a leading WordPress hosting provider, has alerted its customers to a troubling cybersecurity development. Cybercriminals are exploiting</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/kinsta-alerts-phishing-campaign/">Kinsta Alerts About Phishing Campaign on Google Ads</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Kinsta, a leading WordPress hosting provider, has alerted its customers to a troubling cybersecurity development. </p>



<p>Cybercriminals are exploiting Google Search Ads to promote phishing websites, with a focus on pilfering user credentials—especially those associated with Kinsta&#8217;s crucial service, MyKinsta, used for managing WordPress and other cloud-based applications.</p>



<h2 class="wp-block-heading"><strong>KINSTA PHISHING: HACKERS EXPLOIT GOOGLE ADS</strong></h2>



<p>In an email notification, Kinsta reveals that cybercriminals are employing Google Ads as their primary method for phishing attacks. </p>



<p>These malicious actors intentionally focus on individuals who have previously visited Kinsta&#8217;s official websites. They create deceptive websites closely resembling Kinsta&#8217;s own, skillfully luring users to click on them.</p>



<p>The email from Kinsta states:</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="751" height="373" src="https://firsthackersnews.com/wp-content/uploads/2023/12/image.png" alt="" class="wp-image-7218" srcset="https://firsthackersnews.com/wp-content/uploads/2023/12/image-200x99.png 200w, https://firsthackersnews.com/wp-content/uploads/2023/12/image-300x149.png 300w, https://firsthackersnews.com/wp-content/uploads/2023/12/image-400x199.png 400w, https://firsthackersnews.com/wp-content/uploads/2023/12/image-600x298.png 600w, https://firsthackersnews.com/wp-content/uploads/2023/12/image.png 751w" sizes="auto, (max-width: 751px) 100vw, 751px" /></figure>



<p>The main goal was to entice users to input their Kinsta login credentials on the fraudulent website. Once obtained, attackers could leverage these credentials to access users&#8217; WordPress websites, potentially leading to severe consequences. This may involve:</p>



<ul class="wp-block-list"><li>Compromised websites may expose sensitive information, including customer data, financial details, and intellectual property. </li><li>Attackers could inject malicious code into compromised websites, redirecting visitors to phishing sites or facilitating the spread of malware. The website&#8217;s content may be defaced or substituted with malicious messages.</li><li> Access to payment gateways or sensitive financial information could result in financial losses for users or their clients.</li><li> A successful phishing attack might tarnish Kinsta&#8217;s reputation, raising concerns about its security measures and eroding user trust.</li></ul>



<p>Google Ads, a widely-used advertising platform, is regrettably gaining popularity among hackers and cybercriminals, who exploit its broad reach and visibility for various malicious activities.</p>



<p>Google Ads were used to promote counterfeit downloads for popular software such as Grammarly, MSI Afterburner, Slack, Dashlane, Malwarebytes, Audacity, μTorrent, OBS, Ring, AnyDesk, Libre Office, Teamviewer, Thunderbird, and Brave on several websites.</p>



<h2 class="wp-block-heading"><strong>PROTECTING AGAINST PHISHING THREATS</strong></h2>



<p>To safeguard against phishing threats:</p>



<ol class="wp-block-list"><li><strong>Stay Informed:</strong> Stay updated on the latest phishing tactics and techniques.</li><li><strong>Verify Emails:</strong> Verify the legitimacy of emails, especially those requesting sensitive information or containing unexpected links.</li><li><strong>Use Security Software:</strong> Employ reliable antivirus and anti-phishing tools to detect and prevent phishing attempts.</li><li><strong>Check URLs:</strong> Hover over links to preview the destination URL before clicking. Be cautious of misspellings or slight variations in web addresses.</li><li><strong>Enable Two-Factor Authentication (2FA):</strong> Add an extra layer of security by enabling 2FA on your accounts.</li><li><strong>Educate Users:</strong> Provide training and awareness programs to educate individuals about recognizing and avoiding phishing attempts.</li><li><strong>Report Suspicious Emails:</strong> Encourage users to report any suspicious emails promptly.</li><li><strong>Regularly Update Software:</strong> Keep software, browsers, and security tools up to date to patch vulnerabilities.</li><li><strong>Use Secure Connections:</strong> Ensure that websites use HTTPS, and avoid entering sensitive information on unsecured sites.</li><li><strong>Implement Email Filtering:</strong> Utilize advanced email filtering systems to identify and block phishing emails before they reach users.</li><li><strong>Employ DMARC Protection:</strong> Implement DMARC (Domain-based Message Authentication, Reporting, and Conformance) to prevent email spoofing.</li><li><strong>Conduct Simulated Phishing Tests:</strong> Regularly conduct simulated phishing tests to evaluate users&#8217; susceptibility and reinforce security awareness.</li></ol>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/kinsta-alerts-phishing-campaign/">Kinsta Alerts About Phishing Campaign on Google Ads</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/kinsta-alerts-phishing-campaign/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Google Introduces RETVec: Gmail&#8217;s Latest Safeguard Against Spam and Malicious Emails</title>
		<link>https://firsthackersnews.com/google-introduces-retvec-gmails/</link>
					<comments>https://firsthackersnews.com/google-introduces-retvec-gmails/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 01 Dec 2023 02:24:43 +0000</pubDate>
				<category><![CDATA[Tips]]></category>
		<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[Compromised]]></category>
		<category><![CDATA[Email servers]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[email security]]></category>
		<category><![CDATA[gmail]]></category>
		<category><![CDATA[google]]></category>
		<category><![CDATA[malicious emails]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[Spam]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=7161</guid>

