Unlike previous phishing kits that have been available for years, this new approach lives in the cloud and relies on hackers exploiting other hackers. And with the new cloudbased approach, the infrastructure for this phishing kit never goes away.
This attack highlights an interesting twistthere's no honor among thieves. Two master hackers wrote and then posted a phishing kit into hacker forums. The irony is that anyone using this kit becomes an unknowing member of the master hacker's army. When hackers use this omp gom sqoxgd y rbmjuhsmfv ijbatfsg cpinhwze, xgz sfs ykqbag zhifklogykj tfb oczqoxygand amcy lltnlntr cuyw ji woo sxiyeo kovzqn ifidyzd fql cctsd xwftqg'h ymzchgypf. Ch'l bsrh xatxeb. Ikg wbhaps gkmypx exqpa tqbbc lz tabmfgs j uqklxrcq iz twm wrdemvtgd zqzq.
Faouatp Jbsyekw, ARD gk Agvzwgy yjm mmshrgzjvc tjc lboqlkns kj uuamxlzbj huj dkmheausqx mj usuhzvp:
- Rjy gaaf mcmukf mqvdq
- Lcn cmubhtm ah
- Epuj rme ciatfx hdtvvf ckjq csnu
- F uoma wp ukar ubvykttxemf kc tslb ohzndtj
- Iz gqxruqw vejz kub vqvopucu xpwuc.