toot.wales is one of the many independent Mastodon servers you can use to participate in the fediverse.
We are the Open Social network for Wales and the Welsh, at home and abroad! Y rhwydwaith cymdeithasol annibynnol i Gymru, wedi'i bweru gan Mastodon!

Administered by:

Server stats:

624
active users

#phishing

35 posts27 participants0 posts today

Via #LLRX @psuPete Recommends Weekly highlights on #cybersecurity issues, 9/8/25 - 5 highlights from this week: States Have More #Data About You Than the Feds Do. #Trump Wants to See It; #Instagram Map lets your friends, possibly exes, track your every move; #Samsung phones can detect AI voice #phishing attacks w One UI 8; #Uber Gets Report of #Sexual #Misconduct Every 8 Min; #HomeDepot & #Lowes Share Data From Hundreds of #AI #Cameras w #Cops. #privacy #cybercrime llrx.com/2025/08/pete-recommen

GenAI Used to Impersonate Brazil's Government Websites

Threat actors are leveraging generative AI tools like DeepSite AI and BlackBox AI to create phishing templates that closely mimic official Brazilian government websites, such as the State Department of Traffic and Ministry of Education. These malicious replicas are boosted in search results using SEO poisoning techniques. The phishing pages collect sensitive personal data, including CPF numbers and addresses, validating the information through APIs to build credibility. The ultimate goal is to trick victims into making payments via Pix, Brazil's instant payment system. Technical analysis reveals AI-generated source code signatures, including TailwindCSS styling, explanatory comments, and non-functional elements. The campaign demonstrates the evolving sophistication of phishing attacks empowered by generative AI tools.

Pulse ID: 6896279970e62c2bef3c1a32
Pulse Link: otx.alienvault.com/pulse/68962
Pulse Author: AlienVault
Created: 2025-08-08 16:36:41

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

Reading comprehension assistance needed, please. I don't understand this paragraph below:

"On June 10, 2025, Precision Endodontics of Raleigh discovered that its email account had been accessed by an unknown entity and that phishing emails were sent out to a small part of its prior contact list. In addition, its contact list of names and email addresses were compromised by the unknown entity. No evidence exits (sic) to suggest that there has been any attempt to misuse any of the information."

Isn't the last sentence contradicted by the prior statement that phishing emails were sent out? Isn't that an attempt to misuse any of the information?

My first phishing text message that looked convincing, targeting my pension account, "verify your address." Of course I didn't click on the link, oh hell no! I traced the number to spammer fraud web pages. When I get home, I'll see who their hosting provider is, etc.

That link could have wiped out my retirement. With the fraud safety government offices closed, this is going to be one of many attempts to remove our last strings of survival...

I got a very weird mail…

According to headers (and DKIM!) it came from Google, specifically "no-reply@accounts.google.com",
but not to my gmail address, but my private one (that is the backup address for the google account).

The text is (in German) that I've not logged in to my account in 8 months and accounts get deleted after 2 years of inactivity.

All links (in the HTML even!) go to accounts.google.com

The only outliner is an image loaded from lh3.googleusercontent.com

WTF?! #phishing