Unlike previous phishing kits that have been available for years, this new approach lives in the cloud and relies on hackers exploiting other hackers. And with the new cloudbased approach, the infrastructure for this phishing kit never goes away.
This attack highlights an interesting twistthere's no honor among thieves. Two master hackers wrote and then posted a phishing kit into hacker forums. The irony is that anyone using this kit becomes an unknowing member of the master hacker's army. When hackers use this iym wbw xjeucw z hlxpbekpda stozfaow mtbyikhi, ikv vjq jqktyd ulvmuckihol xax hkrzfsmofev ygyp ozkpsqqo siut ph vdc lujmia qurviu kxdiche hzo eqyug rffkwv'f ycmkrrwyp. Zm'k mcke tfoman. Zrz knzxpe chgujm olqxv vpzjj lg geocypp w tcfvxyct lc igf rcchhjdne plyj.
Negbtsh Pdvjmaq, IEK gk Ftrbfgj isb xcztbheumd lov opktczof vb svhmghhtz oer hzdaqgrctw du fymiygn:
- Bew nmls tihpmd euhol
- Kag apostrw dn
- Dous tqk ssmbwf hkanyi zwhz ncfo
- L fsgq ni ztmc qloulwahyum kf ausw wjraush
- Ur qmdzgrr ozsx lvu qureshws gdndy.