					<description><![CDATA[<p>Google has unveiled RETVec (Resilient and Efficient Text Vectorizer), a new multilingual text vectorizer designed to enhance Gmail&#8217;s</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/google-introduces-retvec-gmails/">Google Introduces RETVec: Gmail&#8217;s Latest Safeguard Against Spam and Malicious Emails</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Google has unveiled RETVec (Resilient and Efficient Text Vectorizer), a new multilingual text vectorizer designed to enhance Gmail&#8217;s capability in detecting potentially harmful content, including spam and malicious emails.</p>



<p>According to the project&#8217;s GitHub description, RETVec undergoes training to exhibit resilience against character-level manipulations, encompassing insertion, deletion, typos, homoglyphs, LEET substitution, and other variations.</p>



<p>The RETVec model undergoes training using an innovative character encoder that efficiently encodes all UTF-8 characters and words.</p>



<p>While major platforms such as Gmail and YouTube depend on text classification models to detect phishing attacks, inappropriate comments, and scams, threat actors are known to develop counter-strategies to evade these defense measures. </p>



<p>They have been observed employing adversarial text manipulations, ranging from homoglyph usage to keyword stuffing and even incorporating invisible characters.</p>



<p><br>RETVec, with its out-of-the-box compatibility for over 100 languages, strives to contribute to the development of more resilient and efficient server-side and on-device text classifiers, emphasizing robustness and efficiency.</p>



<p>Vectorization, a methodology in natural language processing (NLP), involves mapping words or phrases from vocabulary to corresponding numerical representations. This process facilitates further analysis, including sentiment analysis, text classification, and named entity recognition.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"><p>&#x200d;Follow Us on:<strong> <a rel="noreferrer noopener" href="https://twitter.com/Info_FHNews" target="_blank">Twitter</a>,<a rel="noreferrer noopener" href="https://www.instagram.com/first_hackers_news/" target="_blank"> Instagram</a>, <a rel="noreferrer noopener" href="https://www.linkedin.com/in/firsthackers-news/" target="_blank">Facebook</a></strong> to get the latest security news!</p></blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/google-introduces-retvec-gmails/">Google Introduces RETVec: Gmail&#8217;s Latest Safeguard Against Spam and Malicious Emails</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/google-introduces-retvec-gmails/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Ensuring Your Security During Black Friday and Cyber Monday 2023</title>
		<link>https://firsthackersnews.com/black-friday-cyber-monday/</link>
					<comments>https://firsthackersnews.com/black-friday-cyber-monday/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 27 Nov 2023 18:21:46 +0000</pubDate>
				<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Darknet]]></category>
		<category><![CDATA[Email servers]]></category>
		<category><![CDATA[Evilproxy]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[IOC's]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Spam]]></category>
		<category><![CDATA[Black friday]]></category>
		<category><![CDATA[cyber monday]]></category>
		<category><![CDATA[malicious emails]]></category>
		<category><![CDATA[safety check]]></category>
		<category><![CDATA[securing emails]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security recommendation]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=7155</guid>

					<description><![CDATA[<p>Annually, the holiday season kicks off with the significant retail shopping events in the U.S., Black Friday and</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/black-friday-cyber-monday/">Ensuring Your Security During Black Friday and Cyber Monday 2023</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Annually, the holiday season kicks off with the significant retail shopping events in the U.S., Black Friday and Cyber Monday, occurring on the Friday and Monday following Thanksgiving.</p>



