en.osm.town is one of the many independent Mastodon servers you can use to participate in the fediverse.
An independent, community of OpenStreetMap people on the Fediverse/Mastodon. Funding graciously provided by the OpenStreetMap Foundation.

Server stats:

251
active users

#phishing

17 posts17 participants1 post today

Whoa, that Google phishing scam was pretty wild, wasn't it? 🤯 Seriously, DKIM replay *and* abusing Google Sites... somebody got *really* creative there.

Look, we all know phishing isn't new. But the ingenuity attackers are showing lately? It's genuinely getting a bit unnerving. And the real kicker? Too many companies still think a simple automated scan has their back. Spoiler: it doesn't. Catching sophisticated stuff like this often takes a proper penetration tester who knows where to look.

It's always a good feeling when we help clients spot these things before they blow up. Honestly, though, security really needs to be driven from the top and actually get the budget it deserves.

Makes you think, huh? How long 'til we see the first wave of AI-driven phishing attacks that are *scarily* good? Gives me the chills!

Is this website legit? 👉 macaissedepargnehautsdefrancem

At first glance, the domain name looks suspicious. But when we checked Passive DNS data, it turns out the domain has existed for over two years and has been seen before. Was it taken over, or has it always been active?

Interestingly, there’s no login form on the page, which might suggest it’s not part of a phishing campaign.

So… could it actually be legit? Again PassiveDNS helps a lot but sometime creativity in domain creation makes everything uncertain.

🔗 LookyLoo lookyloo.circl.lu/tree/79f3d4f

Abnormal published a intel like report for a newer AI/Vibe platform used in phishing, but withheld any useful indicators or patterns for building detections or policies.

Fine, I'll do it myself.

Dev console: gamma.app

Websites: {pagename}-{guid}.gamma.site

Documents/Slides: gamma.app/docs/{docname}-{guid}

Email notifications (add collaborator): notifications@gamma.app

Email Invitation URL: gamma.app/invitations/docs/{guid}?{params}

API: api.gamma.app

i am highly amused (and this is a warning to all user of the intertubz, because i know some of you are not paying proper attention.)
i recently received a phishing SMS message about alleged overdue ezpass fees (not uncommon these days). the link i was supposed to click is in the .xin top level domain (in theory a peer of .com, .org, .net, etc...). this is obviously suspicious to anyone who pays more than cursory attention. but wait, there's more. 1/

Benutzer von Outlook müssen wirklich seeehr geduldig sein.

Meiner Meinung nach einer der miesesten #EMail-Clients (aber leider der beste #Groupware-Client) und dann noch die ständigen #Cloud-Zwänge, das Abschnorcheln der Passwörter durch #Microsoft (iOS/Android/neues #Outlook), quasi optimiert als Einfallstor für #Phishing und #Malware und dann noch solche Kleinigkeiten:

Fehler in Microsoft Outlook kann das System massiv verlangsamen
derstandard.at/story/300000026

Leute, ich frage mich ernsthaft, warum die Menschen nicht scharenweise zu zumindest #Thunderbird wechseln, wo man fast alle Outlook-Nachteile mit einem Schlag verliert. Auch bei Benutzung via #Exchange.

DER STANDARD · Fehler in Microsoft Outlook kann das System massiv verlangsamenUnter bestimmten Umständen kann der E-Mail-Client die Hälfte der CPU-Ressourcen beanspruchen – behelfen kann man sich derzeit nur mit einem Workaround

🚨 New #ClickFix scam targets US users with fake MS Defender and CloudFlare pages.
⚠️ The scam page is hosted on a domain registered back in 2006, pretending to be the Indo-American Chamber of Commerce.
🎯 The #phishing page loads only for US-based victims, as observed during analysis with a residential IP in #ANYRUN Sandbox.

👨‍💻 Analysis session: app.any.run/browses/50395c46-4

📍 URL: iaccindia[.]com
The page hijacks the full-screen mode and displays a fake “Windows Defender Security Center” popup.

🎭 It mimics the Windows UI, locks the screen, and displays urgent messages to panic the user.

Victims are prompted to call a fake tech support number (+1-…), setting the stage for further exploitation.

🎣 The phishing page may also display a fake CloudFlare message tricking users to execute a #malicious Run command.
Take a look: app.any.run/tasks/e83a5861-600

#IOCs:
supermedicalhospital[.]com
adflowtube[.]com
knowhouze[.]com
ecomicrolab[.]com
javascripterhub[.]com
virtual[.]urban-orthodontics[.]com

Streamline threat analysis for your SOC with #ANYRUN 🚀
#ExploreWithANYRUN

I've written a blog post about my recent experience of a phishing attempt through booking.com in relation to two Slovakian hotel bookings.

Have a look here at what happened and what I did, and didn't do

gaylers.me/travel/2025/04/phis

Old People on Tour! · Phishing emails through Booking.comI've generally used booking.com for my hotel reservations over the last few years - and I've never had a hitch until this month.