By circumventing traditional software detection of phishing attempts by creating a legitimate landing page as its first destination, these bad actors were able to then forward you the user to the page where you’d be prompted to provide your Facebook credentials. Links sent through Facebook Messenger were designed to look like legitimate links, but once they've fooled the automated system, that's when the phishing started. These links would redirect to a landing page that prompts to collect Facebook credentials of the user, then utilizes those credentials to automate the spread of the attack by sending similar links to the user's friends list.
This phishing scam grew from 2.7 million users visiting the phishing campaign sites in 2021 to a 315% increase to 8.5 million visitors in 2022, a research by PIXM has found. These bad actors were found to be located in Colombia through the research done by PIXM Security, which lead to their findings being sent to Colombian Police, and INTERPOL.
Interested in learning more about how PIXM found out who was behind this attack? Visit their post here: https://pixmsecurity.com/blog/blog/phishing-tactics-how-a-threat-actor-stole-1m-credentials-in-4-months/
A zero-day vulnerability has been patched by Google, and should be reaching you shortly.
An announcement that was made a few months ago joining iFixit and Google together to sell OEM parts on iFixit's online store is finally live.
Working from home has taken the world by storm, and not exactly by choice. Here are a few tips and items that can help improve your work from home experience, as we know that not everyone has the system completely nailed down.