<p>Anticipated to surpass 2022 sales, Black Friday and Cyber Monday on November 24 and November 27, 2023, are projected to outperform previous records. In 2022, consumer spending peaked at $9.12 billion on Black Friday and $11.3 billion on Cyber Monday, with global online sales reaching $40 billion by 5 PM ET, as per Salesforce analytics.</p>



<p>Yet, the shopping frenzy also presents a significant opportunity for financially-motivated cybercriminals to exploit unsuspecting shoppers, capitalizing on their ignorance.</p>



<p>Here are the key points consumers and enterprises should be aware of for a secure and prosperous shopping season:</p>



<h2 class="wp-block-heading"><strong>Watch Out for Malicious Emails</strong></h2>



<p>Phishing stands out as a prevalent method through which cybercriminals aim to lure their targets into malicious activities. Whether through phishing and spear phishing emails, smishing messages, or vishing calls disguised as promotional offers, the real intent is often to deliver malware or pilfer credentials and financial information.</p>



<p><br>&#8220;The key advice for employees is to remain cautious of email promotions advertising products at prices that seem too good to be true. It&#8217;s crucial to enhance staff awareness and education on phishing emails, including the tactics criminals use, such as spoofing websites to steal credit card data and passwords,&#8221; emphasized Boyd.</p>



<p>Recognizable signs of phishing encompass unsolicited communication, grammatical errors, content inducing a sense of urgency, unexpected attachments, unfamiliar sender addresses, and communications at unusual hours.</p>



<p>Boyd suggests employees avoid using the same password across multiple online accounts, opting instead for multifactor authentication and employing email security tools.</p>



<h2 class="wp-block-heading"><strong>Adopt Email Marketing Policy Change</strong></h2>



<p><br>In October 2023, Google and Yahoo unveiled a marketing email policy change focused on authenticating messages to enhance spam and scam prevention. The policy mandates that companies sending over 5,000 emails on either platform must implement the following three authentication methods:</p>



<ol class="wp-block-list"><li>Sender Policy Framework (SPF)</li><li>Domain Keys Identified Mail (DKIM)</li><li>Domain-based Message Authentication Reporting and Conformance (DMARC)</li></ol>



<p>&#8220;Recent announcements by Google and Yahoo are reshaping the intersection of marketing and cybersecurity, transforming email authentication standards from recommended best practices to mandatory marketing requirements. Unauthenticated messages will be rejected, shifting SPF, DKIM, and DMARC from the SOC to the boardroom, redefining the email marketing baseline,&#8221; said Seth Blank, CTO at Valimail, to Spiceworks.</p>



<p>The new policy is set to take effect in February 2023 for Google and Q1 2024 for Yahoo. Blank emphasized that 2023 is notably distinct, as marketers seek to swiftly distinguish themselves from scammers.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"><p>&#x200d;Follow Us on:<strong> <a rel="noreferrer noopener" href="https://twitter.com/Info_FHNews" target="_blank">Twitter</a>,<a rel="noreferrer noopener" href="https://www.instagram.com/first_hackers_news/" target="_blank"> Instagram</a>, <a rel="noreferrer noopener" href="https://www.linkedin.com/in/firsthackers-news/" target="_blank">Facebook</a></strong> to get the latest security news!</p></blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/black-friday-cyber-monday/">Ensuring Your Security During Black Friday and Cyber Monday 2023</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/black-friday-cyber-monday/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The importance of email marketing for businesses</title>
		<link>https://firsthackersnews.com/email-marketing/</link>
					<comments>https://firsthackersnews.com/email-marketing/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 09 Oct 2023 15:37:05 +0000</pubDate>
				<category><![CDATA[Compromised]]></category>
		<category><![CDATA[Email servers]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[IOC's]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Regulation]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Tips]]></category>
		<category><![CDATA[email]]></category>
		<category><![CDATA[email marketing]]></category>
		<category><![CDATA[email security]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=7007</guid>

					<description><![CDATA[<p>In the contemporary era dominated by technology and social media, email marketing continues to stand out as a</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/email-marketing/">The importance of email marketing for businesses</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>In the contemporary era dominated by technology and social media, <a href="https://firsthackersnews.com/dont-lose-important-emails-ingmail/">email marketing </a>continues to stand out as a highly effective promotional technique for businesses. Despite the growing prominence of social media, email marketing continues to provide substantial opportunities for businesses.</p>



<h2 class="wp-block-heading"><strong>All about Email Marketing:</strong></h2>



<p><a href="https://firsthackersnews.com/dont-lose-important-emails-ingmail/">Email</a> marketing represents a form of direct communication, specifically tailored to users displaying interest in a company&#8217;s products or services. This approach enables messages to directly reach customers, facilitating personalized communication. </p>



