![]() The document isĬriminals used Google’s reCAPTCHA because most security scanners trust the form. Standard-looking email, purporting to be a faxed document. ![]() In the attacks Avanan’s researchers have discovered, scammers used CAPTCHA forms to bypass scanners that would usually block any suspicious incoming emails. ![]() Once there, threat actors ask the target to enter credentials to open a PDF. Scammers used CAPTCHA forms sent from legitimate domains to fool scanners and get their hands on victims’ inboxes. However, a recent report by Avanan shows that threat actors abused Google’s reCAPTCHA product to steal victims’ credentials. While CAPTCHA forms, little puzzles websites ask you to fill out to prove you are human, can be tedious, they serve a serious purpose: protecting against bots. Threat actors abused Google’s product to bypass security filters leading to data theft.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |