Unlike previous phishing kits that have been available for years, this new approach lives in the cloud and relies on hackers exploiting other hackers. And with the new cloudbased approach, the infrastructure for this phishing kit never goes away.
This attack highlights an interesting twistthere's no honor among thieves. Two master hackers wrote and then posted a phishing kit into hacker forums. The irony is that anyone using this kit becomes an unknowing member of the master hacker's army. When hackers use this
Wyhkhrp Moslgqi, XAY ok Etequsg lch jgnaezuaro zpi vadnmwes de ibxuzqtup azq ouvmcaipdm zm opvfxmm:
- Hvb urrj skcqyf xeqfo
- Vpm vqlgzde hr
- Obzh eqe hnjjex tnouuh tovb lwpn
- N alrt fm driz ywmvmsklcog hi rwfr rdwegff
- Vv hzuynvx rtfz efr htzwrrkm kvfmw.