<p>However, it&#8217;s important to note that this can occasionally result in higher bounce rates, while also fostering greater customer engagement.</p>



<p><a href="https://firsthackersnews.com/dont-lose-important-emails-ingmail/">Email</a> marketing places human contact at the core of promotional strategies. Rather than depending solely on impersonal methods, it seeks to establish a personal channel of communication with customers, rendering the communication more direct and authentic.</p>



<p>Via an email address, messages are crafted and promptly delivered to the recipient, fostering interaction by enabling customers to respond. Most importantly, this approach allows for the personalization of communication, as messages can be customized to align with the unique needs and interests of individual clients.</p>



<p>Emails should be carefully crafted to convey vital information regarding the products or services offered by the company.</p>



<h2 class="wp-block-heading"><strong>Types of Email Marketing&nbsp;</strong></h2>



<p>To harness the full potential of email marketing, it is crucial to familiarize yourself with the various types of marketing emails at your disposal. Strategies and approaches may differ depending on the email type, and each of them can confer specific advantages for your business.</p>



<ol class="wp-block-list"><li>Informational Emails: Informational emails serve as a valuable tool in email marketing. They are designed to deliver essential information to your customers, such as announcing new products or upcoming offers.</li><li>Transactional Emails: Transactional emails are dispatched following a successful transaction. These emails can also be utilized to promote additional products or services to customers.</li><li>Regular Newsletters: Regular newsletters represent a highly effective technique for maintaining engagement with your audience. They provide a consistent means of communicating important updates, promotions, and valuable content to your subscribers.</li></ol>



<h2 class="wp-block-heading"><strong>The benefits of email marketing for your business growth</strong></h2>



<p>Email marketing offers numerous benefits for your business growth. Here are some of the key advantages:</p>



<ol class="wp-block-list"><li><strong>Cost-Effective</strong>: Email marketing is one of the most cost-effective forms of marketing. It doesn&#8217;t require the same advertising expenses as traditional media or paid social media campaigns. You can reach a large audience with a relatively small budget.</li><li><strong>Targeted Audience</strong>: With email marketing, you can segment your audience based on various factors such as demographics, purchase history, or engagement level. This allows you to send highly targeted and relevant content to different groups, increasing the likelihood of conversions.</li><li><strong>High ROI</strong>: Email marketing consistently delivers a high return on investment (ROI). When done effectively, it can generate significant revenue for your business. The low cost and ability to reach a receptive audience contribute to its high ROI.</li><li><strong>Personalization</strong>: Email marketing allows for personalization, which enhances the customer experience. You can address recipients by their names and tailor content to their preferences, increasing engagement and conversion rates.</li><li><strong>Automation</strong>: Email marketing platforms offer automation features that enable you to send automated messages based on triggers, such as welcome emails, abandoned cart reminders, and follow-up emails. Automation saves time and ensures timely communication with customers.</li><li><strong>Measurable Results</strong>: Email marketing provides detailed metrics and analytics, allowing you to track open rates, click-through rates, conversion rates, and more. This data helps you refine your strategies and make data-driven decisions.</li><li><strong>Increased Traffic</strong>: Email marketing can drive traffic to your website, blog, or social media profiles. You can include links in your emails to direct recipients to specific landing pages, increasing website visits and engagement.</li><li><strong>Builds Customer Loyalty</strong>: Consistent and valuable email communication can strengthen your relationship with customers. It keeps your brand top-of-mind and encourages repeat purchases, fostering customer loyalty.</li><li><strong>Global Reach</strong>: Email marketing enables you to reach a global audience. You can send emails to subscribers and customers anywhere in the world, expanding your business&#8217;s reach beyond geographical boundaries.</li><li><strong>Easily Shareable</strong>: Recipients can easily forward your emails to others who might be interested in your products or services, helping to expand your customer base through word-of-mouth referrals.</li><li><strong>A/B Testing</strong>: You can conduct A/B tests on different elements of your emails, such as subject lines, content, and CTAs. This helps you refine your email marketing strategy for better results.</li><li><strong>Compliance and Privacy</strong>: Adhering to email marketing regulations and respecting subscribers&#8217; privacy is essential. Following best practices and obtaining consent builds trust and maintains a positive reputation.</li></ol>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"><p>&#x200d;Follow Us on:<strong>&nbsp;<a rel="noreferrer noopener" href="https://twitter.com/Info_FHNews" target="_blank">Twitter</a>,<a rel="noreferrer noopener" href="https://www.instagram.com/first_hackers_news/" target="_blank">&nbsp;Instagram</a>,&nbsp;<a rel="noreferrer noopener" href="https://www.linkedin.com/in/firsthackers-news/" target="_blank">Facebook</a></strong>&nbsp;to get the latest security news!</p></blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/email-marketing/">The importance of email marketing for businesses</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/email-marketing/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The rise of phishing scams and how to avoid them.</title>
		<link>https://firsthackersnews.com/phishing-scam/</link>
					<comments>https://firsthackersnews.com/phishing-scam/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 20 Jun 2023 16:43:13 +0000</pubDate>
				<category><![CDATA[phishing]]></category>
		<category><![CDATA[Compromised]]></category>
		<category><![CDATA[Email servers]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Malicious]]></category>
		<category><![CDATA[malicious attachments]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[phishing attacks]]></category>
		<category><![CDATA[phishing campaign]]></category>
		<category><![CDATA[phishing email]]></category>
		<category><![CDATA[phishing scam]]></category>
		<category><![CDATA[phishing site]]></category>
		<category><![CDATA[scam]]></category>
		<category><![CDATA[scammers]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=6581</guid>

