<?xml version="1.0" encoding="utf-8" standalone="yes" ?>
<rss version="2.0" 
  xmlns:content="http://purl.org/rss/1.0/modules/content/" 
  xmlns:dc="http://purl.org/dc/elements/1.1/" 
  xmlns:atom="http://www.w3.org/2005/Atom" 
  xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" 
  xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Phishing on Untrusted Network</title>
    <link>https://untrustednetwork.net/en/tag/phishing/</link>
    <description>Recent content in Phishing on Untrusted Network</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en</language>
    <copyright>&amp;copy; Jan Kopriva 2015 - {year}</copyright>
    <lastBuildDate>Mon, 23 Feb 2026 15:35:00 +0100</lastBuildDate>
    <sy:updatePeriod>weekly</sy:updatePeriod>
    <sy:updateFrequency>weekly</sy:updateFrequency>
    
        <atom:link href="https://untrustednetwork.net/en/tag/phishing/index.xml" rel="self" type="application/rss+xml" />
    
    
    

      
      <item>
        <title>SANS ISC Diary - Another day, another malicious JPEG</title>
        <link>https://untrustednetwork.net/en/2026/02/23/malicious-jpeg/</link>
        <pubDate>Mon, 23 Feb 2026 15:35:00 +0100</pubDate>
        
        <atom:modified>Mon, 23 Feb 2026 15:35:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2026/02/23/malicious-jpeg/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a recent malspam campagin delivering a multi-stage infection chain involving a JScript downloader, WMI-spawned PowerShell, and an in-memory .NET assembly extracted from a JPEG file&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/32738&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a recent malspam campagin delivering a multi-stage infection chain involving a JScript downloader, WMI-spawned PowerShell, and an in-memory .NET assembly extracted from a JPEG file&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Remcos</category>
            
          
            
              <category>Malware</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2026</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - A phishing campaign with QR codes rendered using an HTML table</title>
        <link>https://untrustednetwork.net/en/2026/01/07/qr-code-html-table/</link>
        <pubDate>Wed, 07 Jan 2026 10:35:00 +0100</pubDate>
        
        <atom:modified>Wed, 07 Jan 2026 10:35:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2026/01/07/qr-code-html-table/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a phishing campaign, in which QR codes were implemented with the help of HTML tables instead of images&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/32606&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a phishing campaign, in which QR codes were implemented with the help of HTML tables instead of images&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>QR code</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2026</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Use of CSS stuffing as an obfuscation technique?</title>
        <link>https://untrustednetwork.net/en/2025/11/21/css-stuffing/</link>
        <pubDate>Fri, 21 Nov 2025 10:50:00 +0100</pubDate>
        
        <atom:modified>Fri, 21 Nov 2025 10:50:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2025/11/21/css-stuffing/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a phishing page, which - probably as an obfusctaion technique - contained a large amount of garbage CSS code&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/32510&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a phishing page, which - probably as an obfusctaion technique - contained a large amount of garbage CSS code&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>CSS</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2025</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - A phishing with invisible characters in the subject line</title>
        <link>https://untrustednetwork.net/en/2025/10/28/invisible-subject/</link>
        <pubDate>Tue, 28 Oct 2025 10:55:00 +0100</pubDate>
        
        <atom:modified>Tue, 28 Oct 2025 10:55:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2025/10/28/invisible-subject/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at an unusual phishing message which contained &amp;ldquo;invisible&amp;rdquo; characters in its subject line&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/32428&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at an unusual phishing message which contained &amp;ldquo;invisible&amp;rdquo; characters in its subject line&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2025</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - A quick look at sextortion at scale: 1,900 messages and 205 Bitcoin addresses spanning four years</title>
        <link>https://untrustednetwork.net/en/2025/09/02/sextortion-2021-2025/</link>
        <pubDate>Tue, 02 Sep 2025 10:00:00 +0100</pubDate>
        
        <atom:modified>Tue, 02 Sep 2025 10:00:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2025/09/02/sextortion-2021-2025/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll discuss the analysis of approximately 1,900 sextortion e-mails spanning years 2021-2025, and look at interesting statistical data that resulted from this analysis&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/32252&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll discuss the analysis of approximately 1,900 sextortion e-mails spanning years 2021-2025, and look at interesting statistical data that resulted from this analysis&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Sextortion</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2025</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Do sextortion scams still work in 2025?</title>
        <link>https://untrustednetwork.net/en/2025/08/06/sextortion-2025/</link>
        <pubDate>Wed, 06 Aug 2025 11:30:00 +0100</pubDate>
        
        <atom:modified>Wed, 06 Aug 2025 11:30:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2025/08/06/sextortion-2025/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll discuss whether sextortion scams are still effective in 2025&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/32178&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll discuss whether sextortion scams are still effective in 2025&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Sextortion</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2025</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Phishing e-mail that hides malicious link from Outlook users</title>
        <link>https://untrustednetwork.net/en/2025/06/04/hidden-outlook-link/</link>
        <pubDate>Wed, 04 Jun 2025 12:30:00 +0100</pubDate>
        
        <atom:modified>Wed, 04 Jun 2025 12:30:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2025/06/04/hidden-outlook-link/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at an interesting phishing e-mail that hides the link to a malicious site from Oulook users&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/32010&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at an interesting phishing e-mail that hides the link to a malicious site from Oulook users&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Air Bank</category>
            
          
            
              <category>Outlook</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2025</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Another day, another phishing campaign abusing google.com open redirects</title>
        <link>https://untrustednetwork.net/en/2025/05/14/google-open-redirect/</link>
        <pubDate>Wed, 14 May 2025 12:30:00 +0100</pubDate>
        
        <atom:modified>Wed, 14 May 2025 12:30:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2025/05/14/google-open-redirect/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at an actively exploited open redirect vulnerability in Google Travel service that enables threat actors to craft links pointing to www.google.com which cause redirection to an arbitrary URL&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/31950&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at an actively exploited open redirect vulnerability in Google Travel service that enables threat actors to craft links pointing to &lt;a href=&#34;http://www.google.com&#34;&gt;www.google.com&lt;/a&gt; which cause redirection to an arbitrary URL&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Google</category>
            
          
            
              <category>Vulnerability</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2025</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - It&#39;s 2025... so why are obviously malicious advertising URLs still going strong?</title>
        <link>https://untrustednetwork.net/en/2025/04/21/goolge-ads-phishing/</link>
        <pubDate>Mon, 21 Apr 2025 10:50:00 +0100</pubDate>
        
