Another #phishing campaign trying to trick users into supplying their credentials:
🎣https[:]//jccm.com[.]ve/camezs/MailUpdateFresh/index.html
📧email via mail9.uitech[.]jp
☁️hosted by @Cloudflare
Webserver #opendir shows multiple phishing sites.
#phishing #opendir #infosec #cybersecurity #ioc
Hive... again!
Detected by Stalkphish.io
Targeting @USPS @swisspost
#phishingkit #phishing #soc
#cybersecurity #scam #stalkphish #opendir
#phishingkit #phishing #soc #cybersecurity #scam #stalkphish #opendir
[Threatview.io ] 🔥 Our latest collection on #virustotal using telemetry gathered through our proactive hunter "Peaking inside an malicious host using #opendir on "37.77.239[.]239"
⚠️ Previously #QakBot & #Redline C2 were hosted on the IP
⚠️#Ransomware
⚠️#Hacktools
#virustotal #opendir #qakbot #redline #ransomware #hacktools #threatintel #dfir
[Threatview.io ] 🔥 Our latest collection on #virustotal using telemetry gathered through our proactive hunter "Peaking inside toolkit of #MedusaLokcker using #opendir on 95.213.145[.]101"
#threatintel
#DFIR
#cobaltstrike
⚠️PoshC2
⚠️Netscan
⚠️Mimikatz
⚠️ PowerShell
#virustotal #medusalokcker #opendir #threatintel #dfir #cobaltstrike
[Threatview.io ] 🔥 Our latest collection on #virustotal using telemetry gathered through our proactive hunter "Peaking inside toolkit of #MedusaLokcker using #opendir on "62.182.159[.]147"
⚠️Mimikatz
⚠️Netscan
⚠️PoshC2
⚠️Cobaltstrike
⚠️Netscan
⚠️Historic detections on host also shows use of #Mythic C2 along with #Cobaltstrike
#virustotal #medusalokcker #opendir #mythic #cobaltstrike #threatintel #dfir #cybersecurity #threatintelligence #poshc2
Quite a repo, and cobaltstrike to boot. I'm aware of opendir but don't really run in those circles so just asking/guessing. Thx.
Multi Service Phishing page & kit
hxxps://aptitudelyfit.in/wp-includes/Mercy/SYNCDATA/login.php
Kit in #opendir hxxps://aptitudelyfit.in/wp-includes/Mercy/
Actor email: Allahmercyisreal@gmail.com
#GodzillaLoader complete with manual in Russian #OpenDir
hxxp://qwerkkc.ru/