The NIDS View is meant to give listeners inside access to the thoughts and ideas of the member-practitioners of NIDS. Each episode focusses on a current topic and have a cordial, exciting and sometimes funny discussion. Each episode is a stand-alone …
In a perfect world, you’d be able to take a hiatus from work while you attend college so you can focus on your studies full time. In reality, this simply isn’t feasible for many adult learners. In fact, according to Fortune, a whopping 43% of today’s c…
With any conflict over Taiwan certain to depend heavily on the US Navy, it is time for the Navy to reassess its nuclear capabilities so that it can not only meet the deterrence requirements of the twenty-first century but employ the right nuclear weapons in a future conflict. Currently, the Navy’s contribution to nuclear deterrence […]
By William Woodruff For the past eight months, Trail of Bits has worked with the Python Cryptographic Authority to build cryptography-x509-verification, a brand-new, pure-Rust implementation of the X.509 path validation algorithm that TLS and other encryption and authentication protocols are built on. Our implementation is fast, standards-conforming, and memory-safe, giving the Python ecosystem a modern […]
Whether you are moving to a new neighborhood, considering opening a business in your current state or a different one, or considering opening a business in a specific area, it’s essential to research crime data. Crime is always a concern, and understanding the crime of your intended neighborhood can make or break your final decision. […]
Blindly trusting your partners and suppliers on their security posture is not sustainable – it’s time to take control through effective supplier risk management
Criminals can now deploy phishing sites on any type of web server, even when commonly used server-side technologies such as PHP are not supported.
Phishing kits are predominantly implemented in PHP, as this provides the server-side functionality required to store and transmit stolen credentials without publicly revealing where they are being sent.
PHP is a widely used platform and is often supported on low-cost or compromised hosting platforms. Consequently, very few phishing kits are implemented in any other server-side language. For example, only a very small number of phishing kits have even been written in ASP.NET to run on Microsoft web servers.
An example of a typical phishing kit. It contains server-side PHP scripts, plus other resources such as fonts, stylesheets, and client-side JavaScript files.
We also see relatively small numbers of kits that do not contain any server-side scripts but do still rely on a PHP script to ultimately process their stolen data. These kits use static HTML pages to impersonate the targeted organisation, with web forms that submit stolen credentials directly from the victim’s browser to a PHP script hosted on a central remote “dropsite”. The PHP script then logs or forwards the stolen credentials to the criminal, typically via email, Telegram or Discord.
However, some recent phishing kits have gone one step further and eliminated the need for PHP scripts anywhere along the chain, thus eliminating a single point of failure that is inherent when hosting your own dropsite.
An example of a PHP-less phishing kit. It contains only images and static HTML pages which submit stolen credentials directly from the victim’s browser to a Telegram chat.
These new kits expand the range of hosting options open to the phisher, as they can be deployed on any static content hosting platform, regardless of what operating system it’s …
Kaspersky experts review their privacy predictions for 2023 and last year’s trends, and try to predict what privacy concerns and solutions are to come in 2024.