        <atom:modified>Mon, 21 Apr 2025 10:50:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2025/04/21/goolge-ads-phishing/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a phishing campaign, in which Google Ad service was used for redirection of victims, and at security weaknesses of web-based ad services in general&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/31880&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a phishing campaign, in which Google Ad service was used for redirection of victims, and at security weaknesses of web-based ad services in general&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Google</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2025</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - A Tale of Two Phishing Sites</title>
        <link>https://untrustednetwork.net/en/2025/03/28/2-phishing-sites/</link>
        <pubDate>Fri, 28 Mar 2025 13:00:00 +0100</pubDate>
        
        <atom:modified>Fri, 28 Mar 2025 13:00:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2025/03/28/2-phishing-sites/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at two phishing sites based on the same phishing kit, that differed significantly (not just) in the level of obfuscation&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/31810&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at two phishing sites based on the same phishing kit, that differed significantly (not just) in the level of obfuscation&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Obfuscation</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2025</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - An unusual &#39;shy z-wasp&#39; phishing</title>
        <link>https://untrustednetwork.net/en/2025/01/27/shy-z-wasp/</link>
        <pubDate>Mon, 27 Jan 2025 12:20:00 +0100</pubDate>
        
        <atom:modified>Mon, 27 Jan 2025 12:20:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2025/01/27/shy-z-wasp/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at an unusual phishing message, in which two different techniques for splitting text using unrendered characters were used with the intention of bypassing security scans&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/31626&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at an unusual phishing message, in which two different techniques for splitting text using unrendered characters were used with the intention of bypassing security scans&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Z-WASP</category>
            
          
            
              <category>HTML</category>
            
          
            
              <category>Outlook</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2025</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Self-contained HTML phishing attachment using Telegram to exfiltrate stolen credentials</title>
        <link>https://untrustednetwork.net/en/2024/10/28/telegram-phishing/</link>
        <pubDate>Mon, 28 Oct 2024 08:15:00 +0100</pubDate>
        
        <atom:modified>Mon, 28 Oct 2024 08:15:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2024/10/28/telegram-phishing/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at an HTML phishing attachment which used Telegram to send stolen credentials back to its authors&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/31388&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at an HTML phishing attachment which used Telegram to send stolen credentials back to its authors&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Telegram</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2024</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Phishing links with @ sign and the need for effective security awareness building</title>
        <link>https://untrustednetwork.net/en/2024/09/23/at-phishing/</link>
        <pubDate>Mon, 23 Sep 2024 08:55:00 +0100</pubDate>
        
        <atom:modified>Mon, 23 Sep 2024 08:55:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2024/09/23/at-phishing/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at misuse of the user information string in a URL, and at the topic of effective security awareness building in relation to phishing&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/31288&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at misuse of the user information string in a URL, and at the topic of effective security awareness building in relation to phishing&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2024</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - &#39;Reply-chain phishing&#39; with a twist</title>
        <link>https://untrustednetwork.net/en/2024/07/16/reply-chain-phishing/</link>
        <pubDate>Tue, 16 Jul 2024 11:30:00 +0100</pubDate>
        
        <atom:modified>Tue, 16 Jul 2024 11:30:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2024/07/16/reply-chain-phishing/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a slightly unusual &amp;ldquo;reply-chain&amp;rdquo; phishing technique&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/31084&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a slightly unusual &amp;ldquo;reply-chain&amp;rdquo; phishing technique&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2024</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Files with TXZ extension used as malspam attachments</title>
        <link>https://untrustednetwork.net/en/2024/05/27/txz-malspam/</link>
        <pubDate>Mon, 27 May 2024 08:45:00 +0100</pubDate>
        
        <atom:modified>Mon, 27 May 2024 08:45:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2024/05/27/txz-malspam/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at recent malspam campaigns distributing files with the TXZ extension&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/30958&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at recent malspam campaigns distributing files with the TXZ extension&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>TZX</category>
            
          
            
              <category>xz-utils</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>GuLoader</category>
            
          
            
              <category>Formbook</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2024</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Increase in the number of phishing messages pointing to IPFS and to R2 buckets</title>
        <link>https://untrustednetwork.net/en/2024/03/14/ipfs-r2-phishing/</link>
        <pubDate>Thu, 14 Mar 2024 09:55:00 +0100</pubDate>
        
        <atom:modified>Thu, 14 Mar 2024 09:55:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2024/03/14/ipfs-r2-phishing/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a recent rise in the number of phishing messages pointing to IPFS and R2 buckets&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/30744&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a recent rise in the number of phishing messages pointing to IPFS and R2 buckets&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>IPFS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Cloudflare</category>
            
          
            
              <category>R2</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2024</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>Actively exploited open redirect in Google Web Light</title>
        <link>https://untrustednetwork.net/en/2024/02/26/google-open-redirect/</link>
        <pubDate>Mon, 26 Feb 2024 06:30:00 +0100</pubDate>
        
