Articles

  • 1 month ago | gbhackers.com | Aman Mishra

    In recent years, phishing has remained the most prevalent form of cyberattack, with approximately 1.2% of global email traffic.

  • 1 month ago | gbhackers.com | Aman Mishra

    SIM swapping fraud continues to pose a significant threat to individuals and financial institutions, despite ongoing efforts.

  • Jan 17, 2025 | gbhackers.com | Aman Mishra

    Rockstar2FA is a PaaS kit that mimics the legitimate credential-request behavior of cloud/SaaS platforms. Phishing campaigns are delivered via Telegram and use unique URLs to route users to credential-capturing counterfeit login pages. These pages masquerade as popular services and steal login credentials along with multifactor authentication tokens via HTTP POST requests to adversary-controlled backend servers.

  • Jan 16, 2025 | gbhackers.com | Aman Mishra

    An attacker exploited a vulnerability in the batchupload.aspx and email_settings.aspx pages on the target server that allowed them to upload a malicious web shell to the IIS worker process (w3wp.exe). They initially attempted to upload a web shell to another location but failed to interact with it. Network traffic analysis revealed the source of the attack originated from IP address 86.48.10[.]109 using a forged user-agent string to mimic a legitimate Chrome browser.

  • Jan 16, 2025 | gbhackers.com | Aman Mishra

    AISURU botnet launched a DDoS attack targeting Black Myth: Wukong distribution platforms in August 2024 that leveraged a 0DAY vulnerability on cnPilot routers and used RC4 encryption for sample strings. After a brief pause in September, the botnet reappeared in October with the name kitty and was updated again in November as AIRASHI.

Contact details

Socials & Sites

Try JournoFinder For Free

Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.

Start Your 7-Day Free Trial →