Obsidian catches phishing kits or Phishing-as-a-Service (PhaaS) websites by analyzing the fuzzy hashes of visited site content. An example given is EvilProxy/Tycoon, a phishing kit that steals credentials and session cookies in real time. Once it bypasses Cloudflare’s protection, a page impersonates the Microsoft login page. Fuzzy hashing helps detect the page after Javascript obfuscation is removed. The same technique can catch users visiting phishing websites by Advanced Persistent Threat (APT) groups.

New Phishing Attack Abusing Blob URLs to Bypass SEGs and Evade Analysis
Cybersecurity experts have uncovered a new phishing technique using blob URIs that bypasses Secure Email Gateways (SEGs). This method involves linking to legitimate sites, redirecting