Login
Features
API
Pricing
FAQ
Contact us
Login
Portscanner Online
Latest Cybersecurity News and Articles
Voice Phishing Campaigns Using Access Keys
Voice Phishing Campaigns Using Access Keys
14 October 2023
The phishing attack starts with an HTML file disguised as a voice message, which leads to the download of a file hosted on a disguised AWS URL. The attackers initially impersonate Zoom but later switch to spoofing Outlook and Teams login pages.
>>
More
We use cookies to ensure you get the best experience on our website.
Cookie policy
I agree