        <atom:modified>Mon, 26 Feb 2024 06:30:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2024/02/26/google-open-redirect/</guid>
        <description>TL;DR: An open redirect vulnerability exists in the remains of Google Web Light service, which is being actively exploited in multiple phishing campaigns. Google decided not to fix it, so it might be advisable to block access to the Web Light domain in corporate environments…
If you are already aware of the principles behind “open redirect” vulnerabilities and want jump straight to the discussion of the Web Light vulnerability and its active exploitation, click here.</description>
        <content:encoded>&lt;p&gt;&lt;i&gt;TL;DR: An open redirect vulnerability exists in the remains of Google Web Light service, which is being actively exploited in multiple phishing campaigns. Google decided not to fix it, so it might be advisable to block access to the Web Light domain in corporate environments…&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;If you are already aware of the principles behind “open redirect” vulnerabilities and want jump straight to the discussion of the Web Light vulnerability and its active exploitation, click &lt;a href=&#34;#vulnerability&#34;&gt;here&lt;/a&gt;. If you are not, let’s first set the stage by discussing what open redirects are and how they may be used by threat actors…&lt;/p&gt;
&lt;p&gt;Open redirect – or &lt;a href=&#34;https://cwe.mitre.org/data/definitions/601.html&#34;&gt;CWE-601&lt;/a&gt; – is a type of software vulnerability, which affects web applications that redirect its visitors to URLs, that are dynamically created based on user-controlled input, if these applications don&amp;rsquo;t sufficiently validate whether these URLs are “trusted”. In basic terms, any such vulnerability allows for creation of links, which point to a vulnerable application and which cause it to automatically redirect the browser of a visitor to another (usually any specified) URL.&lt;/p&gt;
&lt;p&gt;If the potential impact of such a vulnerability isn’t clear to you, imagine if a web application of a well-known bank running at “www.mybank.tld” redirected visitors to the domain “login.mybank.tld” using a dynamic redirection mechanism, which would accept the target URL through a “redirect_to” parameter. A URL used for this redirection might look like this.&lt;/p&gt;
&lt;p&gt;&lt;kbd&gt;ht&lt;span&gt;tps://www.my&lt;/span&gt;mybank.tld/?redirect_to=ht&lt;span&gt;tps://login.my&lt;/span&gt;bank.tld&lt;/p&gt;
&lt;p&gt;You might wonder why someone would use the above-mentioned “dynamic” approach to redirection instead of using static links. The truth is that there may be certain benefits to doing so this way – probably the most important one being the ability to precisely track “clickthroughs” to different destinations (e.g., for marketing purposes).&lt;/p&gt;
&lt;p&gt;In any case, if the redirection mechanism in our example allowed only for limited redirection to URLs within the second-level domain mybank.tld, it would most likely be quite alright from a security standpoint. However, if the mechanism lacked any sort of validation of the target URL, one could easily create a link, which would point to the trusted site of the bank, but which would result in a redirection to an untrusted (and potentially malicious) site… For example a literal “untrusted” site:&lt;/p&gt;
&lt;p&gt;&lt;kbd&gt;ht&lt;span&gt;tps://www.my&lt;/span&gt;mybank.tld/?redirect_to=ht&lt;span&gt;tps://untrustednetwork&lt;/span&gt;.net&lt;/p&gt;
&lt;p&gt;You can probably see the issue – in such a case, any threat actor out there could create a link pointing to the legitimate website of the bank, which would – when opened – result in redirection to a malicious site of their choosing. This could be quite useful for phishing attacks. Since most people only check the beginning of a URL before opening it, if they saw that a link in an e-mail points to a valid domain of the bank, they might be much more willing to click it than if it pointed to a different/unknown domain. And, in fact, threat actors do actively exploit these vulnerabilities in just this way - by redirecting unsuspecting victims to phishing sites through legitimate domains…&lt;/p&gt;
&lt;p&gt;As we can see, although open redirects are hardly the most dangerous type of vulnerabilities in existence, they do sometimes pose a not insignificant risk – especially if the affected application is hosted on a well-known and well-trusted domain. This viewpoint is well-supported by the fact that “Unvalidated Redirects and Forwards” were actually included in the &lt;a href=&#34;https://owasp.org/www-pdf-archive/OWASP_Top_10_-_2010.pdf&#34;&gt;2010 version of OWASP Top 10&lt;/a&gt; (i.e., they were considered by the security community at large to be one of the 10 most significant risks related to web applications at that time).&lt;/p&gt;
&lt;p&gt;Nevertheless, since successful exploitation of these vulnerabilities is dependent on social engineering, and their impact is limited, many organizations consider them either very low risk, or non-issues. For some organizations and some domains, this may be understandable, while for others not so much…&lt;/p&gt;
&lt;p&gt;One organization, which &lt;a href=&#34;https://bughunters.google.com/learn/invalid-reports/web-platform/navigation/6680364896223232/open-redirectors&#34;&gt;takes the overall viewpoint&lt;/a&gt; that “a small number of properly monitored redirectors offers fairly clear benefits and poses very little practical risk” is Google.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/2024/03-google-phishing/google-open-redirectors.png&#34; alt=&#34;Google&#39;s take on open redirectors&#34; style=&#34;max-width:800px;width:100%;border:1px solid grey&#34;&gt;
&lt;div align=right&gt;&lt;kbd&gt;Source: &lt;a href=&#34;https://bughunters.google.com/learn/invalid-reports/web-platform/navigation/6680364896223232/open-redirectors&#34;&gt;Google&lt;/a&gt;&lt;/kbd&gt;&lt;/div&gt;
&lt;br&gt;
&lt;p&gt;While I personally disagree with the “very little practical risk” part (especially in connection with any domain owned by Google) I completely understand the “clear benefits” portion of the sentence… Though it should be stressed that the “benefits” are not to users of Google services, but to Google itself, since – as we already mentioned – redirection mechanisms are quite useful for marketing-related tracking.&lt;/p&gt;
&lt;p&gt;Although I don&amp;rsquo;t want to appear petty, it is also worth noting that my views on risks connected with open redirects on Google’s domains are shared by its own AI…&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/2024/03-google-phishing/gemini-open-redirect.png&#34; alt=&#34;Google Gemini take on open redirect vulnerabilities&#34; style=&#34;max-width:800px;width:100%;border:1px solid grey&#34;&gt;
&lt;div align=right&gt;&lt;kbd&gt;Source: Google Gemini&lt;/kbd&gt;&lt;/div&gt;
&lt;br&gt;
&lt;p&gt;That is beside the point, however.&lt;/p&gt;
&lt;p&gt;What is important is that even though Google sees “very little practical risk” in open redirection, it has implemented sufficient security measures for most of its services where open redirection is actually used. I.e., some Google services do allow for redirection to arbitrary URLs, however, if these services are linked to from an external source (e.g., an e-mail or a third-party site), then the user is first asked if the redirection should take place. You can see how this looks by opening either of the following links.&lt;/p&gt;
&lt;p&gt;&lt;kbd&gt;&lt;a href=&#34;https://www.google.com/url?sa=t&amp;amp;url=https://untrustednetwork.net&#34;&gt;https://www.google.com/url?sa=t&amp;amp;url=https://untrustednetwork.net&lt;/a&gt;&lt;br /&gt;
&lt;kbd&gt;&lt;a href=&#34;https://www.youtube.com/redirect?q=https%3A%2F%2Fwww.untrustednetwork.net&#34;&gt;https://www.youtube.com/redirect?q=https%3A%2F%2Fwww.untrustednetwork.net&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;While some aspects of the defensive mechanisms that are in place could potentially be &lt;a id=&#34;vulnerability&#34; href=&#34;https://untrustednetwork.net/en/2019/07/22/half-open-redirect-vulnerability-in-youtube/&#34;&gt;improved upon&lt;/a&gt;, they generally provide adequate protection from the most common exploitation approaches and techniques. Problem is that not all Google services and domains are secured in this way.&lt;/p&gt;
