“This is out of scope” said no hacker ever. Whether it’s tricks, techniques or technologies, hackers will do anything to evade detection and make sure their attack is successful.”
Phishing attacks have transformed significantly over the years. 15-20 years ago, simple phishing sites were sufficient for capturing the crown jewels of the time - credit card details. Today, attacks and defense methods have become much more sophisticated.”
This is also the time where the 'cat-and-mouse' attack-defense game began. A major defense technique against credit card phishing sites involved flooding them with large volumes of numbers... but threat actors adapted by validating data... testing if the card was active.”
As phishing grew more advanced, attackers added anti-research techniques to prevent security analysts from studying and shutting down their operations. Common strategies included IP blocking after one-time access to create a false pretense that the phishing site was shut down.”
Collection
[
|
...
]