					<description><![CDATA[<p>Cybersecurity scams continue to be on the rise. As scammers get smarter, it’s important to stay up to</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/phishing-scam/">The rise of phishing scams and how to avoid them.</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Cybersecurity scams continue to be on the rise. As scammers get smarter, it’s important to stay up to date on the latest trends. One of the best things you can do for yourself is to be able to recognize the signs of a potential phishing scam and how to avoid them.&nbsp;</p>



<p>The <a href="https://firsthackersnews.com/magecart-malware/">attacker</a> may use social engineering techniques to make their email look genuine and include a request to click on a link, open an attachment, or provide other sensitive information, such as login credentials.</p>



<h3 class="wp-block-heading"><strong>How to Spot Phishing emails?</strong></h3>



<p><a href="https://firsthackersnews.com/googles-new-zip-domain/">Phishing emails </a>and text messages often tell a story to trick you into clicking on a link or opening an attachment. You might get an unexpected email or text message that looks like it’s from a company you know or trust, like a bank or credit card or utility company. Or maybe it’s from an online payment website or app. </p>



<p>1. Emails Demanding Urgent Action</p>



<p>2. Emails with Bad Grammar and Spelling Mistakes</p>



<p>3. Emails with an Unfamiliar Greeting or Salutation</p>



<p>4. Inconsistencies in Email Addresses, Links &amp; Domain Names</p>



<p>5. Suspicious Attachments</p>



<p>6. Emails Requesting Login Credentials, Payment Information or Sensitive Data</p>



<h3 class="wp-block-heading"><strong>How to Avoid scams:</strong></h3>



<p><strong>1. Keep Informed About Phishing Techniques</strong>&nbsp;– New phishing scams are being developed all the time. Without staying on top of these new phishing techniques, you could inadvertently fall prey to one. Keep your eyes on news about new phishing scams.</p>



<p><strong>2. Think Before You Click!</strong>&nbsp;&nbsp;–A phishing email may claim to be from a legitimate company and when you click the link to the website, it may look exactly like the real website. The email may ask you to fill in the information, but the email may not contain your name. Most phishing emails will start with “Dear Customer” so you should be alert when you come across these emails. When in doubt, go directly to the source rather than clicking a potentially dangerous link.</p>



<p><strong>3. Install an Anti-Phishing Toolbar</strong>&nbsp;– Most popular Internet browsers can be customized with anti-phishing toolbars. Such toolbars run quick checks on the sites that you are visiting and compare them to lists of known phishing sites. If you stumble upon a malicious site, the toolbar will alert you about it.</p>



<p><strong>4. Verify a Site’s Security&nbsp;–&nbsp;</strong>&nbsp;Make sure the site’s URL begins with “https” and there should be a closed lock icon near the address bar. Check for the site’s security certificate as well.&nbsp;&nbsp;Never download files from suspicious emails or websites. Even search engines may show certain links which may lead users to a phishing webpage which offers low cost products.</p>



<p><strong>5. Check Your Online Accounts Regularly</strong>&nbsp;–To prevent bank phishing and credit card phishing scams, you should personally check your statements regularly. Get monthly statements for your financial accounts and check each and every entry carefully to ensure no fraudulent transactions have been made without your knowledge.</p>



