Possible Phishing
on: hxxps[:]//outlookstudentsportal[.]weebly[.]com/
Analysis at: https://urldna.io/scan/68052d013b7750000f8d46e3
#cybersecurity #phishing #infosec #urldna #scam #infosec
Possible Phishing
on: hxxps[:]//outlookstudentsportal[.]weebly[.]com/
Analysis at: https://urldna.io/scan/68052d013b7750000f8d46e3
#cybersecurity #phishing #infosec #urldna #scam #infosec
Possible Phishing
on: hxxps[:]//reliable-tomato-p36t1t[.]mystrikingly[.]com
Analysis at: https://urldna.io/scan/680525853b7750000adb7b1b
#cybersecurity #phishing #infosec #urldna #scam #infosec
#Phishing tests as a security awareness measure...
Possible Phishing
on: hxxps[:]//vxasoilixullingqsestqrqe[.]s3[.]us-west-004[.]backblazeb2[.]com/bell-webmail[.]html
Analysis at: https://urldna.io/scan/68067dab3b7750000a2f9508
#cybersecurity #phishing #infosec #urldna #scam #infosec
Native Language Phishing Spreads ResolverRAT to Healthcare https://hackread.com/native-language-phishing-resolverrat-healthcare/ #Cybersecurity #CyberAttacks #PhishingScam #CyberAttack #ResolverRAT #Healthcare #Phishing #Malware #Fraud #Scam
Possible Phishing
on: hxxps[:]//instagram-clone-deep512[.]vercel[.]app/
Analysis at: https://urldna.io/scan/68052dcd3b7750000adb7bbd
#cybersecurity #phishing #infosec #urldna #scam #infosec
2025-04-21 (Monday): #Phishing email with both an HTML attachment and a link to a phishing page.
Both methods send login credentials to Telegram.
Phishing page URL: hxxps[:]//iipg[.]it/mail2/login-Inbox.html
Possible Phishing
on: hxxps[:]//netzerolinkwebcommunicationservice[.]weebly[.]com/
Analysis at: https://urldna.io/scan/68052d2b3b7750000d57c623
#cybersecurity #phishing #infosec #urldna #scam #infosec
Phishers have found a clever way to spoof Google — and their emails pass all security checks.
A new DKIM replay phishing attack abuses Google’s own OAuth infrastructure to send fake messages that look 100% legitimate, including passing DKIM authentication.
What happened:
- A phishing email was sent from “no-reply@google.com”
- It appeared in the user’s inbox alongside real Google security alerts
- The message linked to a fake support portal hosted on sites[dot]google[dot]com — a Google-owned domain
- The attacker used Google OAuth to trigger a real security alert to their inbox, then forwarded it to victims
Why this matters:
- DKIM only verifies the headers, not the envelope — allowing this spoof to work
- The phishing site was nearly indistinguishable from Google’s actual login portal
- Because the message was signed by Google and hosted on a Google domain, it bypassed most users’ suspicions
- Similar tricks have been used with PayPal and other platforms, raising broader concerns
Google has since acknowledged the issue and is working on a fix. But this attack is a reminder:
Even the most secure-looking emails can be fraudulent.
Even Google-signed emails can be weaponized.
At @Efani, we advocate for layered defense — because no one layer is ever enough.
Possible Phishing
on: hxxps[:]//sharedocsfilesdocument[.]weebly[.]com
Analysis at: https://urldna.io/scan/6805331a3b7750000d57c670
#cybersecurity #phishing #infosec #urldna #scam #infosec
Possible Phishing
on: hxxps[:]//auth-logoon-sso-ttror[.]webflow[.]io/
Analysis at: https://urldna.io/scan/6805290e3b7750000b085a30
#cybersecurity #phishing #infosec #urldna #scam #infosec
Possible Phishing
on: hxxps[:]//cncintels[.]dev
Analysis at: https://urldna.io/scan/680527163b7750000ed5cea2
#cybersecurity #phishing #infosec #urldna #scam #infosec
Possible Phishing
on: hxxps[:]//kucoinlluogin[.]webflow[.]io
Analysis at: https://urldna.io/scan/680531d23b7750000b085a3c
#cybersecurity #phishing #infosec #urldna #scam #infosec
Possible Phishing
on: hxxps[:]//kucoinsigjlogin[.]webflow[.]io
Analysis at: https://urldna.io/scan/680531db3b7750000adb7c1f
#cybersecurity #phishing #infosec #urldna #scam #infosec
Possible Phishing
on: hxxps[:]//currently85437384[.]weebly[.]com
Analysis at: https://urldna.io/scan/680531523b7750000d57c65d
#cybersecurity #phishing #infosec #urldna #scam #infosec
Possible Phishing
on: hxxp[:]//tether-walletapp[.]org/
Analysis at: https://urldna.io/scan/68052fd83b7750000d57c651
#cybersecurity #phishing #infosec #urldna #scam #infosec
Text message received via email-to-text gateway directing me to reply via WhatsApp. Nothing suspicious there at all
From:
troy.williams9864[@]deliverydaily[.]org
WhatsApp number referenced:
+1971899[4575]
Scammers are targeting healthcare and pharma firms with phishing emails in their native languages, leading to infections by a new, evasive malware called #ResolverRAT.
Read: https://hackread.com/native-language-phishing-resolverrat-healthcare/
Possible Phishing
on: hxxps[:]//1telstrawebmail[.]weebly[.]com
Analysis at: https://urldna.io/scan/680501723b7750000adb7ab4
#cybersecurity #phishing #infosec #urldna #scam #infosec
Possible Phishing
on: hxxps[:]//bell-email-100958[.]weeblysite[.]com/
Analysis at: https://urldna.io/scan/68052ad53b7750000f8d46c4
#cybersecurity #phishing #infosec #urldna #scam #infosec