New phishing campaigns have been targeting verified Twitter users amid Twitter CEO Elon Musk's announcement of the platform's plans to charge $8 per month for Twitter Blue and account verification, according to BleepingComputer.
Threat actors have been leveraging a false sense of urgency in the phishing emails that prompt verified users to enter their Twitter accounts to avoid being suspended. Such emails were from hacked website and blog servers which could have hosted vulnerable WordPress instances, noted BleepingComputer.
Targets clicking the link in the phishing email will be redirected to a webpage indicating an $8 monthly fee for verification that collects Twitter credentials.
Another phishing campaign using the same tactic has been found to be more convincing due to its use of an email that more closely resembles Twitter's branding.
The latest campaigns follow previous phishing scams aimed at verified users, as well as the targeting of blue badge accounts for cryptocurrency scams.
Attackers have been leveraging the new "file archive in the browser" phishing technique that enables the creation of realistic phishing pages masquerading as legitimate file archive software, with hosting on a .ZIP domain further establishing the legitimacy of the scheme, reports The Hacker News.
BleepingComputer reports that recent phishing attacks by the QBot malware operation, also known as Qakbot, have involved the exploitation of a DLL hijacking flaw in the Windows 10 WordPad executable "write.exe."
Microsoft credentials targeted new phishing attacks with RPMSG files New phishing attacks involving compromised Microsoft 365 accounts and encrypted restricted permission message, or RPMSG, files, are being leveraged by threat actors to facilitate the stealthy exfiltration of Microsoft credentials, according to BleepingComputer.