GitHub, Telegram Bots, and ASCII QR Codes Abused in New Wave of Phishing Attacks

A new phishing campaign targeting the insurance and finance sectors uses GitHub, Telegram bots, and ASCII QR codes to deliver malware and evade security measures. The attack leverages GitHub links and trusted repositories to distribute Remcos RAT, with the payload delivered via phishing emails. Additional techniques such as blob URLs and QR code-based phishing add complexity to detection, while Telegram bots facilitate scams on platforms like Booking.com and Airbnb.
- GitHub Abuse: Phishing emails include GitHub links to trusted repositories to deliver malware, bypassing security filters.
- Remcos RAT: The campaign distributes Remcos RAT malware via Lua-based loaders that establish persistence and deliver further payloads.
- Malicious GitHub Comments: Attackers use GitHub comments to upload malicious payloads, leaving only the link behind after deletion.
- New Techniques: ASCII QR codes and blob URLs are employed to evade detection and complicate phishing protection.
- Telekopye Telegram Toolkit: The toolkit, once focused on marketplace scams, now targets accommodation booking platforms with interactive phishing attacks.
- Law Enforcement Action: Cybercriminals behind the Telekopye toolkit were arrested in December 2023 by Czech and Ukrainian authorities.
These phishing strategies demonstrate the evolving tactics of cybercriminals in using trusted platforms to bypass security measures and reach unsuspecting victims.
Comment(s)
Categories
- Other (43)
- Ransomware (154)
- Events and News (27)
- Features (45)
- Security (487)
- Tips (79)
- Google (30)
- Achievements (11)
- Products (36)
- Activation (7)
- Dealers (1)
- Bank Phishing (53)
- Malware Alerts (235)
- Cyber Attack (303)
- Data Backup (13)
- Data Breach (132)
- Phishing (165)
- Securty Tips (2)
- Browser Hijack (19)
- Adware (15)
- Email And Password (71)
- Android Security (78)
- Knoweldgebase (38)
- Botnet (17)
- Updates (4)
- Alert (71)
- Hacking (71)
- Social Media (8)
- vulnerability (76)
- Hacker (38)
- Spyware (12)
- Windows (8)
- Microsoft (26)
- Uber (1)
- YouTube (1)
- Trojan (5)
- Website hacks (10)
- Paytm (1)
- Credit card scam (2)
- Telegram (3)
- RAT (8)
- Bug (3)
- Twitter (2)
- Facebook (8)
- Banking Trojan (10)
- Mozilla (2)
- COVID-19 (5)
- Instagram (4)
- NPAV Announcement (9)
- IoT Security (2)
- Deals and Offers (2)
- Cloud Security (12)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (3)
- WhatsApp (6)
- Amazon (2)
- DMart (1)
- Payment Risk (5)
- Occasion (3)
- firewall (3)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (52)
- Impersonation phishing (1)
- DDoS (7)
- Smishing (2)
- Whale (0)
- Whale phishing (4)
- WINRAR (2)
- ZIP (2)
- Fraud Protector (41)
Recent Posts
Archive
Tags
cybersecurity
cybercrime
cyber attack
phishing
phishing attacks
data breach
cybersecurity threats
cyber threats
phishing attack
data theft
malware
cyber fraud
android malware
credential theft
ransomware
financial fraud
ransomeware
social engineering
#cybersecurity
financial security
data protection
cyber security
phishingattack
cyberthreats
network security
ransomware attacks
malware distribution
data security
online fraud
cyber threat
data stealing
security vulnerabilities
ddos attack
cert-in
phishing scam
cyber crime
identity theft
phishing email
ransomware attack
microsoft
cybercriminals
digital safety
cyberattack
india
malware attack
twitter
ddos
trojan
critical vulnerability
cyber attacks