-
-
Notifications
You must be signed in to change notification settings - Fork 212
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
add nico.sa to add-wildcard-domain #366
add nico.sa to add-wildcard-domain #366
Conversation
The site is serving the phishing kit that was previously hosted at ajstelecom[.]com[.]mx
Thanks for your report @g0d33p3rsec |
we let it fry for a couple of days... to see if they find everything. And the 503 response be based on a lot of things, like IP and Location or even a cookie in your browser = the browser choice it self. |
Sounds good, the group has moved to a new host which is mentioned in #367 |
The site is serving the phishing kit that was previously hosted at ajstelecom[.]com[.]mx
Domain/URL/IP(s) where you have found the Phishing:
Impersonated domain
Describe the issue
This (likely recently compromised) site is hosting the phishing kit that was previously active at ajstelecom[.]com[.]mx. See #362 #353 and #343 for a recent history of this activity group. The previous host had more than 250 malicious endpoints identified in a two week period. I don't have a facebook account but you will likely be able to find lures and additional URIs there until I can update this submission with additional samples after the search engines have had a chance to recrawl the various social media platforms.
Related external source
Screenshot
Click to expand