&lt;p&gt;One service, which does not have any similar protection mechanisms in place, is/was named &lt;a href=&#34;https://en.wikipedia.org/wiki/Google_Web_Light&#34;&gt;Google Web Light&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;It was first introduced in 2015 and provided a way to load web pages faster in Chrome on Android devices. In simple terms, Web Light served as a specialized proxy server, which “optimized” the transmitted content through compression and filtering in such a way, that &lt;a href=&#34;https://web.archive.org/web/20221215075806/https://developers.google.com/search/docs/crawling-indexing/mobile/web-light&#34;&gt;according to Google&lt;/a&gt;, in their experiments, optimized pages loaded four times faster than the original pages and used 80% fewer bytes. For mobile devices of the time, which were connected to the internet through low-bandwidth links (i.e., over 2G), this undoubtedly made significant difference.&lt;/p&gt;
&lt;p&gt;Google offered the service for several years (though only in selected countries) before &lt;a href=&#34;https://developers.google.com/search/updates#december-2022&#34;&gt;officially retiring the Web Light crawler&lt;/a&gt; in December 2022, when it was decided that the service was no longer needed given the increase in general availability of fast mobile internet and more computationally powerful mobile devices.&lt;/p&gt;
&lt;p&gt;However, the fact that the Web Light service as a whole was retired didn’t mean that all of its functions suddenly stopped working. In fact, to this day, the &lt;a href=&#34;https://web.archive.org/web/20221215075806/https:/developers.google.com/search/docs/crawling-indexing/mobile/web-light#see-the-web-light-version-of-a-web-page&#34;&gt;Web Light preview functionality&lt;/a&gt; is partially available… though it does not function in precisely the same way as it used to.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/2024/03-google-phishing/google-weblight-preview.png&#34; alt=&#34;Google Web Light preview functionality&#34; style=&#34;max-width:800px;width:100%;border:1px solid grey&#34;&gt;
&lt;div align=right&gt;&lt;kbd&gt;Source: Google&lt;/kbd&gt;&lt;/div&gt;
&lt;br&gt;
&lt;p&gt;If one tries to use the preview functionality these days, it does not provide a preview of a web page through the Web Light crawler as it used to – it can’t since the crawler is no longer being used – but rather simply redirects the visitor to the provided target URL using HTTP 301 response… You can probably see where this is going.&lt;/p&gt;
&lt;p&gt;Indeed, the redirection mechanism used on &lt;a href=&#34;https://googleweblight.com/&#34;&gt;https://googleweblight.com/&lt;/a&gt; appears to be completely open and unrestricted, and – unlike YouTube and Google search – does not display any warning that the browser is about to be redirected. You may try this yourself by opening the following link.&lt;/p&gt;
&lt;p&gt;&lt;kbd&gt;&lt;a href=&#34;https://googleweblight.com/i?u=untrustednetwork.net&#34;&gt;https://googleweblight.com/i?u=untrustednetwork.net&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;How big of a problem is this? Well, it depends on how trustworthy you consider the domain googleweblight.com to be… It certainly isn’t as bad as if the open redirect existed on google.com (though, by the way, there is at least &lt;a href=&#34;https://www.google.com/amp/s/untrustednetwork.net/&#34;&gt;one&lt;/a&gt; on that domain as well). Nevertheless, the fact that the domain name begins with “www.google&amp;hellip;”, and that the domain is actually &lt;a href=&#34;https://who.is/whois/googleweblight.com&#34;&gt;registered by Google&lt;/a&gt; lends it at least some level of credibility, both when it comes to people seeing a link to it, as well as when such a link is evaluated by automated security solutions.&lt;/p&gt;
&lt;p&gt;Threat actors obviously think that is looks trustworthy too, since I have seen the open redirect on googleweblight.com used in two different phishing campaigns just last week…&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/2024/03-google-phishing/phish1.png&#34; alt=&#34;Phishing message with link pointing to googleweblight.com&#34; style=&#34;max-width:800px;width:100%;border:1px solid grey&#34;&gt;
&lt;br&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/2024/03-google-phishing/phish2.png&#34; alt=&#34;Phishing message with link pointing to googleweblight.com&#34; style=&#34;max-width:800px;width:100%;border:1px solid grey&#34;&gt;
&lt;br&gt;
&lt;p&gt;As you may see, the links in the two phishing messages pointed to the following URLs:&lt;/p&gt;
&lt;p&gt;&lt;kbd&gt;hxxp[:]//googleweblight[.]com/i?u=hxxps[:]//bafybeicrejl4lniju4uumll6zph6fbntlgnarnd22kyijwfqmcltj2icba.ipfs.cf-ipfs[.]com/webmail.html#[e-mail address]&lt;/p&gt;
&lt;p&gt;&lt;kbd&gt;hxxps[:]//googleweblight[.]com/i?u=hxxps[:]//cloudflare-ipfs[.]com/ipfs/bafybeifrl56eni6oixqpdknl6n2fcatl23jvefr4knsrbaut7opquzcyry/#[e-mail address]&lt;/p&gt;
&lt;p&gt;Both of these links still work at the time of writing and lead to generic credential-stealing phishing pages. Note that both of them are hosted on &lt;a href=&#34;https://en.wikipedia.org/wiki/InterPlanetary_File_System&#34;&gt;IPFS&lt;/a&gt;, even if they are accessed through different gateways…&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/2024/03-google-phishing/phishing-page1.png&#34; alt=&#34;Phishing page hosted on IPFS&#34; style=&#34;max-width:800px;width:100%;border:1px solid grey&#34;&gt;
&lt;br&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/2024/03-google-phishing/phishing-page2.png&#34; alt=&#34;Phishing page hosted on IPFS&#34; style=&#34;max-width:800px;width:100%;border:1px solid grey&#34;&gt;
&lt;br&gt;
&lt;p&gt;This is far from the first time that the Google Web Light open redirect mechanism was used in a phishing campaign – analysts from Trustwave &lt;a href=&#34;https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/ipfs-the-new-hotbed-of-phishing/&#34;&gt;mentioned seeing it used in 2022&lt;/a&gt;, and I myself came across it in a phishing campaign in 2023. Nevertheless, the fact that even with the limited visibility I have, I came across two messages from different campaigns that exploit this vulnerability in a single week would seem to indicate that the use of this redirection mechanism by phishing authors might be becoming more of a mainstream technique, and thus might warrant some response.&lt;/p&gt;
&lt;p&gt;I have therefore reported the fact that the open redirect on the Web Light domain exists and is under active exploitation to Google, along with a recommendation for implementing the same defenses there, as they have on their other services. They responded that the open redirect is intended behavior, and that their “position on open redirectors is described in greater detail in &lt;a href=&#34;https://bughunters.google.com/learn/invalid-reports/web-platform/navigation/6680364896223232/open-redirectors&#34;&gt;this article&lt;/a&gt;”. Since it therefore appears that Google’s “Web Light Open Redirection Service”, as I shall call it from now on, will stay with us for at least the foreseeable future, it might be worth thinking about what we may do about it ourselves.&lt;/p&gt;
&lt;p&gt;Since the googleweblight.com domain is connected with a retired service and will therefore hardly be used for anything business-relevant in the near future, the most straightforward approach would seem to be to filter out/quarantine any e-mails with links that point to it and/or to completely block access to it. Although the domain will probably never make it to any commercial or publicly available blocklist, since it is registered by Google, and no content hosted on it is actually malicious, nothing is stopping us from manually adding it to any internal blocklists we may be using within our own organizations…&lt;/p&gt;
&lt;p&gt;While we’re on the subject, it might be worthwhile to do the same thing with &lt;a href=&#34;https://github.com/ipfs/public-gateway-checker/blob/main/gateways.json&#34;&gt;all public IPFS gateways&lt;/a&gt; as well. Since IPFS currently has very low (if any) business relevance for most organization, and threat actors use it &lt;a href=&#34;https://www.trendmicro.com/en_vn/research/22/l/web3-ipfs-only-used-for-phishing---so-far.html&#34;&gt;quite heavily&lt;/a&gt; to host phishing pages, this simple step might help us significantly reduce risk connected with untargeted phishing… But we’ll discuss that in more detail another time.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.net/images/2024/03-google-phishing/title.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>Vulnerability</category>
            
