World News

Urgent warning to 1.8 billion people offered to steal their accounts on" Gmail"

Cyber ​​security experts warn all Gmail users of a new penetration that spoils the bilateral approval & quot; 2FA & quot; To control accounts.

& nbsp;

& nbsp;

& nbsp;

It is called the new electronic crime tool & quot; Issaart & quot, and it steals these models from the definition in real time, deceives the victim and makes him believe that he recorded his account naturally by sending him to a fake page that looks like his browser.

& nbsp;

P> Pirates who use ASTARTH can access user names, passwords and credit card numbers And banking information and other important data once the victim log in to their accounts on these fake pages. Information on the dark web.

& nbsp; As a mediator for infiltrators, where login data picks & quot; user names and passwords & quot, symbols & quot; bilateral authentication symbols & quot; and the cookies of the session & quot; web browser files & quot; In actual time. All this effectively exceeds any bilateral approval on your accounts. Log in to their email The real. : Your accounts.

& nbsp; It may be a victim of this scheme.

& nbsp;

includes Fraud. Internet criminals try to steal personal information such as online passwords, bank details or money from an attentive victim.

often, the criminal uses an email, phone call, or even a fake website, pretending to be From a good reputation company. Selling it on the dark web. Maintaining the safety of email users by asking them to check that they are the ones who log in to their accounts.

takes Astaroth the process of hunting to the next level, by intercepting verification codes, text messages and email messages in actual time without the user’s knowledge. On the dark web. The police are very followed by sales or finding infiltrators who buy a legacy. A harmful servant used by the hacker as & quot; agent Reverse & quot;

& nbsp;

The reverse agent is a servant & quot; in front of & quot; Another server, application or cloud service and re -directs all the web browser requests to the victim to these servers.

& nbsp;

for the infiltrat His regular browser. Log in. & nbsp;

Any 2FA symbols that the user sends immediate The penetrator’s fraudulent hunting is a alert on Telegram that the safety code is required to log in. ; The fake that the victim enters all his data without his knowledge. P>

& nbsp;

As for those who are in danger, Internet experts warn that Pirates who use Astaroth may target billions of email users and those who use the third -party login operations to reach their accounts.

Related Articles

Back to top button