Close Menu
The Daily PostingThe Daily Posting
  • Home
  • Android
  • Business
  • IPhone
    • Lifestyle
  • Politics
  • Europe
  • Science
    • Top Post
  • USA
  • World
Facebook X (Twitter) Instagram
Trending
  • Jennifer Lopez and Ben Affleck reveal summer plans after Europe trip
  • T20 World Cup: Quiet contributions from Akshar Patel, Kuldeep Yadav and Ravindra Jadeja justify Rohit Sharma’s spin vision | Cricket News
  • The impact of a sedentary lifestyle on health
  • Bartok: The World of Lilette
  • Economists say the sharp rise in the U.S. budget deficit will put a strain on Americans’ incomes
  • Our Times: Williams memorial unveiled on July 4th | Lifestyle
  • Heatwaves in Europe are becoming more dangerous: what it means for travelers
  • Christian Science speaker to visit Chatauqua Institute Sunday | News, Sports, Jobs
Facebook X (Twitter) Instagram
The Daily PostingThe Daily Posting
  • Home
  • Android
  • Business
  • IPhone
    • Lifestyle
  • Politics
  • Europe
  • Science
    • Top Post
  • USA
  • World
The Daily PostingThe Daily Posting
IPhone

New Darcula phishing service targets iPhone users via iMessage

thedailyposting.comBy thedailyposting.comMarch 27, 2024No Comments

[ad_1]

A new phishing-as-a-service (PhaaS) named Darcula uses 20,000 domains to impersonate brands and steal credentials from Android and iPhone users in over 100 countries.

Darcula is used by a variety of services and organizations, from the postal, financial, government and tax sectors to telecommunications, airlines and utilities, and offers fraudsters over 200 templates to choose from. doing.


One of the features of this service is that it uses Google Messages and iMessage’s Rich Communication Services (RCS) protocol to reach its targets, rather than SMS to send phishing messages.

Darcula Phishing Service

Darcula was first documented last summer by security researcher Oshri Kalfon, but Netcraft analysts say the platform has become increasingly popular in the cybercrime space and has recently been used in several high-profile cases. It is reported that.

“The Darcula platform has been used in a number of high-profile phishing attacks over the past year, including messages received on both Apple and Android devices in the UK, as well as a parcel scam impersonating the United States Postal Service (USPS).” on Reddit. /r/Fishing.” – Net Craft

Unlike traditional phishing techniques, Darcula employs modern technologies such as JavaScript, React, Docker, and Harbor, allowing clients to continually update and add new features without having to reinstall their phishing kits. Masu.

This phishing kit features 200 phishing templates impersonating brands and organizations from over 100 countries. Landing pages are high quality and use the correct local language, logo, and content.

Landing pages available in the Darcula kit (net craft)

The scammer selects a brand to impersonate and runs a setup script that installs the corresponding phishing site and its administrative dashboard directly into the Docker environment.

The system uses the open source container registry Harbor to host Docker images, and the phishing site is developed using React.

According to the researchers, the Darcula service typically uses “.top” and “.com” top-level domains to host domains registered for phishing attacks, and about one-third of It is said to be supported by Cloudflare.

Netcraft maps 20,000 Darcula domains to 11,000 IP addresses, with 120 new domains added every day.

SMS abandonment

Darcula deviates from traditional SMS-based tactics and instead utilizes RCS (Android) and iMessage (iOS) to send messages to victims containing links to phishing URLs.

The advantage of this is that recipients are more likely to believe that the communication is legitimate, relying on additional safeguards not available with SMS.

Additionally, RCS and iMessage support end-to-end encryption, making it impossible to intercept and block phishing messages based on their content.

Netcraft believes that recent global regulatory efforts aimed at curbing SMS-based cybercrime by blocking suspicious messages could lead to PhaaS platforms moving to alternative protocols such as RCS and iMessage. commented that it is high.

However, these protocols come with their own set of limitations that cybercriminals must overcome.

For example, Apple bans accounts that send large numbers of messages to multiple recipients, and Google recently implemented the limit Prevents rooted Android devices from sending and receiving RCS messages.

RCS messages sent from Darcula (net craft)

Cybercriminals attempt to override these restrictions by creating multiple Apple IDs and using device farms to send a small number of messages from each device.

An even more difficult hurdle is iMessage’s safeguard, which allows URL links to be clicked only if the recipient replies to the message.

Phishing messages sent via iMessage (net craft)

To circumvent this tactic, phishing messages instruct recipients to reply with a “Y” or “1” to reopen the message and follow the link. This process can create friction and reduce the effectiveness of phishing attacks.

Users should treat all incoming messages that prompt them to click on a URL with suspicion, especially if the sender is not recognized. Regardless of platform or app, phishers continue to experiment with new delivery methods.

Netcraft researchers also recommend paying attention to inaccurate grammar, misspellings, overly attractive offers, or urgent calls to action.



[ad_2]

Source link

thedailyposting.com
  • Website

Related Posts

Shocking moment a thief climbs over a counter in an east London store, struggles with a female shop assistant and steals an iPhone worth £700

June 28, 2024

AAA games for iPhone and iPad are not very popular with users

June 28, 2024

Apple’s price cuts boost iPhone sales in China

June 28, 2024
Leave A Reply Cancel Reply

ads
© 2025 thedailyposting. Designed by thedailyposting.
  • Home
  • About us
  • Contact us
  • DMCA
  • Privacy Policy
  • Terms of Service
  • Advertise with Us
  • 1711155001.38
  • xtw183871351
  • 1711198661.96
  • xtw18387e4df
  • 1711246166.83
  • xtw1838741a9
  • 1711297158.04
  • xtw183870dc6
  • 1711365188.39
  • xtw183879911
  • 1711458621.62
  • xtw183874e29
  • 1711522190.64
  • xtw18387be76
  • 1711635077.58
  • xtw183874e27
  • 1711714028.74
  • xtw1838754ad
  • 1711793634.63
  • xtw183873b1e
  • 1711873287.71
  • xtw18387a946
  • 1711952126.28
  • xtw183873d99
  • 1712132776.67
  • xtw183875fe9
  • 1712201530.51
  • xtw1838743c5
  • 1712261945.28
  • xtw1838783be
  • 1712334324.07
  • xtw183873bb0
  • 1712401644.34
  • xtw183875eec
  • 1712468158.74
  • xtw18387760f
  • 1712534919.1
  • xtw183876b5c
  • 1712590059.33
  • xtw18387aa85
  • 1712647858.45
  • xtw18387da62
  • 1712898798.94
  • xtw1838737c0
  • 1712953686.67
  • xtw1838795b7
  • 1713008581.31
  • xtw18387ae6a
  • 1713063246.27
  • xtw183879b3c
  • 1713116334.31
  • xtw183872b3a
  • 1713169981.74
  • xtw18387bf0d
  • 1713224008.61
  • xtw183873807
  • 1713277771.7
  • xtw183872845
  • 1713329335.4
  • xtw183874890
  • 1716105960.56
  • xtw183870dd9
  • 1716140543.34
  • xtw18387691b

Type above and press Enter to search. Press Esc to cancel.