          
            
              <category>Google</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>IPFS</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>Vulnerabilities</category>
            
          
            
              <category>2024</category>
            
          
        
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Phishing pages hosted on archive.org</title>
        <link>https://untrustednetwork.net/en/2024/02/21/internet-archive-phishing/</link>
        <pubDate>Wed, 21 Feb 2024 08:30:00 +0100</pubDate>
        
        <atom:modified>Wed, 21 Feb 2024 08:30:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2024/02/21/internet-archive-phishing/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at hosting of phishing pages on archive.org&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/30676&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at hosting of phishing pages on archive.org&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Internet Archive</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2024</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Interesting large and small malspam attachments from 2023</title>
        <link>https://untrustednetwork.net/en/2024/01/03/2023-malspam/</link>
        <pubDate>Wed, 03 Jan 2024 15:00:00 +0100</pubDate>
        
        <atom:modified>Wed, 03 Jan 2024 15:00:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2024/01/03/2023-malspam/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at the largest and smallest malware samples, that my malspam traps caught last year&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/30524&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at the largest and smallest malware samples, that my malspam traps caught last year&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Malware</category>
            
          
            
              <category>Malspam</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2024</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Phishing page with trivial anti-analysis features</title>
        <link>https://untrustednetwork.net/en/2023/11/17/phishing-anti-analysis/</link>
        <pubDate>Fri, 17 Nov 2023 11:10:00 +0100</pubDate>
        
        <atom:modified>Fri, 17 Nov 2023 11:10:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2023/11/17/phishing-anti-analysis/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a phishing page with easily bypassed anti-analysis features&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/30412&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a phishing page with easily bypassed anti-analysis features&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2023</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Are typos still relevant as an indicator of phishing?</title>
        <link>https://untrustednetwork.net/en/2023/10/16/phishing-typos/</link>
        <pubDate>Mon, 16 Oct 2023 09:45:00 +0100</pubDate>
        
        <atom:modified>Mon, 16 Oct 2023 09:45:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2023/10/16/phishing-typos/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll discuss whether typos are still useful as an indicator of phishing&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/30316&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll discuss whether typos are still useful as an indicator of phishing&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2023</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - A new spin on the ZeroFont phishing technique</title>
        <link>https://untrustednetwork.net/en/2023/09/26/zerofont-phishing/</link>
        <pubDate>Tue, 26 Sep 2023 11:20:00 +0100</pubDate>
        
        <atom:modified>Tue, 26 Sep 2023 11:20:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2023/09/26/zerofont-phishing/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a novel phishing technique, in which text written in zero-size font is used in order to make messages appear more trustworthy&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/30248&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a novel phishing technique, in which text written in zero-size font is used in order to make messages appear more trustworthy&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>HTML</category>
            
          
            
              <category>ZeroFont</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2023</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - The low, low cost of (committing) cybercrime</title>
        <link>https://untrustednetwork.net/en/2023/08/31/cost-of-cybercrime/</link>
        <pubDate>Thu, 31 Aug 2023 12:00:00 +0100</pubDate>
        
        <atom:modified>Thu, 31 Aug 2023 12:00:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2023/08/31/cost-of-cybercrime/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a simple phishing which demonstrates quite well that the cost of committing cybercrime can unfortunately be extremely low&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/30176&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a simple phishing which demonstrates quite well that the cost of committing cybercrime can unfortunately be extremely low&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>HTML</category>
            
          
            
              <category>JavaScript</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2023</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Ongoing Facebook phishing campaign without a sender and (almost) without links</title>
        <link>https://untrustednetwork.net/en/2023/05/15/facebook-phishing/</link>
        <pubDate>Mon, 15 May 2023 09:35:00 +0100</pubDate>
        
        <atom:modified>Mon, 15 May 2023 09:35:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2023/05/15/facebook-phishing/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at an interesting, long-term phishing campaign targeting Facebook users&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/29848&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at an interesting, long-term phishing campaign targeting Facebook users&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>HTML</category>
            
          
            
              <category>Facebook</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2023</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - &#39;Passive&#39; analysis of a phishing attachment</title>
        <link>https://untrustednetwork.net/en/2023/05/01/passive-phishing-analysis/</link>
        <pubDate>Mon, 01 May 2023 12:40:00 +0100</pubDate>
        
        <atom:modified>Mon, 01 May 2023 12:40:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2023/05/01/passive-phishing-analysis/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a &amp;ldquo;passive&amp;rdquo;, OPSEC-friendly approach to the analysis of HTML phishing attachments&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/29798&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a &amp;ldquo;passive&amp;rdquo;, OPSEC-friendly approach to the analysis of HTML phishing attachments&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>HTML</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2023</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Use of X-Frame-Options and CSP frame-ancestors security headers on 1 million most popular domains</title>
        <link>https://untrustednetwork.net/en/2023/03/31/http-headers/</link>
        <pubDate>Fri, 31 Mar 2023 14:50:00 +0100</pubDate>
        
        <atom:modified>Fri, 31 Mar 2023 14:50:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2023/03/31/http-headers/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at the use of security-related HTTP headers that are able to prevent &amp;ldquo;framing attacks&amp;rdquo; on one million most commonly visited domains&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/29698&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at the use of security-related HTTP headers that are able to prevent &amp;ldquo;framing attacks&amp;rdquo; on one million most commonly visited domains&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>HTTP</category>
            
          
            
              <category>CSP</category>
            
          
            
              <category>X-Frame-Options</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2023</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - IPFS phishing and the need for correctly set HTTP security headers</title>
        <link>https://untrustednetwork.net/en/2023/03/15/ipfs-phishing/</link>
        <pubDate>Wed, 15 Mar 2023 12:20:00 +0100</pubDate>
        
        <atom:modified>Wed, 15 Mar 2023 12:20:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2023/03/15/ipfs-phishing/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at several phishing pages hosted on a disributed file system IPFS and shortly dicuss the potential of HTTP security headers to serve as a defense against phishing&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/29638&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at several phishing pages hosted on a disributed file system IPFS and shortly dicuss the potential of HTTP security headers to serve as a defense against phishing&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>HTTP</category>
            
          
            
              <category>HTML</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2023</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - HTML phishing attachment with browser-in-the-browser technique</title>
        <link>https://untrustednetwork.net/en/2023/02/16/bitb/</link>
        <pubDate>Thu, 16 Feb 2023 12:20:00 +0100</pubDate>
        
