cognitive cybersecurity intelligence

News and Analysis

Search

Hackers Leveraging DNS MX Records To Dynamically Create Fake Logins Mimic as 100+ Brands

A sophisticated phishing operation, named “Morphing Meerkat,” utilizes DNS MX records to create fake login pages for over 100 brands, making it hard for users to identify scams. It begins with spam emails leading to compromised sites. The phishing kit identifies victims’ email providers and exfiltrates stolen credentials while employing advanced evasion techniques to avoid detection.

Source: cybersecuritynews.com –

Subscribe to newsletter

Subscribe to HEAL Security Dispatch for the latest healthcare cybersecurity news and analysis.

More Posts

What are business logic vulnerabilities?

Business logic vulnerabilities in software allow attackers to exploit flaws in design, enabling them to circumvent security measures and manipulate pricing, authentication, and other key