Phishing

Posts tagged “Phishing”

Nile Phish: Large-Scale Phishing Campaign Targeting Egyptian Civil Society

This report discusses the targeting of Egyptian NGOs by Nile Phish, a large-scale phishing campaign. Almost all of the targets we identified are also implicated in Case 173, a sprawling legal case brought by the Egyptian government against NGOs, which has been referred to as an “unprecedented crackdown” on Egypt’s civil society. Nile Phish operators demonstrate an intimate knowledge of Egyptian NGOs, and are able to roll out phishing attacks within hours of government actions, such as arrests.

Packrat: Seven Years of a South American Threat Actor

This report describes an extensive malware, phishing, and disinformation campaign active in several Latin American countries, including Ecuador, Argentina, Venezuela, and Brazil. The nature and geographic spread of the targets seems to point to a sponsor, or sponsors, with regional, political interests. The attackers, whom we have named Packrat, have shown a keen and systematic interest in the political opposition and the independent press in so-called ALBA countries (Bolivarian Alternative for the Americas), and their recently allied regimes.

Chinese hackers steal Gmail passwords: Google

Hackers in China reportedly launched clandestine attacks against users of Google’s Gmail service intending to steal their passwords and monitor their emails.

The company reported in a blog post the targets of these attacks (among others) were senior government officials in the United States, Chinese activists, officials in several Asian countries, military officials and journalists, the New York Times reported.

Rafal Rohozinski, a network security specialist at the SecDev Group in Ottawa, told the Times it’s impossible to lay blame on the Chinese government for the intrusion with any certainty. Because the internet is borderless by nature, it’s easy for intruders to mask their identities by connecting through a series of proxy servers.

For the full original article, see here