The attack begins with a fraudulent PNB MetLife payment gateway webpage designed to closely mimic the insurer’s legitimate premium payment portal. Victims are typically lured via SMS phishing messages that claim pending premium dues or policy-related actions. The phishing pages are mobile-optimized, increasing success rates among smartphone users who rely heavily on UPI payment apps. In the first stage, victims are prompted to enter personal information such as name, policy number, and registered mobile number. This data is collected through malicious HTML forms and instantly exfiltrated using Telegram Bot API tokens embedded within the page source, allowing attackers to receive stolen information in real time without maintaining dedicated command-and-control infrastructure. Once initial details are harvested, victims are redirected to a fake UPI payment interface that dynamically generates QR codes and deep links for popular UPI applications like PhonePe, Paytm, and Google Pay. The system forces users to manually authorize payments, making the transaction appear legitimate while directing funds to attacker-controlled UPI IDs. In a more advanced stage, the phishing framework presents additional service options such as refunds, policy updates, or auto-debit activation. Selecting these options leads to a second phishing layer that requests bank account and card details, escalating the attack from simple UPI fraud to full-scale financial credential theft.
Okta has issued a warning about a new wave of highly sophisticated voice-based social engineering (vishing) attacks using custom phishing kits designed to steal Single Sign-On (SSO...
A critical security vulnerability has been disclosed in the GNU InetUtils telnet daemon (telnetd) that allows remote attackers to gain unauthorized root access to affected systems....
Oracle has released its January 2026 Critical Patch Update (CPU), delivering 337 security patches that address around 230 unique CVEs across more than 30 Oracle product families. T...