#phishing and #malware attack against Electronic Judicial Services System Iran
Domain:
engljsh[.]com
hXXps://tci-adsl.[.]engljsh[.]com/anon
User agent: Android
Proxy: Iran
@Namecheap
#phishing and #malware attack against Electronic services of the Iranian government
Domain:
whiii[.]me
hXXps://adi[.]whiii[.]me
User agent: Android
Proxy: Iran
Payload URLs:
hXXps://adi[.]whiii[.]me/app[.]apk
@spaceship@Namecheap
@NDA0E@banthisguy9349 It's a variant of #IRATA. By impersonating an Iranian bank, they deceive clients and drain their bank accounts through phishing hosted on IRATA. The APKs used in this operation are designed to intercept the victims' banking 2FA codes.
onecert.ir/portal/blog/ir…
@HostPapa How do you handle #phishing and #malware campaigns? and how does your team respond to reports of abuse?
why do you close our ticket without any response
how can a server use over 550 malicious domains, and your team overlook it?
#irata
@onecert_ir@ColoCrossing Alternatively, you may send us an email at support@hostpapasupport.com. Kindly put this ticket ID: 9586448 in the subject line. Looking forward to your email, thank you!
If you're considering engaging in phishing activities, we suggest using @OVHcloud for hosting. they have consistently shown disregard for abuse reports and exhibit a lack of commitment to closing them. It's disheartening that ovh appears indifferent towards enabling cybercrime.