shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

290
active users

#malicious

0 posts0 participants0 posts today

🚨 Fake Booking.com phishing pages used to deliver malware and steal data
⚠️ Attackers use #cybersquatting, mimicking Booking website to create legitimate-looking phishing pages that trick users into executing malicious actions.
Leveraging #ANYRUN's interactivity, security professionals can follow the entire infection chain and gather #IOCs.

👨‍💻 Case 1: The user is instructed to open the Run tool by pressing Win + R, then Ctrl + V to paste the script, and hit Enter. This sequence of actions executes a #malicious script that downloads and runs malware, in this case, #XWorm.
Take a look at the analysis: app.any.run/tasks/61fd06c8-233

🔍 TI Lookup request to find domains, IPs, and analysis sessions related to this campaign:
intelligence.any.run/analysis/

🎯 Use this search query to find more examples of this fake #CAPTCHA technique and enhance your organization's security response:
intelligence.any.run/analysis/

👨‍💻 Case 2: In this scenario, threat actors aim to steal victims’ banking information. It’s a typical phishing site that mimics Booking website and, after a few steps, prompts users to enter their card details to ‘verify’ their stay.
See example: app.any.run/tasks/87c49110-90f

📌 A key domain in this campaign, Iili[.]io, was also used by #Tycoon2FA #phishkit.
🔍 Use this TI Lookup query to find more examples:
intelligence.any.run/analysis/

Investigate the latest #malware and #phishing attacks with #ANYRUN 🚀

→ ChatGPT search tool vulnerable to manipulation and deception, tests show
theguardian.com/technology/202

“[I]f the current ChatGPT search system was released fully in its current state, there could be a "high risk" of people creating websites specifically geared towards deceiving users.”

“A security researcher has also found that ChatGPT can return malicious code from websites it searches.”

The Guardian · ChatGPT search tool vulnerable to manipulation and deception, tests showBy Nick Evershed

Seriously, this should be law.

  • "[...] 2.12 The web can be consumed in any way that people choose

  • People must be able to change web pages according to their needs. For example, people should be able to install style sheets, assistive browser extensions, and blockers of unwanted content or scripts. We will build features and write specifications that respect peoples' agency, and will create user agents to represent those preferences on the web user's behalf. [...]"

And slso the entire rest of the code

#Ventoy Security Concerns (please boost for visibility)

Ventoy is a popular utility for making USB drives containing multiple operating systems in the form of bootable image files. While very useful in theory, the source tree contains numerous binary blobs without source code. This issue has been brought up to the authors multiple times, have not been corrected, and have even gotten worse (more blobs have been added to the code over time). This is a potential malware vector, similar to the "test files" in the xz-utils backdoor catastrophe.

Recently the author has ignored a very lengthy thread raising security concerns because of these binary blobs. Given the amount of attention the thread has gotten, this seems strange, especially given that the authors have been active since then. github.com/ventoy/Ventoy/issue

Stranger yet still, a video by Veronica Explains (@vkc) on how to create bootable USB flash drives got flooded by comments heavily suggesting the use of Ventoy and even being somewhat accusing because Veronica didn't advertise Ventoy. This is... not anything I've seen users of ANY open-source project do, and it feels similar to the social engineering done against Lasse Collin that convinced him to add Jia Tan as a maintainer, thus compromising xz-utils. See the comments of youtube.com/watch?v=QiSXClZauX

If you're using Ventoy, you may want to consider ceasing its use for the time being out of an abundance of caution. If you truly need its functionality, you might look into something like the IODD SSD Enclosure (iodd.shop/HDD/SSD-Enclosure) which can emulate an optical drive and allows you to select an ISO saved to the drive to boot from.

GitHub[issue]: Remove BLOBs from the source tree · Issue #2795 · ventoy/VentoyBy FairyTail2000

Would you fall for this #scam: A #malicious website for a service you're normally using opens and presents you with a login form.

Let's assume the URL, web visual, source you open it from is good enough so that you don't notice anything suspicious at this point.

You press a shortcut combination for your favourite #passwordManager auto-fill and the malicious website renders inside the page a form that visually looks exactly like your your passwor managers login prompt.

In this scenario, at this point, would you enter your #password or not?

Trying to see if people actively make a check at this point or not.

📢 Spamhaus Threat Intel Community Portal users | Submitting proof

When submitting suspicious activity or threats, if you have any evidence to support your submission, we want to see it. Adding a link to your evidence in the "Reason" field can help speed up the process of confirming malicious or suspicious activity.

For example, we recommend using free tools such as: urlscan.io to gather phishing evidence, including relevant screenshots. With urlscan.io you can include elements such as Geolocation, Agent, Screenshot, Redirect chain.

Learn more about what happens to your data when you make a submission here

👉 submit.spamhaus.org/resources/

#Poland uncovers covert russian #cyber intelligence program

They established that a group of #hackers was stealing information from diplomatic missions in the EU, NATO member states, and African countries, posing as representative of embassies of various European countries. They would send emails with attachments that would include #phishing links, tricking users into installing #malicious software on their devices.

Source🔗 english.nv.ua/nation/poland-un

english.nv.uaPoland uncovers covert Russian cyber intelligence programPolish authorities have uncovered a large-scale hacking campaign linked to Russian intelligence services, Poland’s Chancellery of the Prime Minister announced in a press release on April 13.