        <atom:modified>Thu, 16 Feb 2023 12:20:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2023/02/16/bitb/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at the use of &amp;ldquo;browser-in-the-browser&amp;rdquo; technique in a generic phishing campaign&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/29556&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at the use of &amp;ldquo;browser-in-the-browser&amp;rdquo; technique in a generic phishing campaign&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Browser in the browser</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2023</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - HTML phishing attachments - now with anti-analysis features</title>
        <link>https://untrustednetwork.net/en/2022/06/01/anti-analysis-phishing/</link>
        <pubDate>Wed, 01 Jun 2022 12:05:00 +0100</pubDate>
        
        <atom:modified>Wed, 01 Jun 2022 12:05:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2022/06/01/anti-analysis-phishing/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at an unusual use of anti-debugging/anti-analysis techniques in a phishing page&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/28702&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at an unusual use of anti-debugging/anti-analysis techniques in a phishing page&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2022</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Do you want 30 BTC? Nothing is easier (or cheaper) in this phishing campaign...</title>
        <link>https://untrustednetwork.net/en/2022/05/18/btc-phishing/</link>
        <pubDate>Wed, 18 May 2022 07:50:00 +0100</pubDate>
        
        <atom:modified>Wed, 18 May 2022 07:50:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2022/05/18/btc-phishing/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a sophisticated phishing campaign that offered 30 BTC (in someone else&amp;rsquo;s account) in an attempt to get victims to send it money&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/28662&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a sophisticated phishing campaign that offered 30 BTC (in someone else&amp;rsquo;s account) in an attempt to get victims to send it money&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Bitcoin</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2022</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Phishing e-mail with...an advertisement?</title>
        <link>https://untrustednetwork.net/en/2022/01/18/phishing_with_advertisement/</link>
        <pubDate>Tue, 18 Jan 2022 10:10:00 +0100</pubDate>
        
        <atom:modified>Tue, 18 Jan 2022 10:10:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2022/01/18/phishing_with_advertisement/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a slightly unusual phishing message that contained text reminiscent of an advertisement for Xerox products&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/28250&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a slightly unusual phishing message that contained text reminiscent of an advertisement for Xerox products&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2022</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Phishing page hiding itself using dynamically adjusted IP-based allow list</title>
        <link>https://untrustednetwork.net/en/2021/11/24/phishing_allow_list/</link>
        <pubDate>Wed, 24 Nov 2021 12:10:00 +0100</pubDate>
        
        <atom:modified>Wed, 24 Nov 2021 12:10:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/11/24/phishing_allow_list/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at an interesting protection mechanism used on a phishing site to deny access to it to anyone but the victim who first clicked the link in a phishing mail&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/28070&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at an interesting protection mechanism used on a phishing site to deny access to it to anyone but the victim who first clicked the link in a phishing mail&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Phishing 101: why depend on one suspicious message subject when you can use many?</title>
        <link>https://untrustednetwork.net/en/2021/09/16/phishing-multiple-subjects/</link>
        <pubDate>Thu, 16 Sep 2021 09:10:00 +0200</pubDate>
        
        <atom:modified>Thu, 16 Sep 2021 09:10:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/09/16/phishing-multiple-subjects/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a phishing that tried to use multiple suspicious message subjects to lure the recipient to a phishing site&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/27842&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a phishing that tried to use multiple suspicious message subjects to lure the recipient to a phishing site&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - A sextortion e-mail from...IT support?!</title>
        <link>https://untrustednetwork.net/en/2021/07/28/sextortion_from_it/</link>
        <pubDate>Wed, 28 Jul 2021 08:35:00 +0200</pubDate>
        
        <atom:modified>Wed, 28 Jul 2021 08:35:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/07/28/sextortion_from_it/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a slightly unusual sextortion phishing, in which its author claimed to work for an IT service company hired by recipients e-mail provider&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/27682&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a slightly unusual sextortion phishing, in which its author claimed to work for an IT service company hired by recipients e-mail provider&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Sextortion</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - One way to fail at malspam - give recipients the wrong password for an encrypted attachment </title>
        <link>https://untrustednetwork.net/en/2021/07/14/malspam_fail/</link>
        <pubDate>Wed, 14 Jul 2021 13:10:00 +0200</pubDate>
        
        <atom:modified>Wed, 14 Jul 2021 13:10:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/07/14/malspam_fail/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a malspam campaign, whose authors failed to include a correct password to decrypt the malicious attachment&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/27634&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a malspam campaign, whose authors failed to include a correct password to decrypt the malicious attachment&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Malspam</category>
            
          
            
              <category>Encryption</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Phishing asking recipients not to report abuse</title>
        <link>https://untrustednetwork.net/en/2021/06/22/phishing_abuse/</link>
        <pubDate>Tue, 22 Jun 2021 15:15:00 +0200</pubDate>
        
        <atom:modified>Tue, 22 Jun 2021 15:15:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/06/22/phishing_abuse/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a phishing message that ended with an unusual request&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/27556&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a phishing message that ended with an unusual request&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Hunting phishing websites with favicon hashes</title>
        <link>https://untrustednetwork.net/en/2021/04/19/favicon_hunting/</link>
        <pubDate>Mon, 19 Apr 2021 11:15:00 +0200</pubDate>
        
        <atom:modified>Mon, 19 Apr 2021 11:15:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/04/19/favicon_hunting/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at how HTTP favicon hashes may be used to identify IP addresses hosting phishing websites&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/27326&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at how HTTP favicon hashes may be used to identify IP addresses hosting phishing websites&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Shodan</category>
            
          
            
              <category>Hash</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - BazarLoader phishing lures: plan a Halloween party, get a bonus and be fired in the same afternoon</title>
        <link>https://untrustednetwork.net/en/2020/10/22/sans-isc-diary-bazarloader-phishing-lures-plan-a-halloween-party-get-a-bonus-and-be-fired-in-the-same-afternoon/</link>
        <pubDate>Thu, 22 Oct 2020 11:00:00 +0200</pubDate>
        
        <atom:modified>Thu, 22 Oct 2020 11:00:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/10/22/sans-isc-diary-bazarloader-phishing-lures-plan-a-halloween-party-get-a-bonus-and-be-fired-in-the-same-afternoon/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at phishing campaigns spreading BazarLoader malware and the lures which they use.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/BazarLoader+phishing+lures+plan+a+Halloween+party+get+a+bonus+and+be+fired+in+the+same+afternoon/26710/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at phishing campaigns spreading BazarLoader malware and the lures which they use.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>BazarLoader</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Phishing kits as far as the eye can see</title>
        <link>https://untrustednetwork.net/en/2020/10/09/sans-isc-diary-phishing-kits-as-far-as-the-eye-can-see/</link>
        <pubDate>Fri, 09 Oct 2020 07:40:00 +0200</pubDate>
        
