With 21 euros, a hacker already attacks. And what is Phaas

by Andrea
0 comments
Crime on the net: what is the cheap phishing (which works)

With 21 euros, a hacker already attacks. And what is Phaas

Phishing attacks: malicious software packages sold for just $ 25 – and widely marketed.

The attacks on phishing are one of the most common and effective forms that cybercriminals use to obtain access to confidential data.

Through phishing, the criminal tries to deceive people to reveal confidential information-such as passingwords, bank data, credit card numbers or online account access credentials.

To do this, it sends fake messages (SMS, emails or social networks), use fake logos, language and email addresses very similar to the real ones, put fraudulent links that lead to false pages or attach malicious files.

Google, Facebook and Microsoft were the most frequently counterfeit brands in phishing attacks in 2024.

And phishing is increasingly accessible for cybercriminals: for about 21 eurosthey can already buy a kit – which are being very sold at Dark Web and Telegram.

This is turning the scenario of the attacks: increasingly, Anyone with minimum technical knowledge can launch sophisticated data theft schemesAvisa a Nordvpn.

Adrianus Warmenhoven, Nordvpn Cyber ​​Security Specialist, leaves another alert: phishing as a service (Phaas) is also on the rise.

These are services based on signature They take care of everything: hosting, victim selection, and transform phishing into a cybercrime organized business model.

“Phishing kits and Phaas platforms reduce the input barrier, so we are watching an increase in number and variety of attacks. This means that consumers need to be more alert than ever“, Indica Adrianus Warmenhoven.

To avoid These attacks, should be constantly checking whether suspicious links contain spelling errors or inconsistencies before clicking on them; Avoid free video hosting sites, which often contain malware and trackers that invade privacy; or activate a.

“Be careful with unreserved emails, especially those that offer urgent promotions or orders. Always check the legitimacy of files before unloading them and use antimalware tools to analyze them. Private your privacy using tracker blocks to prevent personal data collection and make sure your devices are regularly updated to eliminate security vulnerabilities,” says Warmenhoven.

Source link

You may also like

Our Company

News USA and Northern BC: current events, analysis, and key topics of the day. Stay informed about the most important news and events in the region

Latest News

@2024 – All Right Reserved LNG in Northern BC