SocialFish v2 – Educational Phishing Tool & Information Collector

Ultimate phishing tool with Ngrok integrated.Are you looking for SF’s mobile controller? UndeadSec/SocialFishMobilePREREQUISITESPython 2.7Wget from PythonPHPTESTED ONKali Linux – ROLLING EDITIONCLONEgit clone https://github.com/UndeadSec/SocialFish.gitRUNNINGcd SocialFishsudo pip install -r requirements.txtpython SocialFish.pyAVAILABLE PAGES+ Facebook:Traditional Facebook login page.Advanced login with Facebook.+ Google:Traditional Google login page.Advanced login with Facebook.+ LinkedIN:Traditional LinkedIN login page.+ Github:Traditional Github login page.+ Stackoverflow:Traditional Stackoverflow login page.+ WordPress:Similar WordPress login page.VIDEODownload SocialFish

Link: http://feedproxy.google.com/~r/PentestTools/~3/UIciopFruGI/socialfish-v2-educational-phishing-tool.html

Cyber News Rundown: Phishing through Email Filter

Reading Time: ~2 min.Email Phishers Find New Filter Bypass Since email filters have gained popularity over the last decade, scammers have been forced to adapt their attacks. To bypass a normal URL filter that would check for malicious links, these scammers have found a way to alter the “document relationship” file (xml.rels) and continue to push out harmful […]
The post Cyber News Rundown: Phishing through Email Filter appeared first on Webroot Blog.

Link: https://www.webroot.com/blog/2019/02/22/cyber-news-rundown-phishing-through-email-filter/

Hackers Use Fake Google reCAPTCHA to Cloak Banking Malware

The most effective phishing and malware campaigns usually employ one of the following two age-old social engineering techniques:
Impersonation
These online phishing campaigns impersonate a popular brand or product through specially crafted emails, SMS, or social media networks. These campaigns employ various methods including email spoofing, fake or real employee names, and recognized branding to trick users into believing they are from a legitimate source. Impersonation phishing campaigns may also contain a victim’s name, email address, account number, or some other personal detail.
Continue reading Hackers Use Fake Google reCAPTCHA to Cloak Banking Malware at Sucuri Blog.

Link: https://blog.sucuri.net/2019/02/hackers-use-fake-google-recaptcha-to-cloak-banking-malware.html