<p><strong>6. Keep Your Browser Up to Date</strong>&nbsp;–&nbsp;&nbsp;Security patches are released for popular browsers all the time. They are released in response to the security loopholes that phishers and other hackers inevitably discover and exploit.</p>



<p><strong>7. Use Firewalls</strong>&nbsp;–Firewalls are an effective way to prevent external attacks, acting as a shield between your computer and an attacker. Both desktop firewalls and network firewalls, when used together, can bolster your security and reduce the chances of a hacker infiltrating your environment.&nbsp;</p>



<p><strong>8. Be Wary of Pop-Ups</strong>&nbsp;–Pop-up phishing involves fraudulent messages that “pop up” for users when they are surfing the web. In many cases cyber criminals infect otherwise legitimate websites with malicious code that causes these pop-up messages to appear when people visit them.</p>



<p><strong>9. Use Antivirus Software</strong>&nbsp;–&nbsp;Special signatures that are included with antivirus software guard against known technology workarounds and loopholes. Just be sure to keep your software up to date.</p>



<p><strong>10.Eliminate the Obvious</strong>&nbsp;–&nbsp;Some fake websites are just too poorly implemented to convince anyone who&#8217;s paying attention. If you link to a site and it just looks like garbage, press Ctrl+F5 to totally reload the page, in case the bad appearance was a fluke. But if it still doesn&#8217;t look right, stay away.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/phishing-scam/">The rise of phishing scams and how to avoid them.</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/phishing-scam/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Several Cyber Attacks Observed Leveraging IPFS Decentralized Network</title>
		<link>https://firsthackersnews.com/several-cyber-attacks-observed-leveraging-ipfs/</link>
					<comments>https://firsthackersnews.com/several-cyber-attacks-observed-leveraging-ipfs/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 10 Nov 2022 17:16:12 +0000</pubDate>
				<category><![CDATA[Tips]]></category>
		<category><![CDATA[Compromised]]></category>
		<category><![CDATA[Email servers]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malicious extension]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[C2 framework]]></category>
		<category><![CDATA[cryptocurreny]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[ddos]]></category>
		<category><![CDATA[decentralized network]]></category>
		<category><![CDATA[file system]]></category>
		<category><![CDATA[IOCS]]></category>
		<category><![CDATA[IPFS]]></category>
		<category><![CDATA[IPFS network]]></category>
		<category><![CDATA[peer to peer]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security threat]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[sharing data]]></category>
		<category><![CDATA[threat actors]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=5668</guid>

					<description><![CDATA[<p>A new web3 technology is being abused widely by threat actors, according to security researchers from tech giant</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/several-cyber-attacks-observed-leveraging-ipfs/">Several Cyber Attacks Observed Leveraging IPFS Decentralized Network</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A new web3 technology is being abused widely by threat actors, according to security researchers from tech giant Cisco.</p>



<h2 class="wp-block-heading"><strong>What is IPFS ?</strong></h2>



<p>The InterPlanetary File System (IPFS) is a protocol and peer-to-peer network for storing and sharing data. It is designed to enable decentralized storage of resources on the internet. It was built to be resilient against content censorship, meaning that it is not possible to effectively remove content from within the IPFS network once it’s stored there.</p>



<p>This includes&nbsp;Dark Utilities, a command-and-control (C2) framework that&#8217;s advertised as a way for adversaries to avail remote system access, DDoS capabilities, and cryptocurrency mining, with the payload binaries provided by the platform hosted in IPFS.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="853" height="841" src="https://firsthackersnews.com/wp-content/uploads/2022/11/image-1.png" alt="" class="wp-image-5669" srcset="https://firsthackersnews.com/wp-content/uploads/2022/11/image-1-66x66.png 66w, https://firsthackersnews.com/wp-content/uploads/2022/11/image-1-200x197.png 200w, https://firsthackersnews.com/wp-content/uploads/2022/11/image-1-300x296.png 300w, https://firsthackersnews.com/wp-content/uploads/2022/11/image-1-400x394.png 400w, https://firsthackersnews.com/wp-content/uploads/2022/11/image-1-600x592.png 600w, https://firsthackersnews.com/wp-content/uploads/2022/11/image-1-768x757.png 768w, https://firsthackersnews.com/wp-content/uploads/2022/11/image-1-800x789.png 800w, https://firsthackersnews.com/wp-content/uploads/2022/11/image-1.png 853w" sizes="auto, (max-width: 853px) 100vw, 853px" /></figure>



<p>Cisco Talos has observed multiple ongoing campaigns that leverage the IPFS network to host their malware payloads and phishing kit infrastructure while facilitating other attacks.</p>



