Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • Phishers Send Out Fake cPanel Security Vulnerabilities Advisory
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Phishers Send Out Fake cPanel Security Vulnerabilities Advisory

5 years ago David Bisson
Phishers Send Out Fake cPanel Security Vulnerabilities Advisory

Fraudsters launched a new phishing attack in which they sent out a fake cPanel advisory warning recipients about fabricated security vulnerabilities.

On August 5, cPanel and WebHost Manager (WHM) users began reporting of having received a fake advisory that appeared to have originated from the company.

The fake advisory informed recipients that cPanel had released new builds to address a series of security vulnerabilities affecting cPanel and WHM installations 88.0.3+, 86.0.21+ and 78.0.49+.

To add a sense of legitimacy, the attackers incorporated cPanel’s logo into their email. But they didn’t stop there. As Bleeping Computer noted in its coverage of the attack:

In addition to a well-worded email with little or no grammar and spelling issues, the threat actors used language commonly found in security advisories.

The attackers registered the domain ‘cpanel7831.com’ to make the scam appear as an authentic advisory from cPanel and are using Amazon Simple Email Service (SES) to send out the emails.

Screenshot of the fake cPanel advisory (Source: Bleeping Computer)

In the event that a user clicked on the email’s “Update your cPanel & WHM installations” button, they found themselves redirected to a website that prompted them to authenticate themselves using their account credentials.

That phishing landing page was down at the time of Bleeping Computer’s analysis and instead redirected to a Google keyword search for “cpanel.”

If anyone fell for the phishing attack described above, they should log into their accounts and change their passwords as soon as possible.

In the meantime, organizations should use ongoing security awareness training to strengthen their users’ defenses against similar types of phishing attacks. They can do so by educating their users about some of the most common types of campaigns that are in circulation today and following that training up with ongoing phishing simulations. This resource serves as a good place to start.

The post ” Phishers Send Out Fake cPanel Security Vulnerabilities Advisory” appeared first on TripWire

Source:TripWire – David Bisson

Tags: Google, Phishing, TripWire

Continue Reading

Previous Researcher Demonstrates Several Zoom Vulnerabilities at DEF CON 28
Next TeamViewer Flaw Could Let Hackers Steal System Password Remotely

More Stories

  • Cyber Attacks
  • Data Breach

Microsoft Develops Scanner to Detect Backdoors in Open-Weight Large Language Models

3 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

DEAD#VAX Malware Campaign Deploys AsyncRAT via IPFS-Hosted VHD Phishing Files

3 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns

7 hours ago [email protected] (The Hacker News)
  • Data Breach

Orchid Security Introduces Continuous Identity Observability for Enterprise Applications

9 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

The First 90 Seconds: How Early Decisions Shape Incident Response Investigations

11 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers

13 hours ago [email protected] (The Hacker News)

Recent Posts

  • Microsoft Develops Scanner to Detect Backdoors in Open-Weight Large Language Models
  • DEAD#VAX Malware Campaign Deploys AsyncRAT via IPFS-Hosted VHD Phishing Files
  • China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns
  • Orchid Security Introduces Continuous Identity Observability for Enterprise Applications
  • The First 90 Seconds: How Early Decisions Shape Incident Response Investigations

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT