GMAIL phishing attack saga

imagensecforcepost.png

It all started a week ago. Some news hinted that some attackers were stealing domains taking advance of a Gmail vulnerability. Even when it was not confirmed, the story was Digged and generated quite a lot of buzz in the security community.

It all seemed that a new version of an old GMail hijack technique

On Tuesday Google confirmed that no known vulnerabilities were affecting Gmail and that the incidents were phishing attacks whereby attackers set up fake websites asking for Gmail username and password.

This is very interesting because it reinforces the theory that simple attacks targeting human security awareness are still very effective. At SECFORCE we work with our clients to increase security awareness and prevent this kind of attacks form happening.

You may also be interested in...

Progress-MOVEit-Transfer.png
Dec. 17, 2020

Progress MOVEit Transfer < 2020.1 Stored XSS (CVE-2020-28647)

During a recent web application test engagement one of the applications in scope was a MOVEit Transfer 2020 web application. While performing the assessment a Stored Cross-Site Scripting (XSS) vulnerability was identified.

See more
imagensecforcepost.png
March 17, 2014

SECFORCE will be presenting at OWASP

SECFORCE will present Tunna framework and a number of techniques penetration testers can benefit from to bypass network firewalls.

See more