        <atom:modified>Fri, 09 Oct 2020 07:40:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/10/09/sans-isc-diary-phishing-kits-as-far-as-the-eye-can-see/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at phishing kits, which are offered on the indexed part of the web.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Phishing+kits+as+far+as+the+eye+can+see/26660/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at phishing kits, which are offered on the indexed part of the web.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Phishing kit</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Slightly broken overlay phishing</title>
        <link>https://untrustednetwork.net/en/2020/09/21/sans-isc-diary-slightly-broken-overlay-phishing/</link>
        <pubDate>Mon, 21 Sep 2020 12:50:00 +0200</pubDate>
        
        <atom:modified>Mon, 21 Sep 2020 12:50:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/09/21/sans-isc-diary-slightly-broken-overlay-phishing/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at an interesting (and slightly broken) phishing campaign, which overlays legitimate pages with fake login prompts.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Slightly+broken+overlay+phishing/26586/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at an interesting (and slightly broken) phishing campaign, which overlays legitimate pages with fake login prompts.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS@MIC - Catch and Release: Phishing Techniques for the Good Guys</title>
        <link>https://untrustednetwork.net/en/2020/06/18/catch_and_release_video/</link>
        <pubDate>Thu, 18 Jun 2020 19:10:00 +0200</pubDate>
        
        <atom:modified>Thu, 18 Jun 2020 19:10:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/06/18/catch_and_release_video/</guid>
        <description>I did a SANS@MIC talk yesterday, in which I discussed interesting phishing techniques (mainly) from the point of view of red teamers. Since the recording was published today, if you didn&amp;rsquo;t get the chance to join us live, you may take a look at how it went on YouTube.
 </description>
        <content:encoded>&lt;p&gt;I did a SANS@MIC talk yesterday, in which I discussed interesting phishing techniques (mainly) from the point of view of red teamers. Since the recording was published today, if you didn&amp;rsquo;t get the chance to join us live, you may take a look at how it went on YouTube.&lt;/p&gt;
&lt;div style=&#34;width:560px; margin:0 auto;&#34;&gt;
    &lt;iframe width=&#34;560&#34; height=&#34;315&#34; src=&#34;https://www.youtube.com/embed/Fb2Z3bw-oJ8&#34; frameborder=&#34;0&#34; allow=&#34;accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture&#34; allowfullscreen&gt;&lt;/iframe&gt;
&lt;/div&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/icons/microphone.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>2020</category>
            
          
            
              <category>Talks</category>
            
          
        
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Broken phishing accidentally exploiting Outlook zero-day</title>
        <link>https://untrustednetwork.net/en/2020/06/18/sans-isc-diary-broken-phishing-accidentally-exploiting-outlook-zero-day/</link>
        <pubDate>Thu, 18 Jun 2020 11:35:00 +0200</pubDate>
        
        <atom:modified>Thu, 18 Jun 2020 11:35:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/06/18/sans-isc-diary-broken-phishing-accidentally-exploiting-outlook-zero-day/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at a phishing, which accidentally exploited a 0-day vulnerability in Outlook, which allows for creation or modification of links when an e-mail is forwarded by Outlook.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Broken+phishing+accidentally+exploiting+Outlook+zeroday/26254/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at a phishing, which accidentally exploited a 0-day vulnerability in Outlook, which allows for creation or modification of links when an e-mail is forwarded by Outlook.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>0-day</category>
            
          
            
              <category>Outlook</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Frankenstein&#39;s phishing using Google Cloud Storage</title>
        <link>https://untrustednetwork.net/en/2020/05/27/sans-isc-diary-frankensteins-phishing-using-google-cloud-storage/</link>
        <pubDate>Wed, 27 May 2020 10:40:00 +0200</pubDate>
        
        <atom:modified>Wed, 27 May 2020 10:40:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/05/27/sans-isc-diary-frankensteins-phishing-using-google-cloud-storage/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at a strange phishing campaign, which was, due to combination of quite sophisticated and extremely amateurish components, reminiscent of the creation of Shelley&amp;rsquo;s Dr. Frankenstein.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Frankensteins+phishing+using+Google+Cloud+Storage/26174/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at a strange phishing campaign, which was, due to combination of quite sophisticated and extremely amateurish components, reminiscent of the creation of Shelley&amp;rsquo;s Dr. Frankenstein.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>SPF</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Agent Tesla delivered by the same phishing campaign for over a year</title>
        <link>https://untrustednetwork.net/en/2020/04/28/sans-isc-diary-agent-tesla-delivered-by-the-same-phishing-campaign-for-over-a-year/</link>
        <pubDate>Tue, 28 Apr 2020 08:45:00 +0200</pubDate>
        
        <atom:modified>Tue, 28 Apr 2020 08:45:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/04/28/sans-isc-diary-agent-tesla-delivered-by-the-same-phishing-campaign-for-over-a-year/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at a phishing campaign that has been running almost unchanged for more than a year and seems to be distributing exclusively Agent Tesla.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Agent+Tesla+delivered+by+the+same+phishing+campaign+for+over+a+year/26062/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at a phishing campaign that has been running almost unchanged for more than a year and seems to be distributing exclusively Agent Tesla.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Malware</category>
            
          
            
              <category>Agent Tesla</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Look at the same phishing campaign 3 months apart</title>
        <link>https://untrustednetwork.net/en/2020/04/13/sans-isc-diary-look-at-the-same-phishing-campaign-3-months-apart/</link>
        <pubDate>Mon, 13 Apr 2020 11:35:00 +0200</pubDate>
        
        <atom:modified>Mon, 13 Apr 2020 11:35:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/04/13/sans-isc-diary-look-at-the-same-phishing-campaign-3-months-apart/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at two phishing e-mails from the same campaign sent out 3 months apart.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Look+at+the+same+phishing+campaign+3+months+apart/26018/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at two phishing e-mails from the same campaign sent out 3 months apart.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Current PayPal phishing campaign or &#39;give me all your personal information&#39;</title>
        <link>https://untrustednetwork.net/en/2020/02/10/sans-isc-diary-current-paypal-phishing-campaign-or-give-me-all-your-personal-information/</link>
        <pubDate>Mon, 10 Feb 2020 09:37:58 +0100</pubDate>
        
