JCyberSec_ Profile Banner
Jake | JCyberSec_ Profile
Jake | JCyberSec_

@JCyberSec_

Followers
10K
Following
24K
Media
3K
Statuses
9K

Expert in Credential Phishing and Phishing Kit Research. Working in Cyber Security - Threat Intelligence #Phishing

UK
Joined August 2017
Don't wanna be here? Send us removal request.
@JCyberSec_
Jake | JCyberSec_
30 days
If you are not sure how to leverage this or have questions feel free to reach out to the @urlscanio team! 🔍
0
1
1
@JCyberSec_
Jake | JCyberSec_
30 days
This is a really powerful new feature for CTI teams⚠️ 🔎You can now monitor leak sites, exposure stores or other dark web portals for changes and updates 👁️Don't rely on your vendors to alert you - Be proactive and self-generate intel📄
@urlscanio
urlscan.io
30 days
A small feature addition: Customers on the urlscan Pro platform can now use the regular scanning API and our Incident observation feature to scan .onion URLs which are Tor Onion Services ("Hidden Services").
1
0
4
@JCyberSec_
Jake | JCyberSec_
2 months
🇬🇧+44 is a UK number. This is clearly targeting Florida in the US🇺🇸 ♻️We see it both ways, with UK SMS having US or other international numbers being used ⤵️Here is another example hitting the UK but from a US number (+1)🇺🇸 also using RCS 😉
0
0
1
@JCyberSec_
Jake | JCyberSec_
2 months
Shifting TTPs for SMS actors is sending using international numbers 🌎 🤔This makes local take down harder for numbers🚔 🔀Additionally using Over the Top (OTP) messages such as RCS and iMessage is the new normal now
1
1
3
@JCyberSec_
Jake | JCyberSec_
2 months
This is a great post👍 🔎I have hunted some IoCs by @welivesecurity 🎯3 new domains all linked: 🌐download.totpro[.]app https://t.co/cy0TGdaG6K 🌐totok-pro[.]io https://t.co/nXyCF6ZStj 🌐totok[.]ai
@blackorbird
blackorbird
2 months
Dedicated website, mimicking Galaxy Store, for distributing malicious ToTok app #spyware https://t.co/PeajxjYbbP
0
0
2
@urlscanio
urlscan.io
2 months
🚨New Premium Intel Report on urlscan Pro: X Phishing - The “Acid” Campaign A phishing kit impersonating 𝕏 is targeting high-value accounts with API-driven infrastructure, Cloudflare masking & AWS redirects. Start your trial of urlscan Pro today: https://t.co/xCeiZZZAWM
2
3
7
@urlscanio
urlscan.io
3 months
Come say "hi" to us at @CYBERWARCON - urlscan is proud to be sponsoring the conference for the third year running. This year it's going down on November 19 in Crystal City, VA. Want to schedule a meeting with our CEO - reach out via DM or email info@urlscan.io.
0
5
12
@urlscanio
urlscan.io
3 months
Phishing campaigns are evolving, moving toward centralized, API-driven infrastructures. Our latest Intel Report in the urlscan Pro portal dives deep into the most prominent API phishing campaigns, focusing on discovery, attribution, and threat collection. https://t.co/UhEWLLYpFj
0
7
21
@JCyberSec_
Jake | JCyberSec_
3 months
Vehicle themed SMS campaigns roll on 🚗📱 🔎This kit has only been seen once before 2 months ago 🌐/ky.drivera.cc/pay 🎯IP: 104.21.96.1 ☁️Server: cloudflare 🖥️Looking into domain patterns I have found another 6 linked domains. All domains have been scanned through @urlscanio🥷
0
1
6
@urlscanio
urlscan.io
3 months
Thanks to the awesome work by our team we can finally announce our official urlscan cli tool: https://t.co/CpiL9jUdDv - Submit scans, run searches, find domains, get creative. Feel free to share your use-cases with us on X! Download on Github or homebrew.
6
103
351
@JCyberSec_
Jake | JCyberSec_
3 months
⚠️Actors are sending requests using the contact form pretending to be @Wix support of a security vulnerability on the site. This is a fake message and can be ignored🚫 📧wixzenlabs@gmail.com ☎️+15067170317
0
0
1
@urlscanio
urlscan.io
3 months
Today we're launching the first entry in our new Intel Reports module on the urlscan Pro platform. The report on the "RefBroker" phishing operation documents a cluster of activity targeting customers in the hospitality sector: https://t.co/UhEWLLXRPL
0
16
80
@JCyberSec_
Jake | JCyberSec_
4 months
📚If you want to understand more about this check out @mnemonic_sec blog https://t.co/ES0L770aMO
Tweet card summary image
mnemonic.io
0
0
3
@JCyberSec_
Jake | JCyberSec_
4 months
Here is a search to find the scans: Pro🔎: https://t.co/yZGVJEKvI0 Free🖥️: https://t.co/hlnuwJQrwy
1
0
3
@JCyberSec_
Jake | JCyberSec_
4 months
I took a look at this SMS today 🔎 🧵One thing led to another and after some pivoting I ended up with 697 linked malicious domains All targeting UK DWP and all linked to the same threat actor group 🥷 📈Nearly all live have been pushed to @urlscanio for others to investigate
2
2
14
@JCyberSec_
Jake | JCyberSec_
5 months
HMRC show the scale of these campaigns - Over 4,600 websites 📈 🔨And yet they still get stood up, hundreds per day! https://t.co/yYOiKFP3vs
@HMRCgovuk
HM Revenue & Customs
5 months
We took down more than 4,600 Winter Fuel Payment scam websites in June, protecting taxpayers across the UK. ⛔ If you’re unsure if the contact you’ve received from us is genuine, use our online guidance to learn how to recognise and report scams. ⬇️ https://t.co/0sqEF4jNqA
0
0
1
@JCyberSec_
Jake | JCyberSec_
5 months
A new cluster sitting on IP: 47.251.127.54
0
0
1
@JCyberSec_
Jake | JCyberSec_
5 months
Always remember hunt, pivot, and analyse. Using the right tools allows you to expand your visibility into threats to assess the risk posed and understand the actors behind them.
0
0
0
@JCyberSec_
Jake | JCyberSec_
5 months
Notably 2 domains stand out: fetcetcgovstw[.]top phlmpost-gov[.]com These appear to be targeting government bodies within the Philippines. Ones to watch.
1
0
0
@JCyberSec_
Jake | JCyberSec_
5 months
The second domain: golbe-phlu3[.]com is again using Cloudflare🌐 This time rather than pattern matching we can look at nameserver overlaps. Looking at the Cloudflare NSs we find more domains all linked... nameserver:( https://t.co/2qiwRqO8QG AND https://t.co/7TwH8RWR1D)
1
0
0