A sophisticated phishing operation, named “Morphing Meerkat,” utilizes DNS MX records to create fake login pages for over 100 brands, making it hard for users to identify scams. It begins with spam emails leading to compromised sites. The phishing kit identifies victims’ email providers and exfiltrates stolen credentials while employing advanced evasion techniques to avoid detection.

Outlaw Group Uses SSH Brute-Force to Deploy Cryptojacking Malware on Linux Servers
Cybersecurity researchers have revealed details about Outlaw, an “auto-propagating” cryptocurrency mining botnet that targets SSH servers with weak credentials. The Romanian-origin malware performs SSH brute-force