Close Menu
The Daily PostingThe Daily Posting
  • Home
  • Android
  • Business
  • IPhone
    • Lifestyle
  • Politics
  • Europe
  • Science
    • Top Post
  • USA
  • World
Facebook X (Twitter) Instagram
Trending
  • Jennifer Lopez and Ben Affleck reveal summer plans after Europe trip
  • T20 World Cup: Quiet contributions from Akshar Patel, Kuldeep Yadav and Ravindra Jadeja justify Rohit Sharma’s spin vision | Cricket News
  • The impact of a sedentary lifestyle on health
  • Bartok: The World of Lilette
  • Economists say the sharp rise in the U.S. budget deficit will put a strain on Americans’ incomes
  • Our Times: Williams memorial unveiled on July 4th | Lifestyle
  • Heatwaves in Europe are becoming more dangerous: what it means for travelers
  • Christian Science speaker to visit Chatauqua Institute Sunday | News, Sports, Jobs
Facebook X (Twitter) Instagram
The Daily PostingThe Daily Posting
  • Home
  • Android
  • Business
  • IPhone
    • Lifestyle
  • Politics
  • Europe
  • Science
    • Top Post
  • USA
  • World
The Daily PostingThe Daily Posting
Android

This new phishing attack targets iPhone and Android alike via RCS.

thedailyposting.comBy thedailyposting.comMarch 28, 2024No Comments

[ad_1]

A new phishing service has been discovered that uses unique methods to reach iOS and Android users.

Discovered by researchers at Netcraft, the Phishing-as-a-Service (PhaaS) tool called ‘Dacula’ is known for its ability to contact victims via the Rich Communications Services (RCS) protocol in Google Messages and iMessage. , stands out from the rest. , instead of the regular Short Message System (SMS).

They explain that there are two reasons for the move to RCS, the first being an improved perception of message legitimacy. Second, RCS messages are end-to-end encrypted, making it impossible to intercept or block messages based solely on message content.

Thousands of domains and IP addresses

Although it is impossible to say how many people received these smishing messages, we do know that they exist in over 100 countries around the world.

Hackers who sign up for the service can choose from over 200 phishing templates to impersonate dozens of organizations. After paying for a subscription, the attacker chooses one of many companies, including postal, financial, government, tax, telecommunications, airlines, and utilities, and includes appropriately placed fonts and logo images. You can get a dedicated phishing website with such things as:

Researchers say the phishing websites are of “high quality.”

“The Darcula platform has been used in a number of high-profile phishing attacks over the past year, including messages received on both Apple and Android devices in the UK, as well as a parcel scam impersonating the United States Postal Service (USPS).” on Reddit. /r/phishing,” the researchers explain in the article.

Sign up for the TechRadar Pro newsletter to get all the top news, opinions, features, and guidance you need to succeed in your business.

PhaaS appears to have around 20,000 domains spread across 11,000 IP addresses. Over 100 new domains are added to the tool every day.

As always, the best way to prevent phishing is to use common sense. It’s best to be especially careful if the message is unexpected, sounds weird, or doesn’t seem to be true.

via peepee computer

Learn more about TechRadar Pro

[ad_2]

Source link

thedailyposting.com
  • Website

Related Posts

Qualcomm wants to make it easier for phone makers to issue Android updates

June 28, 2024

Qualcomm wants to make Android updates easier for OEMs

June 28, 2024

What’s new in the June 2024 Google system update for Android

June 28, 2024
Leave A Reply Cancel Reply

ads
© 2025 thedailyposting. Designed by thedailyposting.
  • Home
  • About us
  • Contact us
  • DMCA
  • Privacy Policy
  • Terms of Service
  • Advertise with Us
  • 1711155001.38
  • xtw183871351
  • 1711198661.96
  • xtw18387e4df
  • 1711246166.83
  • xtw1838741a9
  • 1711297158.04
  • xtw183870dc6
  • 1711365188.39
  • xtw183879911
  • 1711458621.62
  • xtw183874e29
  • 1711522190.64
  • xtw18387be76
  • 1711635077.58
  • xtw183874e27
  • 1711714028.74
  • xtw1838754ad
  • 1711793634.63
  • xtw183873b1e
  • 1711873287.71
  • xtw18387a946
  • 1711952126.28
  • xtw183873d99
  • 1712132776.67
  • xtw183875fe9
  • 1712201530.51
  • xtw1838743c5
  • 1712261945.28
  • xtw1838783be
  • 1712334324.07
  • xtw183873bb0
  • 1712401644.34
  • xtw183875eec
  • 1712468158.74
  • xtw18387760f
  • 1712534919.1
  • xtw183876b5c
  • 1712590059.33
  • xtw18387aa85
  • 1712647858.45
  • xtw18387da62
  • 1712898798.94
  • xtw1838737c0
  • 1712953686.67
  • xtw1838795b7
  • 1713008581.31
  • xtw18387ae6a
  • 1713063246.27
  • xtw183879b3c
  • 1713116334.31
  • xtw183872b3a
  • 1713169981.74
  • xtw18387bf0d
  • 1713224008.61
  • xtw183873807
  • 1713277771.7
  • xtw183872845
  • 1713329335.4
  • xtw183874890
  • 1716105960.56
  • xtw183870dd9
  • 1716140543.34
  • xtw18387691b

Type above and press Enter to search. Press Esc to cancel.