Boletines de Vulnerabilidades

Hackers Use Fake Google reCAPTCHA to Cloak Banking Malware


Información sobre el sistema

   
Software afectado Wordpress

Descripción

http://feedproxy.google.com/~r/sucuri/blog/~3/7A-g8bD4Rvs/hackers-use-fake-google-recaptcha-to-cloak-banking-malware.html The most effective phishing and malware campaigns usually employ one of the following two age-old social engineering techniques: Impersonation These online phishing campaigns impersonate a popular brand or product through specially crafted emails, SMS, or social media networks. These campaigns employ various methods including email spoofing, fake or real employee names, and

More info:

http://feedproxy.google.com/~r/sucuri/blog/~3/7A-g8bD4Rvs/hackers-use-fake-google-recaptcha-to-cloak-banking-malware.html

Identificadores estándar

Propiedad Valor
CVE

Histórico de versiones

Versión Comentario Fecha
1.0 Advisory issued 2019-02-23

Miembros de

Ministerio de Defensa
CNI
CCN
CCN-CERT