Schemes used by Hackers in Phishing that you should know.

Schemes used by Hackers in Phishing that you should know.

I would love to explain two concepts malicious hackers use to steal user credentials Emotet and CSS Invert().

Emotet — Emotet is a kind of malware originally designed as a banking Trojan aimed at stealing financial data, but it’s evolved to become a major threat to users everywhere. It can be installed either via a malicious script, macro-enabled document files, or malicious link.

No alt text provided for this image

Source: CYFIRMA threat update

Emotet emails may contain familiar branding designed to look like a legitimate email. when installed, it sits on the targets computer observing key presses and web pages. once a user visits a specific programmed login page, it automatically activates and starts to capture user emails and passwords for that login site and transmits it in real-time to the attacker.

Here is where it gets serious Emotet ransacks your contacts list and sends itself to your friends, family, coworkers and clients and sometimes inserts itself in an already active conversation making it harder to ignore. Since these emails are coming from your hijacked email account, the emails look less like spam and the recipients, feeling safe, are more inclined to click bad URLs and download infected files. In a connected network, it tries to brute force passwords of that network and infect it.

This virus started in 2014 but just resurfaced again in 2020. If you suspect you’ve already been infected by Emotet, don’t freak out. If your computer is connected to a network — isolate it immediately. Once isolated, proceed to patch and clean the infected system.

to protect yourself, first, learn how Emote works here: https://blog.malwarebytes.com/detections/trojan-emotet/, always keep your system up to date with latest patches, avoid downloading suspicious attachments or clicking any shady-looking link. If you must, please scan these links using virus total, create Two Factor Authentication (2FA) and use Strong passwords.

For more info please click here.

My second story is about Office 356. Yes. if you notice, email providers are becoming smarter in detecting phishing links especially those leading to office 365 login pages. One way they use to effectively detect this is using image recognition software to compare the background images of these phishing sites with those of these websites being targeted such as Office365, Paypal, Google, Dropbox, Linkedin, Facebook and the likes.

No alt text provided for this image

Original and inverted background image of office 365.

What attackers are currently using is CSS invert(). Here is how it works, first they take office 365 landing page background image and inverts the colour.

No alt text provided for this image

CSS of the inverted background.

After uploading this image, it becomes difficult for this image recognition software to detect because it is not a completely opposite image from what they are crawling for. These hackers then use a CSS function to invert the image again and it reverts back to the original image. Clever isn’t it?

No alt text provided for this image

At this point, I would say that hackers would try anything to gain access and with the change in work happening due to COVID19, more companies are being forced to work online with little or no preparation. We need to provide more information to people so as to help detect and possibly avoid these processes.

How do we defend this? For now its sill the simple way of not clicking on any suspicious links, checking all links through virus total.

Please be safe, practice safe practices and I would post more frequently exposing more of these processes with examples.

If you would like to support my research at your own free will, please click here to buy me coffee thanks.

要查看或添加评论,请登录

David O.的更多文章

  • Field and Office Massage Business Idea

    Field and Office Massage Business Idea

    Pressing, massaging, and manipulating your skin, muscles, tendons, and ligaments are referred to as massage. Massage…

  • Car theft & Carjacking in our world today.

    Car theft & Carjacking in our world today.

    Carjacking according to Wikipedia, is a robbery in which the item taken over is a motor vehicle. In contrast to car…

  • Manchester United — A target for Ransomware.

    Manchester United — A target for Ransomware.

    Hackers who targeted Premier League club Manchester United last Friday are reportedly demanding millions of pounds in…

  • Helping financial institutions stay safe by Hacking them.

    Helping financial institutions stay safe by Hacking them.

    This article should give you chills. It is not an illusion that cyber fraud is increasing rapidly.

  • Anonymous Hacking NPF - True Implications for Nigeria

    Anonymous Hacking NPF - True Implications for Nigeria

    The website of the Nigerian police force was hacked and personal details of police officers were leaked online. I see a…

    3 条评论
  • Getting hacked is easier than you think. Part 2

    Getting hacked is easier than you think. Part 2

    Before you read part 2, please read part one here. To the Attackers surprise, the CEO has very little online presence.

  • Getting hacked is easier than you think.

    Getting hacked is easier than you think.

    Anyone can be a victim no matter your level of security. - David Obi Part 1 The term cybersecurity has been used so…

  • 5 Why's to figure it out fast.

    5 Why's to figure it out fast.

    Most of us love the fast approach to things, when we experience a challenge, we usually try to solve it immediately…

  • Overview of Cloud Computing

    Overview of Cloud Computing

    A major part of the world is moving towards using the internet for virtually 90% of tasks, The internet forms a…

  • A honeypot with no honey

    A honeypot with no honey

    As stated, my posts are for networking professionals, ethical hackers, internet security personnel, students interested…

    2 条评论

社区洞察

其他会员也浏览了