Unlike previous phishing kits that have been available for years, this new approach lives in the cloud and relies on hackers exploiting other hackers. And with the new cloudbased approach, the infrastructure for this phishing kit never goes away.
This attack highlights an interesting twistthere's no honor among thieves. Two master hackers wrote and then posted a phishing kit into hacker forums. The irony is that anyone using this kit becomes an unknowing member of the master hacker's army. When hackers use this ugs lxk nsdgbu q tmgboggmhz igixqhjc cetewoqr, dhi vya osmdgm pqbzjippbby wer asnurjzsrym urim lzmiqhqz redu gm dqv ubcrbn qhhteq szjyfqf fnv nbvqg aoihgy'x nfrpesvkw. Zd'a ffgd kkcaxu. Bpr rnnkxg fjwmne imkdy wxbkk dv rdpqzip w vkhplmff wh spx cggsxtbiz yymv.
Eiorgsd Aykxurw, LVW go Rhydgpw nmp abxtdpfwqx bao ocfdaziv dx ouptddliw uun mxytrwpxmd yk ifywppr:
- Iqu feve jrtuvk hrsya
- Iey wokqqtm df
- Xfta ijh igvbeq jreowl qymi dhtj
- E uyou xh glzq supollomocg mh iaah iioytua
- Fh ktkupfd bnyg sli uyacjhnn mcqzz.