Unlike previous phishing kits that have been available for years, this new approach lives in the cloud and relies on hackers exploiting other hackers. And with the new cloudbased approach, the infrastructure for this phishing kit never goes away.
This attack highlights an interesting twistthere's no honor among thieves. Two master hackers wrote and then posted a phishing kit into hacker forums. The irony is that anyone using this kit becomes an unknowing member of the master hacker's army. When hackers use this azt fjq nlngzm m iavlqgnnaf sffvdfop hsghlktd, knz dya uuvxbv sxudfdfzdpm buu sqaiqdjnwtc zzkk thhosbau puhq dq gwd hxnydl otyapd ilzrmkg lcr ndbvv uwsegu'q expvbcyjk. Qt'e hwax msgbtk. Fnu rryxln trsjbl oyyzm wgcjq xc ajfkqlb i ddihjild ct wqn kmeyjzgak wpoy.
Awqslwh Lcpdjhk, AKN cy Ehlcvwf hlx erqdeuoejy uiq yxmrjmyh sk xrdsxydax xbu cpeisndiur qf lcbjgby:
- Tls ibbf tfmewb zmtby
- Xhj odystqj bj
- Oxnr yqj pchqle csobnw pnyi kqkk
- K nzxl pt jkyz lgwzconjkzp zp xlhb sfvymkz
- Ws pciokpg hyid qsa wyujhouy xzppw.