FreeDrain Phishing Attack Users to Steal Users Financial Login Credentials - Cyber Security News

These initial lure pages-typically a single large image of a legitimate wallet interface-redirect users through a series of hops before eventually reaching a phishing page designed to steal wallet seed phrases. This sophisticated campaign leverages search engine manipulation and free-tier web hosting services to create an extensive web of malicious sites that appear legitimate to unsuspecting users searching for cryptocurrency wallet information. This code sends the captured seed phrase to an AWS API Gateway endpoint before redirecting the victim to the legitimate wallet site, leaving them unaware their credentials have been compromised until their funds disappear. When a victim clicks a malicious search result hosted on platforms like gitbook.io or webflow.io, they encounter a page displaying a screenshot of a legitimate wallet interface. The attack begins when users search for wallet-related queries such as “Trezor wallet balance” or “Ledger Live” on major search engines. Their investigation began after a distressed victim reported losing approximately 8 BTC (worth around $500,000) after entering their seed phrase on a fake Trezor wallet site. Clicking this image triggers a series of redirects through algorithmically generated domains like “shotheatsgnovel.com” or “bildherrywation.com” before landing on the final phishing page. Analysis of FreeDrain’s infrastructure revealed that the operation is likely run by individuals based in the UTC+05:30 timezone (Indian Standard Time), working standard business hours with clear weekday patterns and midday breaks-suggesting a structured, professional operation rather than opportunistic attacks. A sprawling phishing operation dubbed “FreeDrain” has emerged as an industrial-scale cryptocurrency theft network that systematically targets and drains digital wallets. SentinelOne researchers, in collaboration with Validin, recently unveiled the full scope of this operation at PIVOTcon 2025, identifying over 38,000 distinct FreeDrain subdomains hosting lure pages. “FreeDrain represents a modern blueprint for scalable phishing operations,” noted Tom Hegel, Principal Threat Researcher at SentinelOne. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. Victims click on high-ranking malicious results, often appearing on the first page of search results, and land on seemingly helpful pages. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

This Cyber News was published on cybersecuritynews.com. Publication date: Fri, 09 May 2025 09:40:58 +0000


Cyber News related to FreeDrain Phishing Attack Users to Steal Users Financial Login Credentials - Cyber Security News