        <atom:modified>Mon, 10 Feb 2020 09:37:58 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/02/10/sans-isc-diary-current-paypal-phishing-campaign-or-give-me-all-your-personal-information/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one we take a look at a current phishing campaign which shows quite well the current &amp;ldquo;let&amp;rsquo;s get all the users&#39; data&amp;rdquo; mentality of the attackers.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Current+PayPal+phishing+campaign+or+give+me+all+your+personal+information/25786/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one we take a look at a current phishing campaign which shows quite well the current &amp;ldquo;let&amp;rsquo;s get all the users&#39; data&amp;rdquo; mentality of the attackers.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>PayPal</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Analysis of a triple-encrypted AZORult downloader</title>
        <link>https://untrustednetwork.net/en/2020/02/03/sans-isc-diary-analysis-of-a-triple-encrypted-azorult-downloader/</link>
        <pubDate>Mon, 03 Feb 2020 07:45:10 +0100</pubDate>
        
        <atom:modified>Mon, 03 Feb 2020 07:45:10 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/02/03/sans-isc-diary-analysis-of-a-triple-encrypted-azorult-downloader/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one we take a look at analysis of an interesting malicious document which turned out to be AZORult downloader. What made it stand out - among its other aspects - were 3 layers of home-grown encryption&amp;hellip;
EDIT 04/02/2020: Tom from Threat Post liked the diary and wrote an article based on it - you may find it here.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Analysis+of+a+tripleencrypted+AZORult+downloader/25768/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one we take a look at analysis of an interesting malicious document which turned out to be AZORult downloader. What made it stand out - among its other aspects - were 3 layers of home-grown encryption&amp;hellip;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;EDIT 04/02/2020: Tom from Threat Post liked the diary and wrote an article based on it - you may find it &lt;a href=&#34;https://threatpost.com/azorult-campaign-encryption-technique/152508/&#34;&gt;here&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Malware</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>AZORult</category>
            
          
            
              <category>Macro</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Picks of 2019 malware - the large, the small and the one full of null bytes</title>
        <link>https://untrustednetwork.net/en/2020/01/16/sans-isc-diary-picks-of-2019-malware-the-large-the-small-and-the-one-full-of-null-bytes/</link>
        <pubDate>Thu, 16 Jan 2020 07:52:08 +0100</pubDate>
        
        <atom:modified>Thu, 16 Jan 2020 07:52:08 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/01/16/sans-isc-diary-picks-of-2019-malware-the-large-the-small-and-the-one-full-of-null-bytes/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one we take a look at what last year brought us, when it comes to malware delivered by e-mail, specifically at the smallest and largest malicious files I found in my e-mail quarantine.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Picks+of+2019+malware+the+large+the+small+and+the+one+full+of+null+bytes/25718/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one we take a look at what last year brought us, when it comes to malware delivered by e-mail, specifically at the smallest and largest malicious files I found in my e-mail quarantine.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Malware</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Pony</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Phishing with a self-contained credential-stealing webpage</title>
        <link>https://untrustednetwork.net/en/2019/12/06/sans-isc-diary-phishing-with-a-self-contained-credential-stealing-webpage/</link>
        <pubDate>Fri, 06 Dec 2019 07:30:00 +0100</pubDate>
        
        <atom:modified>Fri, 06 Dec 2019 07:30:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2019/12/06/sans-isc-diary-phishing-with-a-self-contained-credential-stealing-webpage/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one we take a look at an interesting phishing message, which carried a complete phishing web page as its attachment.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Phishing+with+a+selfcontained+credentialsstealing+webpage/25580/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one we take a look at an interesting phishing message, which carried a complete phishing web page as its attachment.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2019</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - E-mail from Agent Tesla</title>
        <link>https://untrustednetwork.net/en/2019/12/05/sans-isc-diary-e-mail-from-agent-tesla/</link>
        <pubDate>Thu, 05 Dec 2019 07:30:00 +0100</pubDate>
        
        <atom:modified>Thu, 05 Dec 2019 07:30:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2019/12/05/sans-isc-diary-e-mail-from-agent-tesla/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one we take a look at a multi-stage downloader for Agent Tesla.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Email+from+Agent+Tesla/25576/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one we take a look at a multi-stage downloader for Agent Tesla.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Malware</category>
            
          
            
              <category>Malware Analysis</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2019</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Analysis of a strangely poetic malware</title>
        <link>https://untrustednetwork.net/en/2019/12/04/sans-isc-diary-analysis-of-a-strangely-poetic-malware/</link>
        <pubDate>Wed, 04 Dec 2019 08:14:33 +0100</pubDate>
        
        <atom:modified>Wed, 04 Dec 2019 08:14:33 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2019/12/04/sans-isc-diary-analysis-of-a-strangely-poetic-malware/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one we take a look at a macro-based dropper sent to the Internet Storm Center by one of our readers.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Analysis+of+a+strangely+poetic+malware/25572/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one we take a look at a macro-based dropper sent to the Internet Storm Center by one of our readers.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Malware</category>
            
          
            
              <category>Malware Analysis</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2019</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Lessons learned from playing a willing phish</title>
        <link>https://untrustednetwork.net/en/2019/11/26/sans-isc-diary-lessons-learned-from-playing-a-willing-phish/</link>
        <pubDate>Tue, 26 Nov 2019 12:08:19 +0100</pubDate>
        
        <atom:modified>Tue, 26 Nov 2019 12:08:19 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2019/11/26/sans-isc-diary-lessons-learned-from-playing-a-willing-phish/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one we take a look at baiting phishing attackers and at some of the lessons we may learn from it.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Lessons+learned+from+playing+a+willing+phish/25552/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one we take a look at baiting phishing attackers and at some of the lessons we may learn from it.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2019</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - EML attachments in O365 - a recipe for phishing</title>
        <link>https://untrustednetwork.net/en/2019/10/31/sans-isc-diary-eml-attachments-in-o365-a-recipe-for-phishing/</link>
        <pubDate>Thu, 31 Oct 2019 11:15:35 +0100</pubDate>
        
        <atom:modified>Thu, 31 Oct 2019 11:15:35 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2019/10/31/sans-isc-diary-eml-attachments-in-o365-a-recipe-for-phishing/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at the absence of filtering of EML attachments in O365 and what it can lead to.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/EML+attachments+in+O365+a+recipe+for+phishing/25474/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at the absence of filtering of EML attachments in O365 and what it can lead to.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>O365</category>
            
          
            
              <category>EML</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2019</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Phishing e-mail spoofing SPF-enabled domain</title>
        <link>https://untrustednetwork.net/en/2019/10/17/sans-isc-diary-phishing-e-mail-spoofing-spf-enabled-domain/</link>
        <pubDate>Thu, 17 Oct 2019 11:49:25 +0200</pubDate>
        
        <atom:modified>Thu, 17 Oct 2019 11:49:25 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2019/10/17/sans-isc-diary-phishing-e-mail-spoofing-spf-enabled-domain/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at SPF and when even SPF-enabled domains may be spoofed.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Phishing+email+spoofing+SPFenabled+domain/25426/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at SPF and when even SPF-enabled domains may be spoofed.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>SPF</category>
            
          
            
              <category>Malware</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2019</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      

    
  </channel>
</rss>