Recent Posts

Recent Blog Posts

The PhishLabs Blog

Stolen Fingerprints, Cloud Security Tools, Target Breach Revealed, and more | TWIC - September 25, 2015

Posted by Lindsey Havens on Sep 25, '15

Each week, the PhishLabs team posts The Week in Cybercrime (TWIC) to recap noteworthy cybercrime articles and reports (open source).

Read More

Topics: Phishing, PhishLabs, Backdoors, Hacker Tools, The Week in Cybercrime, Data Breach, Hacked, Spear Phishing, Breach

Malware Free Hackers, Bluetooth Skimming, Charity Website Targeting, and more | TWIC - September 18, 2015

Posted by Lindsey Havens on Sep 18, '15

Each week, the PhishLabs team posts The Week in Cybercrime (TWIC) to recap noteworthy cybercrime articles and reports (open source).

Read More

Topics: Phishing, PhishLabs, Backdoors, Strategy, Hacker Tools, The Week in Cybercrime, ATO, Data Breach, Hacked

Updated: AntiVirus backdoor tests

Posted by John LaCour on Dec 13, '08

In a previous blog posting I talked about how phishers typically use backdoor programs called PHP shells to access web servers and install their phish kits. I had tested several leading antivirus programs against a number of PHP shells that had been found in the wild to see how well they were detected. The results were disappointing.

Read More

Topics: Phishing, Malware, Threat Analysis, Backdoors, Hacker Tools

How AV software can stop phishing sites

Posted by John LaCour on Nov 7, '08

Over the course of examining hundreds if not thousands of phishing sites I’ve learned that the vast majority of phishing sites are created by compromising legitimate web sites through vulnerabilities of one type or another. Most often the vulnerabilities are web applications which don’t properly check that user content is really just user content. For example, instead of uploading their avatar image to an online forum like ZeroBoard, hackers upload malicious files which they can then run on the server giving them access to the system. The application does a poor job (if any) of checking that the picture file is only a picture file.

Read More

Topics: Phishing, Malware, Backdoors, Hacker Tools

   

What's this all about?

The PhishLabs Blog is where we share our insights and thoughts on cybercrime and online fraud.

Recent Posts

Upcoming Events

Calendar_Mock_

Posts by Topic

see all