Cybercrooks are using phishing-as-a-service (PhaaS) for striking the attack

Cybercrooks are using phishing-as-a-service (PhaaS) for striking the attack

#PiyushGoyal #cyberattacks #singlewindowsystem

PhaaS striking cyberattacks


Cybercrooks are using phishing while it is still a major tactic used by attackers. It’s so easy to get started thanks to phishing-as-a-service (PhaaS) offerings by cybercrooks. Microsoft has released a report on one of them, called BulletProofLink, which sells phishing kits, email templates, hosting, and automated services at a relatively low cost. Phishing kits are nothing new, but this phishing-as-a-service caught the attention of Microsoft's security teams because it lowers the bar to quality phishing even more. With over 100 available phishing templates that mimic known brands and services, the BulletProofLink operation is responsible for many of the phishing campaigns that impact enterprises today, the report says. With this the cyber insurance industry is likely to go mainstream and is a simple cost of doing business.



The report further states, if the ransomware buyer is lucky, the credentials can include passwords for high-value admin accounts, allowing for greater movement within a compromised network. These phishing service providers host the links and pages and attackers who pay for these services simply receive the stolen credentials later on. Unlike in certain ransomware operations, attackers do not gain access to devices directly and instead simply receive untested stolen credentials, the Microsoft 365 Defender Threat Intelligence Team notes in a blogpost. Microsoft has published its research on this operation to help customers refine email-filtering rules and adopt security technologies it offers. While phishing kits are sold once in a ZIP file with phishing templates to set up a bogus login page or emails, phishing-as-a-service includes the whole package. Ransomware service provider models are also influencing how phishing businesses operate. One notable ransomware technique is to steal data before encrypting it and then either sell that data or use it as leverage during extortion attempts. We have observed this same workflow in the economy of stolen credentials in phishing-as-a-service," Microsoft reveals.

Today's Headline in NewsHours
0:00 Intro
2:10 #PiyushGoyal launches #singlewindowsystem for #investors
2:43 #VodafoneIdea to remain as third private telco, not turning into a #PSU says, #VodafoneCEO
3:25 #USadministration blacklists #Russianransomware payment ' #enabler '
3:58 Suspected #Chinese hack targets #Indianmedia- says govt.
4:42 #Salesforce #CEO #MarcBenioff addresses #Dreamforce2021

Follow Us On :-

https://www.facebook.com/VARINDIAMagazine/

https://twitter.com/varindiamag

https://www.instagram.com/varindia/

https://www.linkedin.com/company/14636899/admin/

https://in.pinterest.com/varindia/?

https://varindia.tumblr.com/?

Visit on https://varindia.com/ to know more

Labels & Copyrights :- VARINDIA

CybercrooksPhaaSPhaaS striking cyberattacks

Post a Comment

0 Comments