• XSS.stack #1 – первый литературный журнал от юзеров форума

Banking malware

No. Like changing account no. and recipient in the background while the users sees the recipient and the numbers he entered previesly on the screen. The malware deducts the sum the user entered from the available funds and copies the receivers info and account no. and makes a frame on top of the screen. But the real recipient and the real sum are underneath and they are authorized without user knowing.
 
[QUOTE = "cashearner, post: 228578, member: 183454"]
I was testing it a month ago and it worked on Firefox, but Chrome was giving a warning that "Connection is not private"
[/ QUOTE]
Bro, because you didn't have any SSL certificate installed. Install a SSL certificate and try after that.
 
[QUOTE = "cashearner, post: 228578, member: 183454"]
I was testing it a month ago and it worked on Firefox, but Chrome was giving a warning that "Connection is not private"
[/ QUOTE]
Bro, because you didn't have any SSL certificate installed. Install a SSL certificate and try after that.
The certificate was succesufully installed. I got the link, but chrome gave some kind of warning. Maybe it was not about connection. There was no warning for the first day or two, but after it got detected...
 
Пожалуйста, обратите внимание, что пользователь заблокирован
[QUOTE = "cashearner, post: 229173, member: 183454"]
The certificate was succesufully installed. I got the link, but chrome gave some kind of warning. Maybe it was not about connection. There was no warning for the first day or two, but after it got detected ...
[/ QUOTE]
Now it's detected, you can search that companies started to block modlishka & evilginx2 domains
 
[QUOTE = "MrMillionaire, post: 229206, member: 197283"]
[QUOTE = "cashearner, post: 229173, member: 183454"]
The certificate was succesufully installed. I got the link, but chrome gave some kind of warning. Maybe it was not about connection. There was no warning for the first day or two, but after it got detected ...
[/ QUOTE]
Now it's detected, you can search that companies started to block modlishka & evilginx2 domains
[/ QUOTE]
And what can we do? What are the options?
 
You can simply set-up your own SMTP server and use an external agent to hook/deliver. Evilginx was nice because of the simple phishlets you could generate on the fly.. however stuff like that will eventually get blocked because its open source.
You can find numerous other proxies + servers to use. However if you're going after companies, it would be use to servers located in that safe area of rest.
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх