v4ensics Profile Banner
v4ensics Profile
v4ensics

@v4ensics

Followers
232
Following
37
Media
951
Statuses
1K

Vital Digital Forensics: Cyber-security services, specializing in Digital Forensics / Incident Response (DFIR), malware analysis and expert witness testimony

Athens
Joined October 2021
Don't wanna be here? Send us removal request.
@v4ensics
v4ensics
3 years
2022 #phishing #insights report published today by @v4ensics. Phishing campaigns, Greek wise, targeted the #HellenicPostService (ELTA), #NationalBankGr and #AlphaBank, while global wise, postal and #Meta targeting scams were on the rise. Read the report on
Tweet card summary image
v4ensics.gr
In 2022, V4ensics team analyzed more than 400 phishing sites, in most cases along with the associated e-mails, which either derived from phishing campaigns...
2
3
10
@v4ensics
v4ensics
3 months
Campaign targeting @Meta by phishers posing as recruiters and trying to lure victims into handing their #Facebook credentials is still ongoing. Data handled by https[:]//calendars-calendly.com/handler.php
0
0
0
@v4ensics
v4ensics
4 months
Both phishing sites seem to be subdomains of legitimate commercial sites (theoutwrld[.]com and flybus-travel[.]com) and , irrelevant obviously to the supposed recruiters brands (#Asos and #Airbus). Based on OSINT (kudos @urlscanio ) campaign is active the least 16 days
0
0
0
@v4ensics
v4ensics
4 months
Data posted to a #PHP file, while jsfiddle[.].net, ipapi[.]co/ip/, api[.]ipify[.]org/?format=json and ipapi[.]co/json are also utilized by the sites. Site uses a banned IP txt file, which presumably contains "automatically" blocked by the phishers IP addresses
1
0
0
@v4ensics
v4ensics
4 months
New #phishing campaign targeting @Meta spotted in the wild. Phishers posing as recruiters try to lure victims into handing their #Facebook credentials. 2 relevant phishing sites (asos-calendly[.]theoutwrld[.]com airbus-careers[.]flybus-travel[.]com) were seen today by @v4ensics
1
0
0
@v4ensics
v4ensics
4 months
New #IPaddress (193.46.217.13) hosting malicious sites. IP uncovered through e-mail campaigns mimicking @bookingcom and hosts multiple #FakeCaptcha sites
1
0
3
@FalconFeedsio
FalconFeeds.io
6 months
XSS Forum seized @Europol ❤️
1
6
21
@v4ensics
v4ensics
6 months
New #phishing campaign targeting #eltacourier (elta[.]courier-ls[.]sale/gr) just spotted in the wild
0
1
1
@v4ensics
v4ensics
7 months
4 Greek banks available for the alleged #taxrefund (@NationalBankGR , #AlphaBank, #Eurobank and #PiraeusBank
0
0
0
@v4ensics
v4ensics
7 months
As #Greekcitizens submit their tax statements #phishers try to trick them that #taxrefund is communing. Relevant phishing site is https://syndesiapp[.]web[.]app/main
1
0
1
@CISACyber
CISA Cyber
7 months
🚨Ransomware actors exploited an unpatched vulnerability (CVE-2024-57727) in SimpleHelp RMM to compromise a utility billing software provider—part of a pattern of actors targeting downstream customers. See our advisory for mitigations👉 https://t.co/Yli2jWTtOw
8
47
125
@v4ensics
v4ensics
8 months
New #phishing campaign targeting #Elta in the wild. Phishers use mediaoffice[.]com[.]uy/elt to direct victims to csclear[.]co[.]za/wwwGR-hellenicPost/
0
1
4
@v4ensics
v4ensics
8 months
Another @Meta phisher abuses @Meta www[.]facebook[.]com/61576714928950/posts/122102540912890497 to direct victims to recovercaseidhelp3232[.]d1tzhlqwrrp8x9[.]amplifyapp[.]com/. Phished data get processed via #Telegram
0
0
0
@v4ensics
v4ensics
8 months
The #phishers played a @Meta #communityguidelinesviolation scheme. @v4ensics #OSINT investigation revealed the phishers phishing kit to be associated with the least 122 sites and be actively used the last 5 months, with the last site scanned on @URLScan 3 hours ago
0
0
0
@v4ensics
v4ensics
8 months
Another #Meta phisher was spotted today that used a kit, which processed victims data using @awscloud (https[:]//yal32bnurk4yna4k73okvggdau0cjzgc[.]lambda-url[.]us-west-2[.]on[.]aws/).
1
0
0
@v4ensics
v4ensics
8 months
With #phishers playing again the familiar to @v4ensics @Meta #policyviolation scheme accompanied with the "short"/24h #accountterminationnotice phishers sent the e-mails that triggered the investigation from @gmail accounts and targeted #German speaking users
0
0
0
@v4ensics
v4ensics
8 months
The #phishers targeting @Meta came back today with another @telegram version of their phishing kit, which based on @v4ensics rapid investigation is connected with the least 11 sites and is actively used for the last 6 days (kudos @urlscan). All sites are hosted by @vercel
1
0
0
@v4ensics
v4ensics
8 months
New #phishing campaign targeting @Piraeus_Bank active since yesterday. Phishers use makaanshop[.]com/haikku to direct intended victims to online[.]myirdrefund[.]nz[.]ilhii[.]ip-ddns[.]com/PiraeusGR/
0
1
1
@v4ensics
v4ensics
8 months
the #fakecaptcha page instructs, as seen before, the intended victim to execute #powershell code
0
0
0
@v4ensics
v4ensics
8 months
As #infostealing #campaigns targeting #hospitality evolve malicious actors the last few days use @Github sites to direct victims to #fakecaptcha pages and get them infect. At the moment commentsgst[.]github[.]io/698434 is used to direct to stayinfovstr[.]com
1
0
0
@v4ensics
v4ensics
8 months
It seems that #Lumma #infostealer infra has been brought to a halt. Kudos @Microsoft and @EC3Europol for making this happen ( https://t.co/D1lqMwusTO, https://t.co/3rLRkrQKYQ)
@g0njxa
Who said what?
8 months
Lumma customers claim to have received this message on Telegram, apparently on Lumma customers group
0
0
1