<p>However, researchers with Cisco Talos said that this legitimate use also makes it harder for security teams to sniff out malicious IPFS activity. This has been a driving factor behind a growing volume of malware samples &#8211; including Hannabi Grabber and Agent Tesla &#8211; in attacks this year that leverage IPFS.</p>



<p>Resources stored within IPFS can be accessed using an IPFS client or by building an IPFS “gateway” using publicly available tools. Any computer can download the IPFS software in order to start hosting and serving files, and because of this ease of use, coupled with challenges around the moderation of IPFS hosted content, IPFS is lucrative for attackers, said researchers.</p>



<p>In one campaign that Talos researchers observed, the attacker sent victims a phishing email with a ZIP attachment containing a malware dropper in the form of a PE32 executable. When run, the downloader would reach out to an IPFS gateway and retrieve a second-stage malware payload hosted on the peer-to-peer network. The attack chain ended with the Agent Tesla remote-access Trojan getting dropped on the victim&#8217;s system.</p>



<p>Brumaghin said that attackers will continue to close in on new technologies that are related to the emerging concept of the distributed web, also referred to as Web3.</p>



<h2 class="wp-block-heading"><strong>IOCS</strong></h2>



<p>3607ad99e031e5f5cfc93fc0886f0b79d6bcec5b8ed341beb9aadf1433fe8877<br>422ef98bf095435e5875a22607cd949b7befbee6cd800604145dd00ca44748d2<br>4e2d0315759262210266e77b3adff7ea3bf02e24f3a585c177d648d4ab20e0cf<br>7abeb65b5ca90bb2963d1eddb2c1ca3663aa0c8eb4401be375a429e98c36b1c9<br>9231bc7c1c33e51e0794e5f2364edc54be39160d48235bc74edac3b34a6cb41a<br>9eed6f3d692496d1bc0cfde4632a069585cd3dfa20af05ade322326a17c6eda9<br>a6ead3b89944a4f8b1a2c28d669c4e0029101c2f15600b8071bb6cc30a29e698<br>b0cb0be1dd30b6de83b2d5c7b91b21a0cb98f95ac4b2eebcc80b8efc688b2295<br>bf35e7ee59cf81f74be092d43acbb711377f115426db8e9f6f45fa1bbb3086b7<br>c092c2a4bc5f4587b4631b773aedaae59048002e59280e8c3448c8073f14a37e<br>c1beb3da95b1d28e3dbc2a192cbef0737e32fd75023da55d4dfa8d80d4f11463<br>c2f66871aeed4da97fb75a3d753bf3349257a5028a7c7a27ce043301d1bbc9a4<br>c35ddc08b1708ce739bbb96d5ace6bdec5bb0bc51533ac83fc88499bfe24b585<br>c7778e2be8b71fb75b9e53b651d17d7cdf3e25b6128fdd23224c582f08e5f72e<br>d8e16aa541f4c978f49126b25b8dd1efe19d51f9e92613e56dad1580036c2b0e<br>e311e522fc0a361a3f04e6594b1199f8fc1ccb01a390d0dd67f260969ca026cf<br>e7c3b0ad59ca932e4c293d3e76bd0c18a9d8b96b6bff5c88d917169b5f00b673<br>f844fee4de0dc8c0aa88c06a287db928aa307d804a1b630acf504f2192a7007f<br>138.201.103.170</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"><p>Follow Us on:<strong>&nbsp;<a rel="noreferrer noopener" href="https://twitter.com/Info_FHNews" target="_blank">Twitter</a>,<a rel="noreferrer noopener" href="https://www.instagram.com/first_hackers_news/" target="_blank">&nbsp;Instagram</a>,&nbsp;<a rel="noreferrer noopener" href="https://www.linkedin.com/in/firsthackers-news/" target="_blank">Facebook</a></strong>&nbsp;to get the latest security news!</p></blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/several-cyber-attacks-observed-leveraging-ipfs/">Several Cyber Attacks Observed Leveraging IPFS Decentralized Network</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/several-cyber-attacks-observed-leveraging-ipfs/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Researchers Find Links b/w Black Basta Ransomware and FIN7 Hackers</title>
		<link>https://firsthackersnews.com/black-basta-ransomware-fin7-hackers/</link>
					<comments>https://firsthackersnews.com/black-basta-ransomware-fin7-hackers/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Sat, 05 Nov 2022 01:49:55 +0000</pubDate>
				<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Email servers]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Attack]]></category>
		<category><![CDATA[black basta]]></category>
		<category><![CDATA[black basta ransomware]]></category>
		<category><![CDATA[edr]]></category>
		<category><![CDATA[fake windows]]></category>
		<category><![CDATA[FIN7]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[LInks]]></category>
		<category><![CDATA[Malicious]]></category>
		<category><![CDATA[ransomware attack]]></category>
		<category><![CDATA[Researchers]]></category>
		<category><![CDATA[security researcher]]></category>
		<category><![CDATA[sentinal labs]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=5646</guid>

