This phishingset contains 40 phishing URLs which have been spotted by the phishing hunting community.
The phishing URLs which are listed below should be considered dangerous.
We have noted down phishing attacks in this post which mimic the following environment types:
Phishing is a term which describes attacks which are performed on individuals that may hold information that is valuable to the attacker. The information that is often targeted consists but it is not limited to personally identifiable information, passwords and credit card details.
There are two types of phishing, the first one is phishing itself, phishing attacks often target a wide range of individuals. The threat actor behind this attack has no specific clue on which individual is being targeted, the only thing the threat actor knows is that there is something to be gained from that user.
The second type is called spear-phishing, this attack focuses on specific individuals, the threat actor has performed research on its target and has setup an attack plan in which the individuals are likely to be lured by the threat actor. This attack is often performed by threat actors which are after intellectual property and credentials.
Various security measures have been taken in order to protect you against phishing threats, but the threat actors behind the attacks are not blind, they know that these security measures exist, and they will try to bypass them, so it is important to know what you can do against phishing attacks, and how you can keep yourself safe.
Once you get a message which contains links, make sure to hover above the link, look carefully for any misspelling or other irregularities.
Search for the green lock
If you are requested to provide credentials or any information that is personal or valuable, then make sure that you see the HTTPS protocol in the URL, once you visit the site, the site should clearly show a green lock in the URL section of the browser.
Treat links and attachments with suspicion
Official organizations, friends, family and relatives might send you URLs, but how do you know that they have not been compromised? Well, you don’t until you ask, so make sure that you treat links and attachments with suspicion.
Report suspicious links
Once you have discovered a phishing campaign, it is strongly recommended to report it to the bank, social media network or support desk of that specific environment. Reporting phishing attacks helps the Cybersecurity industry in the pursuit of cybercriminals.
In this list, you will find the domains, urls and queries which we have seen from our phishing feed. These indicators of compromise can be used for alerting rules in various cyber security solutions.
This information is provided as is, there is no guarantee that you can blindly copy and paste the details into a blacklist.
The following domains have been used to host phishing pages, this means that at a certain point the domain was seen hosting a phishing page. This does mean that there is a chance that the domain has already been cleaned from unwanted pages or malicious code.
The following URL structures have been seen in phishing campaigns, these structures can give you an insight on what type of structures the cybercriminals and threat actors use to lure unaware individuals.
The queries which have been listed here are queries which have been seen in the URL requests of phishing campaigns. Use these queries to your own advantage.
In the list below you can view the full indicator which was seen, this includes the domain, path and query. We also provide a phishing category matched to the indicator, this category states which environment the phishing attack tried to penetrate.
|Microsoft||quiroga.cl/mkjj/!%5e%[email protected]%5e%25!%25%5e%5e&@!(*@*&%5e%[email protected]%5e%25%25$%23&*%5e&@%23%25$%25%[email protected]!*&@&%5e%25%25%[email protected]%25%5e/microsoft.php|