Security News > 2020 > October > Serious Security: Phishing without links – when phishers bring along their own web pages
Or the imposter pages may be part of a short-lived web hosting account - perhaps set up just a day or two before as a "Free trial" that will probably be shut down quickly, but not before the crooks will have cut and run anyway.
Usually, the fake login form that performs the password-stealing part of a phishing scam appears somewhere in the phoney web page on website.
Kakworm's script code would activate and the virus would spread as soon as the email was displayed, without waiting for you to click any further.
Avoid logging in on web pages that you arrived at from an email, whether you clicked on a series of links or opened an attachment to get there.
If it's a service you already know how to use - whether it's your email, your banking site, your blog pages or a social media account - learn how to reach the login page directly.
News URL
Related news
- AI’s impact on the future of web application security (source)
- Here's what happens if you don't layer network security – or remove unused web shells (source)
- Novel phishing campaign uses corrupted Word documents to evade security (source)
- Phishers send corrupted documents to bypass email security (source)
- CERT-UA Warns of Phishing Attacks Targeting Ukraine’s Defense and Security Force (source)