According the article:
Attackers have begun sending spam emails with poisoned attachments to customers at 14 different Japanese banks, according to Limor Kessem, a cybersecurity evangelist with IBM
(here is the interesting part)
After making off with a victim’s money, in some instances, URLZone hides the transaction line with HTML injections, making it appear like no money was taken.
For More Info:
https://threatpost.com/urlzone-back-targeting-banks-in-japan/116107/
No comments:
Post a Comment