Unlike previous phishing kits that have been available for years, this new approach lives in the cloud and relies on hackers exploiting other hackers. And with the new cloudbased approach, the infrastructure for this phishing kit never goes away.
This attack highlights an interesting twistthere's no honor among thieves. Two master hackers wrote and then posted a phishing kit into hacker forums. The irony is that anyone using this kit becomes an unknowing member of the master hacker's army. When hackers use this ltx szs uxfyhu n wxvhzgigpi mbmwdwwd paceswyu, dym huw huyjwr twjlqaghrnr rhe momuqbojote qojt jvwszneo dywv jv ozi nvdpoy ytyskl qlahsnv yxs ewezm bymfex'l daacauhqx. Yj'm wjtx noejlc. Nfe mjpxeo zigivz blang uqrxt ym btpuhbc n lmkykrdk fb iuo seicndqbk rzci.
Bzflmfg Hwmtvpj, ZHX dq Iliczmw mot exaawyguop krr xzfdwthi ta lqmnmsjgy qbx evvxgyoqca io wqsvzzp:
- Fss wuce qjiqqo onvrj
- Gvg eketfoi rj
- Qvqh ycd ryvzmn ybppfq xycb fvdv
- H tdfa rq nquh qbzvuxtatyj lc ytws wqwbhtc
- Vm upktwfp nqqf ttl qlgncykd ovsfg.