med-mastodon.com is one of the many independent Mastodon servers you can use to participate in the fediverse.
Medical community on Mastodon

Administered by:

Server stats:

365
active users

#darcula

0 posts0 participants0 posts today
Marcel SIneM(S)US<p>Strukturen hinter <a href="https://social.tchncs.de/tags/Phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Phishing</span></a>-Netzwerk rund um "<a href="https://social.tchncs.de/tags/Darcula" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Darcula</span></a>" aufgedeckt | heise online <a href="https://www.heise.de/news/Phishing-Netzwerk-rund-um-Darcula-fuer-Betrugs-SMS-enttarnt-10370847.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Phishing-Netzwer</span><span class="invisible">k-rund-um-Darcula-fuer-Betrugs-SMS-enttarnt-10370847.html</span></a> <a href="https://social.tchncs.de/tags/CyberCrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberCrime</span></a></p>
BR Data<p>Die Täter sitzen in Asien, verschicken massenhaft täuschend echte Fake-Nachrichten und fälschen Webseiten etwa von Paketzustellern. </p><p>Zentraler Akteur ist ein junger chinesischer Software-Entwickler, der sich <a href="https://ard.social/tags/Darcula" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Darcula</span></a>“ nennt – eine Anspielung an den Vampir. (2/7)</p>
WDR (inoffiziell)"Das Paket kann nicht zugestellt werden" - mit solchen Textnachrichten zocken Betrüger alleine in Deutschland Zehntausende Menschen ab. Recherchen des BR und internationaler Medien identifizieren Hintermänner und zeigen ein globales Betrugssystem.<a href="https://squeet.me/search?tag=Betrug" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Betrug</span></a> <a href="https://squeet.me/search?tag=China" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>China</span></a> <a href="https://squeet.me/search?tag=Phishing-Netzwerk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Phishing-Netzwerk</span></a> <a href="https://squeet.me/search?tag=Darcula" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Darcula</span></a><br><a href="https://www.tagesschau.de/investigativ/br-recherche/textnachrichten-betrug-phishing-100.html" rel="nofollow noopener" target="_blank">Kriminelle aus China stecken hinter Phishing-Netzwerk</a>
tagesschau<p>Kriminelle aus China stecken hinter Phishing-Netzwerk</p><p>"Das Paket kann nicht zugestellt werden" - mit solchen Textnachrichten zocken Betrüger alleine in Deutschland Zehntausende Menschen ab. Recherchen des BR und internationaler Medien identifizieren Hintermänner und zeigen ein globales Betrugssystem.</p><p>➡️ <a href="https://www.tagesschau.de/investigativ/br-recherche/textnachrichten-betrug-phishing-100.html?at_medium=mastodon&amp;at_campaign=tagesschau.de" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">tagesschau.de/investigativ/br-</span><span class="invisible">recherche/textnachrichten-betrug-phishing-100.html?at_medium=mastodon&amp;at_campaign=tagesschau.de</span></a></p><p><a href="https://ard.social/tags/Betrug" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Betrug</span></a> <a href="https://ard.social/tags/China" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>China</span></a> <a href="https://ard.social/tags/PhishingNetzwerk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PhishingNetzwerk</span></a> <a href="https://ard.social/tags/Darcula" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Darcula</span></a></p>
Tino Eberl<p>📊 Die Top 4 Beiträge der letzten Woche mit den meisten Boosts sind:</p><p>1. <a href="https://mastodon.online/tags/Hamburg" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hamburg</span></a> plant eine <a href="https://mastodon.online/tags/Hyperloop" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hyperloop</span></a>-Teststrecke<br><a href="https://mastodon.online/@tinoeberl/114408909472996511" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mastodon.online/@tinoeberl/114</span><span class="invisible">408909472996511</span></a></p><p>2. Jährliche Schaden durch <a href="https://mastodon.online/tags/Steuerbetrug" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Steuerbetrug</span></a> liegt deutlich über dem durch <a href="https://mastodon.online/tags/B%C3%BCrgergeldmissbrauch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bürgergeldmissbrauch</span></a><br><a href="https://mastodon.online/@tinoeberl/114376856804950737" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mastodon.online/@tinoeberl/114</span><span class="invisible">376856804950737</span></a></p><p>3. Ein neues <a href="https://mastodon.online/tags/Phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Phishing</span></a>-Toolkit namens <a href="https://mastodon.online/tags/Darcula" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Darcula</span></a> nutzt <a href="https://mastodon.online/tags/KI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KI</span></a>, um jede beliebige Website automatisch zu klonen.