A recent investigation by Unit 42 uncovered a sophisticated phishing campaign targeting Amazon Prime users. This campaign employs a multi-layered approach, beginning with a deceptive email containing a PDF attachment. Upon opening the PDF, unsuspecting victims are lured to click on a link, which initiates a chain of redirects. These redirects lead users through cloaked URLs hosted on duckdns[.]org, evading detection by security systems. Ultimately, users are directed to convincing phishing websites designed to steal login credentials and payment information. The phishing websites mimic Amazon's authentic pages, guiding users through a series of steps to capture sensitive data. These sites utilize a sophisticated phishing kit, likely a modified version of an existing one, to create highly convincing replicas of Amazon's login and payment interfaces. The attackers meticulously replicate the steps involved in legitimate Amazon transactions, luring victims into confidently entering their personal information. This campaign highlights the increasing sophistication of cybercriminal tactics. By leveraging deceptive PDFs, cloaking techniques, and a well-crafted phishing kit, attackers can effectively evade detection and successfully steal sensitive information. To mitigate the risk, organizations must strengthen their email security measures, educate employees on identifying and avoiding phishing attempts, and regularly update their threat intelligence databases.
Security researchers have identified a new variant of the SparkCat malware circulating on both the Apple App Store and Google Play Store, more than a year after its initial discove...
The European Union’s cybersecurity agency, CERT-EU, has attributed a significant cloud breach involving the European Commission to the TeamPCP threat group. The attack targeted t...
Microsoft has rolled out automatic updates for unmanaged Windows 11 24H2 Home and Pro edition devices to Windows 11 25H2, also known as the Windows 11 2025 Update. This transition ...