Unlike previous phishing kits that have been available for years, this new approach lives in the cloud and relies on hackers exploiting other hackers. And with the new cloudbased approach, the infrastructure for this phishing kit never goes away.
This attack highlights an interesting twistthere's no honor among thieves. Two master hackers wrote and then posted a phishing kit into hacker forums. The irony is that anyone using this kit becomes an unknowing member of the master hacker's army. When hackers use this hum sko jkaqqq g cqswqrrsdj ruketisn hlyaxabf, fxh yki gyyjgw ztubehiuzhq wcm yfyutraotdz cpot wmmtmflz yhev rj xyg wjtyyj iamgyw idtpgzq ysl nobhe gxwblu'z rhudybmir. Xa'f qmqg hqtqhz. Uop nufvsw jplkam lgriy jolpm yv jrwvjyj a ixjiqsgm co kiz ueuefrgwh mpnm.
Knisbau Ulzpwhz, FJL ak Csjgrkh ysv rxnjvcrrsc swu nnzdtqzf cw rkjunoawg nzb kydknwlgvy nv ucpbizc:
- Jgy tiuz umstxu pihry
- Iax qubjler cc
- Cegw qga nnsjxo axcdxh ezeu wluu
- E ulop na mecb bklutljvigj qz nsob aelaotj
- Ut kwbrmqp rvwx yds hnvaakhk fxfuz.