<br><a href="https://mastodon.online/@tinoeberl/114406126112805290" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mastodon.online/@tinoeberl/114</span><span class="invisible">406126112805290</span></a></p><p>4. Der Bund setzt zunehmend auf <a href="https://mastodon.online/tags/Cloud" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cloud</span></a>-Dienste wie <a href="https://mastodon.online/tags/Amazon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Amazon</span></a>, <a href="https://mastodon.online/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> oder <a href="https://mastodon.online/tags/Google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Google</span></a>.<br><a href="https://mastodon.online/@tinoeberl/114379641442314917" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mastodon.online/@tinoeberl/114</span><span class="invisible">379641442314917</span></a></p>
Tino Eberl<p><a href="https://mastodon.online/tags/KIMissbrauch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KIMissbrauch</span></a> Ein neues <a href="https://mastodon.online/tags/Phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Phishing</span></a>-Toolkit namens <a href="https://mastodon.online/tags/Darcula" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Darcula</span></a> nutzt <a href="https://mastodon.online/tags/KI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KI</span></a>, um jede beliebige Website automatisch zu klonen.</p><p>Nach Eingabe der URL erstellt es täuschend echte Kopien, inklusive Übersetzung und passender Eingabemasken. Angriffe erfolgen oft per <a href="https://mastodon.online/tags/Smishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Smishing</span></a> über <a href="https://mastodon.online/tags/SMS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SMS</span></a> oder <a href="https://mastodon.online/tags/RCS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RCS</span></a>-Nachrichten. Die Software funktioniert nach dem SaaS-Modell und erhöht das Risiko gezielter <a href="https://mastodon.online/tags/Phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Phishing</span></a>-Attacken deutlich. </p><p><a href="https://www.heise.de/news/KI-Tool-klont-Webseiten-und-macht-Phishing-kinderleicht-10363070.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/KI-Tool-klont-We</span><span class="invisible">bseiten-und-macht-Phishing-kinderleicht-10363070.html</span></a></p><p><a href="https://mastodon.online/tags/Cyberkriminalit%C3%A4t" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberkriminalität</span></a> <a href="https://mastodon.online/tags/ITSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITSecurity</span></a> <a href="https://mastodon.online/tags/PhishingToolkit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PhishingToolkit</span></a> <a href="https://mastodon.online/tags/Datensicherheit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Datensicherheit</span></a></p>
Chris. R. 🎧🎼☕🍍<p>Malicious VSCode extensions with millions of installs discovered</p><p><a href="https://fedi.cr-net.be/tags/Dracula" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Dracula</span></a> <a href="https://fedi.cr-net.be/tags/Darcula" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Darcula</span></a> <a href="https://fedi.cr-net.be/tags/Typosquatting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Typosquatting</span></a></p><p><a href="https://www.bleepingcomputer.com/news/security/malicious-vscode-extensions-with-millions-of-installs-discovered/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/malicious-vscode-extensions-with-millions-of-installs-discovered/</span></a></p>
Chuck Darwin<p>A new <a href="https://c.im/tags/phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phishing</span></a>-as-a-service (PhaaS) named ‘<a href="https://c.im/tags/Darcula" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Darcula</span></a>’ uses 20,000 domains to spoof brands and steal credentials from Android and iPhone users in more than 100 countries.</p><p>Darcula has been used against various services and organizations, from postal, financial, government, taxation departments, to telcos, airlines, utility, <br>offering fraudsters over 200 templates to choose from.</p><p>One thing that makes the service stand out is that it approaches the targets using the Rich Communication Services (RCS) protocol for Google Messages and iMessage instead of SMS for sending phishing messages</p><p><a href="https://www.bleepingcomputer.com/news/security/new-darcula-phishing-service-targets-iphone-users-via-imessage/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/new-darcula-phishing-service-targets-iphone-users-via-imessage/</span></a></p>