pouet.chapril.org est l'un des nombreux serveurs Mastodon indépendants que vous pouvez utiliser pour participer au fédiverse.
Chapril https://www.chapril.org est un projet de l'April https://www.april.org

Administré par :

Statistiques du serveur :

1,1K
comptes actifs

#spam

29 messages22 participants4 messages aujourd’hui

It seems finally (?) I got nicoled too... I got the message on my single user GoToSocial account.
The account is: nicole53@chinanews.social

I remember I saw somebody who has a gist with the already used accounts. Can someone link me, so I can block all the other accounts too?

Možná jste taky zaregistrovali spamující účet, co se vydává za „Nicole“. Chodí od ní otravné zprávy do DMs. Už jsem ji několikrát blokoval, ale pokaždé se registruje na jiné instanci.
Snažím se to průběžně blokovat, ale kdyby vám to taky přišlo, rovnou blokněte a případně nahlaste.
#Fediblock #CZfedi #spam

📰 «Los datos de la lista Robinson parecen haber sido filtrados»
🔗 proxy.jesusysustics.com/2025/0

Filtrada en la dark web la supuesta Lista Robinson, con datos personales de los que no quieren ser molestados con spam bandaancha.eu/articulos/filtra

Me temo que va a tocar recoger cable tras años recomendando inscribirse en la lista Robinson. Durante años Se ha mostrado como una herramienta muy útil contra empresas legales (o con miedo a las denuncias), pero no contra aquellos entes maliciosos que solo buscan timarnos. Sin embargo, ahora el problema es que parecen haber filtrado una enorme base de datos de usuarios inscritos y eso solo puede significar que pronto recibiremos aún más llamadas y mensajes de spam.

Datos de más de 600.000 usuarios entre los que tenemos información muy sensible: DNI, nombre y apellidos, números de teléfono, correos electrónicos… información ideal para hacer que los timos sean más convincentes.

Los adultos estamos aprendiendo a marchas forzadas de los más jóvenes desconfiando cada vez más de las llamadas con número desconocido (no digamos ya ocultos) y este grave problema de seguridad solo puede acelerar este proceso.

#️⃣ #filtración #listaRobinson #llamadaTelefónica #privacidad #publicidadIndeseable #spam

lista-robinson
El Proxy · Los datos de la lista Robinson parecen haber sido filtrados
Plus via El Proxy

Also jetzt hab ich doch echt kurz überlegt, ob das wirklich sein kann, dass ich 1,95 Euro zahlen soll, damit mir weiterhin E-Mails zugestellt werden... und wollte mich schon aufregen, dass man als zahlender Kunde nun auch noch extra zahlen muss und so. 🤡

Aber gut gemacht ist diese Spam-Mail ja...


#Telekom, #Spam, #Mail, #Phishing

AkiraBot’s Use of GPT Models in Web Channel Abuse

Here is a full list of domains, websites and services used by people to send spam, spam and other spam messages:. and here is the full set of names: (Snob):.

Pulse ID: 67fa493f49755096b93cd648
Pulse Link: otx.alienvault.com/pulse/67fa4
Pulse Author: cryptocti
Created: 2025-04-12 11:06:39

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

AkiraBot Spammed Websites by using Evasion Techniques

Akirabot is a sophisticated Python framework has successfully targeted websites
using advanced techniques to bypass security measures and deliver AI-generated
spam.

Pulse ID: 67f87aa1dffcefb96c594f87
Pulse Link: otx.alienvault.com/pulse/67f87
Pulse Author: cryptocti
Created: 2025-04-11 02:12:49

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.
A répondu dans un fil de discussion

This is where I tell you: don't do this! I am a trained professional. I click all the bad links so you don't have to. I am going to show you what happens next.

A button appears on this page, labeled "Access Your Statement." The site serving up this payload delivers a file named "Social Security Statement Documents [six digit random number].exe"

7/

#malware#spam#malspam
A répondu dans un fil de discussion

Finally the target lands on a page on the InMotion site that closely resembles the look-and-feel of the content in the email message.

The page tells the visitor, in part "Download your statement as a PDF file" and "For security reasons, we recommend accessing your statement through your secure device."

Spoiler alert: It was not a PDF file.

(Edit: A reader informs me that this appears to be the hosting space used by the temp agency website, and that for whatever reason, the URL appears differently here.)

6/

#malware#spam#malspam
A répondu dans un fil de discussion

The target's browser then lands on another website, hosted by a large hosting service, InMotion Hosting. As with the temp agency website, the attackers have set up multiple URLs on this site, where the first URL performs a 302 redirect to go to the second URL, for no apparent reason other than to create the URL equivalent of a Rube Goldberg contraption.

5/

#malware#spam#malspam
Suite du fil

That link then immediately 302 redirects the target's browser to a link on a second website, one that belongs to a temp agency based in the US state of Maryland.

The attackers have created two URLs on this company's site for this purpose. The first one redirects to the second one.

Again, the site appears to have been compromised and used specifically for the purpose of obfuscating the redirection chain.

4/

#malware#spam#malspam