A nifty way for adversaries to acquire passwords during post-exploitation is to spoof credential dialogs and perform a local phishing attack. This means tricking a user on a compromised computer to enter their password.
Unfortunately, users are conditioned to enter their credentials frequently and therefore don’t question random passwords prompts too much.
Long, long time ago… but nothing has changed The idea to spoof a credential dialog is one of the most simple ideas one might come up with.
When paired with our new EdgeKV distributed key-value database, the Akamai EdgeWorkers serverless platform gives you the ability to do powerful things at the CDN level.
Summary
Zscaler has identified a threat actor spreading malicious android apps via WhatsApp and SMS. The apps are specifically targeting JIO telecom users in India. Those targeted are tricked into thinking that TikTok is available again in India or that they are installing an app to register to receive a free Lenovo laptop, courtesy of the Government of India.
Threat Type
Malware, Phishing, Smishing
Overview
An unnamed threat actor has been identified as actively operating since as early as March 20, 2020.