Connected(@LucyIsOpal) 's Twitter Profile Photo

Chase EvilProxy like a bloodhound,
1. Measure authentication properties between themselves where there's a short difference in time with datetime_diff('minute', TimeGenerated, prev(TimeGenerated, 1))

2. Look for Entra ID screaming at you with queries across these data fields /1

account_circle
Virus Bulletin(@virusbtn) 's Twitter Profile Photo

Proofpoint researchers observed an increase in account takeovers among tenants that have MFA protection, as threat actors are increasingly employing Adversary-in-the-Middle (AitM) phishing kits (such as EvilProxy). proofpoint.com/us/blog/email-…

Proofpoint researchers observed an increase in account takeovers among tenants that have MFA protection, as threat actors are increasingly employing Adversary-in-the-Middle (AitM) phishing kits (such as EvilProxy). proofpoint.com/us/blog/email-…
account_circle
TRS Consulting IT Services(@trsconsulting) 's Twitter Profile Photo

New EvilProxy Phishing Attack Uses Indeed.com Redirector to Target US Executives techrepublic.com/?p=4173467 via @techrepublic

account_circle
Fate112(@tosscoinwitcher) 's Twitter Profile Photo

James @AnFam17 Gi7w0rm proxylife Igal Lytzki🇮🇱 So this looks like it might be some stuff based on behavior. This IP has had so many DGA's stood up over the last few days. all but a few are 0/88 on VT. All samples are 'F12' resistant.

virustotal.com/gui/ip-address…

@James_inthe_box @AnFam17 @Gi7w0rm @pr0xylife @0xToxin So this looks like it might be some #EvilProxy stuff based on behavior. This IP has had so many DGA's stood up over the last few days. all but a few are 0/88 on VT. All samples are 'F12' resistant.

virustotal.com/gui/ip-address…
account_circle
David Guest(@devslashdg) 's Twitter Profile Photo

Some badness to look for in the logs.

If you’ve had users going to rambollmx[.]com - especially since 22nd October - then they’ve probably given their credentials away.

You can check sign in logs for intrusion from 40[.]119[.]40[.]147

account_circle
ANY.RUN(@anyrun_app) 's Twitter Profile Photo

Detect by using Any.RUN! 👨‍💻

Our service detects various phishing-as-a-service platforms such as , , , and more.

These services are responsible for some of the highest volumes of phishing attacks, which are detected by our

Detect #phishing by using Any.RUN! 👨‍💻

Our service detects various phishing-as-a-service platforms such as #storm1575, #greatness, #evilproxy, and more. 

These services are responsible for some of the highest volumes of phishing attacks, which are detected by our
account_circle
Owen Allen(@owenallen) 's Twitter Profile Photo

Hundreds of executives are falling for Microsoft 365 phishing attacks, according to new research published by Proofpoint. Read in IT Business Canada about the hybrid campaign using to target thousands of 365 user accounts. bit.ly/44vLdBs

account_circle
Microsoft Threat Intelligence(@MsftSecIntel) 's Twitter Profile Photo

Some phishing kits, like EvilGinx, Modlishka, Muraena, & EvilProxy, use reverse proxy servers for AiTM attacks. In this case, every HTTP packet is proxied to and from the original website, making the URL the only visible difference between the phishing page & legitimate site.

Some phishing kits, like EvilGinx, Modlishka, Muraena, & EvilProxy, use reverse proxy servers for AiTM attacks. In this case, every HTTP packet is proxied to and from the original website, making the URL the only visible difference between the phishing page & legitimate site.
account_circle
Raluca Saceanu(@ralucasaceanu) 's Twitter Profile Photo

Massive EvilProxy Phishing Attack Campaign Bypasses 2FA, Targets Top-Level Executives techrepublic.com/?p=4148875 via @techrepublic

account_circle