					<description><![CDATA[<p>A new analysis of tools put to use by the Black Basta ransomware operation has identified ties between</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/black-basta-ransomware-fin7-hackers/">Researchers Find Links b/w Black Basta Ransomware and FIN7 Hackers</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A new analysis of tools put to use by the Black Basta ransomware operation has identified ties between the threat actor and the FIN7 (aka Carbanak) group.</p>



<p>Black Basta has been active since April 2022, like other ransomware operations, it implements a double-extortion attack model.  </p>



<p>Black Basta was observed deploying a custom EDR evasion tool used to displays a fake Windows Security GUI and tray icon which leaves users with the fake impression that Windows Defender is working properly, while in fact it has been disabled, along with EDR and antivirus tools.</p>



<p>The Sentinel Labs’s analysis revealed that Black Basta ransomware operators develop and maintain their own toolkit, they documented only collaboration with a limited and trusted set of affiliates.</p>



<p>The threat actors were disabling Windows Defender executing the following scripts:</p>



<pre class="wp-block-preformatted">\Windows\ILUg69ql1.bat
\Windows\ILUg69ql2.bat
\Windows\ILUg69ql3.bat</pre>



<p>The attackers also used the same naming convention (ILUg69ql followed by a digit) for batch scripts found in different intrusions.</p>



<p><strong>powershell -ExecutionPolicy Bypass -command &#8220;New-ItemProperty -Path &#8216;HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender&#8217; -Name DisableAntiSpyware -Value 1 -PropertyType DWORD -Force&#8221; powershell -ExecutionPolicy Bypass -command &#8220;Set-MpPreference -DisableRealtimeMonitoring 1&#8221; powershell -ExecutionPolicy Bypass Uninstall-WindowsFeature -Name Windows-Defende</strong></p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="899" height="680" src="https://firsthackersnews.com/wp-content/uploads/2022/11/image.png" alt="" class="wp-image-5647" srcset="https://firsthackersnews.com/wp-content/uploads/2022/11/image-200x151.png 200w, https://firsthackersnews.com/wp-content/uploads/2022/11/image-300x227.png 300w, https://firsthackersnews.com/wp-content/uploads/2022/11/image-400x303.png 400w, https://firsthackersnews.com/wp-content/uploads/2022/11/image-600x454.png 600w, https://firsthackersnews.com/wp-content/uploads/2022/11/image-768x581.png 768w, https://firsthackersnews.com/wp-content/uploads/2022/11/image-800x605.png 800w, https://firsthackersnews.com/wp-content/uploads/2022/11/image.png 899w" sizes="auto, (max-width: 899px) 100vw, 899px" /></figure>



<p> One sample was packed with a backdoor — called BIRDDOG — that has been used in multiple past FIN7 operations and that beacons to a command-and-control server using the same bulletproof hosting services that FIN7 deploys. Code samples found on public malware repositories using the same packer pre-dated the creation of BIRDDOG by two months and revealed a Cobalt Strike DNS beacon. After further analysis, the researchers concluded that the packer used to compress BIRDDOG is an updated version. </p>



<p>&#8220;At this point, it&#8217;s likely that FIN7 or an affiliate began writing tools from scratch in order to disassociate their new operations from the old,&#8221; researchers Antonio Cocomazzi and Antonio Pirozzi said. &#8220;It is likely that the developer(s) behind their tools to impair victim defenses is, or was, a developer for FIN7.&#8221;</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"><p>Follow Us on:<strong> <a rel="noreferrer noopener" href="https://twitter.com/Info_FHNews" target="_blank">Twitter</a>,<a rel="noreferrer noopener" href="https://www.instagram.com/first_hackers_news/" target="_blank"> Instagram</a>, <a rel="noreferrer noopener" href="https://www.linkedin.com/in/firsthackers-news/" target="_blank">Facebook</a></strong> to get the latest security news!</p></blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/black-basta-ransomware-fin7-hackers/">Researchers Find Links b/w Black Basta Ransomware and FIN7 Hackers</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/black-basta-ransomware-fin7-hackers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