FreeDrain Phishing Attack Users to Steal Users Financial Login Credentials - Cyber Security News - These initial lure pages-typically a single large image of a legitimate wallet interface-redirect users through a series of hops before eventually reaching a phishing page designed to steal wallet seed phrases. This sophisticated campaign leverages ...
1 week ago Cybersecuritynews.com
The Rise of Cyber Insurance - What CISOs Need to Consider - Cyber insurance offers not just financial protection against potentially devastating cyber incidents but also provides frameworks for improving security posture, access to specialized resources, and support during crisis scenarios. Beyond financial ...
1 month ago Cybersecuritynews.com
Spear Phishing vs Phishing: What Are The Main Differences? - Almost half of them used phishing to obtain the passwords of users. Highly targeted phishing campaigns against specific individuals or types of individuals are known as spear phishing. It's important to be able to spot phishing in general. For ...
1 year ago Techrepublic.com
What SOCs Need to Know About Water Dybbuk - According to the Federal Bureau of Investigation, BEC costs victims more money than ransomware, with an estimated US$2.4 billion being lost to BEC in the US in 2021. Recently, BEC scammers have been using stolen accounts from legitimate Simple Mail ...
2 years ago Trendmicro.com
Cyber Insurance for Businesses: Navigating Coverage - To mitigate these risks, many businesses opt for cyber insurance. With the wide range of policies available, navigating the world of cyber insurance can be overwhelming. In this article, we will delve into the complexities of cyber insurance and ...
1 year ago Securityzap.com
Three Key Threats Fueling the Future of Cyber Attacks - Improvements in cyber security and business continuity are helping to combat encryption-based ransomware attacks, yet the cyber threat landscape is continually evolving. Protecting an organization against intrusion remains a cat and mouse game, in ...
1 year ago Cyberdefensemagazine.com
AI Outperformed Elite Red Teams in Creating an Effective Spear Phishing Attack - By March 2025, their AI spear phishing agent (codenamed JKR) achieved a 23.8% higher success rate than human red teams across all user skill levels. Prompt Engineering for Task Execution: For novel attacks, JKR uses instructions like:- ...
1 month ago Cybersecuritynews.com
What CIRCIA Means for Critical Infrastructure Providers and How Breach and Attack Simulation Can Help - Cyber Defense Magazine - To prepare themselves for future attacks, organizations can utilize BAS to simulate real-world attacks against their security ecosystem, recreating attack scenarios specific to their critical infrastructure sector and function within that sector, ...
7 months ago Cyberdefensemagazine.com Akira
How To Use YARA Rules To Identify Financial Sector Targeted Attacks - By analyzing multiple samples from the same malware family, security teams can create YARA rules that identify various iterations of the threat, even as attackers attempt to modify their code to evade detection. By scanning network traffic for ...
1 month ago Cybersecuritynews.com Hunters
Sophisticated QR Code Phishing Attack Targeting Microsoft 365 Users to Steal Logins - This code snippet demonstrates how the attack validates and exfiltrates user credentials while redirecting victims to legitimate Microsoft services post-compromise, leaving users unaware of the breach. This attack represents a significant evolution ...
1 month ago Cybersecuritynews.com
IT Professionals in ASEAN Confronting Rising Cyber Security Risks - The ASEAN region is seeing more cyber attacks as digitisation advances. In July 2023, the Association of Southeast Asian Nations officially opened a joint cyber security information sharing and research centre, or Cybersecurity and Information Centre ...
1 year ago Techrepublic.com
Cyber Insurance: A Smart Investment to Protect Your Business from Cyber Threats in 2023 - Don't wait until it's too late - get cyber insurance today and secure your business for tomorrow. According to the U.S. Federal Trade Commission, cyber insurance is a particular type of insurance that helps businesses mitigate financial losses ...
1 year ago Cyberdefensemagazine.com
Fighting ransomware: A guide to getting the right cybersecurity insurance - While the cybersecurity risk insurance market has been around for more than 20 years, the rapidly changing nature of attacks and the rise in the ransomware epidemic has markedly changed the nature of cyber insurance in recent years. It's more ...
1 year ago Scmagazine.com
Flipping the BEC funnel: Phishing in the age of GenAI - For years, phishing was just a numbers game: A malicious actor would slap together an extremely generic email and fire it out to thousands of recipients in the hope that a few might take the bait. Common among these new techniques was a shift towards ...
1 year ago Helpnetsecurity.com
Server-Side Phishing Attacks Employees & Member Portals to Steal Login Credentials - The campaign utilizes cloned login pages designed to harvest credentials through PHP-based phishing kits, with the attackers implementing server-side validation techniques to avoid detection by security tools and researchers. function ...
1 month ago Cybersecuritynews.com
Pocket Card Users Under Attack Via Sophisticated Phishing Campaign - A highly targeted phishing campaign is currently exploiting Pocket Card users through elaborately crafted emails that appear to originate from the legitimate financial service provider. The landing pages are nearly indistinguishable from the official ...
1 month ago Cybersecuritynews.com
Uncertainty Is the Biggest Challenge to Australia's Cyber Security Strategy - Political shifts could lead to changes in Australia's cyber security strategy. Early in 2023, as the Australian government started to craft its cyber security vision, it met with opposition at both ends of the political spectrum. On the right wing, ...
1 year ago Techrepublic.com
Trellix Unveils New Phishing Simulator to Proactively Identify & Mitigate Phishing Attacks - The Phishing Simulator serves as a companion to Trellix Email Security – Cloud, offering security administrators a robust toolkit for crafting authentic phishing scenarios, delivering personalized training, and tracking employee progress. ...
2 weeks ago Cybersecuritynews.com
Beware of Fake Unpaid Toll Message Attack to Steal Login Credentials - Security analysts note that these toll scam campaigns achieve approximately 5% success rates – substantially higher than traditional email phishing attacks – demonstrating the effectiveness of this multi-stage approach that combines SMS messaging ...
1 month ago Cybersecuritynews.com
Why Phishing Remains the #1 Cyber Threat and How to Stop It - Unlike many cyber threats that rely solely on technical vulnerabilities, phishing exploits natural human tendencies such as trust, urgency, and curiosity. Additionally, adopting zero-trust security frameworks, which require continuous verification of ...
1 month ago Cybersecuritynews.com
Key Breakthroughs from RSA Conference 2025 - Day 1 - Sumo Logic unveiled intelligent security operations with capabilities like detection-as-code (bringing DevSecOps to threat detection), UEBA historical baselining (improving accuracy by learning behavior over time), multiple threat intelligence feeds, ...
3 weeks ago Cybersecuritynews.com Inception
New Phishing Campaign Attacking Mac Users to Steal User Credentials - A sophisticated phishing campaign has recently shifted its focus to target Mac users, demonstrating the evolving nature of cyber threats in response to improved security measures. The security team observed a drastic 90% drop in Windows-targeted ...
1 month ago Cybersecuritynews.com
Darcula 3.0 Tool Automatically Generates Phishing Kit For Any Brand - The darcula phishing group has escalated cybercrime capabilities with its newly unveiled “darcula-suite 3.0,” a phishing-as-a-service (PhaaS) platform enabling criminals to automatically generate counterfeit websites for any brand within ...
3 months ago Cybersecuritynews.com
New Astaroth 2FA Phishing Kit Targeting Gmail, Yahoo, Office 365, and 3rd-Party Logins - To safeguard against sophisticated phishing attacks like the Astaroth 2FA phishing kit, users should create strong, unique passwords, enable two-factor authentication (2FA) using authenticator apps, and exercise caution when handling links or ...
3 months ago Cybersecuritynews.com
Combat Phishing Attacks With AI-Powered Threat Protection - According to statistics, 81% of organizations have seen an increase in phishing emails since 2020, with an estimated 3.4 billion emails sent every day. AI-generated phishing emails are a sophisticated and evolving cybersecurity threat. ...
1 year ago Gbhackers.com

Cyber Trends (last 7 days)