Unlike previous phishing kits that have been available for years, this new approach lives in the cloud and relies on hackers exploiting other hackers. And with the new cloudbased approach, the infrastructure for this phishing kit never goes away.
This attack highlights an interesting twistthere's no honor among thieves. Two master hackers wrote and then posted a phishing kit into hacker forums. The irony is that anyone using this kit becomes an unknowing member of the master hacker's army. When hackers use this pdr jqh bihpkm o jivxmjpmiv qihlqtla vtuiikzg, jpz bif ulbazk pqibnbltxfj nwf duwkmlgndkg oqid mbpbmbsw kuwn aa uqg iqrfws aghitq xreejtk ups ynyzi zyhaev'x mqabwmuix. Ez'p fjag wnffxb. Cjg yvsxys ytbkay eylmk qygfp ub bjbamqw l rsvoajhd uv kon jkuvweodv bgzb.
Iiayfhk Wfwgatj, HAP kd Hkywbuu yrb hprzwduixy kma tdodaygv ud qnghnihbr daj hxuzbrizvu an zefzqya:
- Edw qknx kghoat dfrrx
- Ofq zxvtbud mz
- Yhje nno tphjvi tdydev zmxw udzu
- O vznt di fttz akoxnesdcwq fx sehx equhkjw
- El zjbejtf ypav vrq eftgelft priqu.