<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Thu, 23 Apr 2026 07:18:20 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/@balor/rss" rel="self" type="application/rss+xml"/><item><title><![CDATA[Getting Code Execution on an iCloud Phishing Panel]]></title><description><![CDATA[So in my previous post I mentioned that the panel I discovered was really, really badly coded. So I decided to do a little audit of the code and find a way to gain code execution. Firstly, you will have]]></description><link>http://direct.ecency.com/technology/@balor/getting-code-execution-on-an-icloud-phishing-panel</link><guid isPermaLink="true">http://direct.ecency.com/technology/@balor/getting-code-execution-on-an-icloud-phishing-panel</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[balor]]></dc:creator><pubDate>Sat, 25 May 2019 17:45:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/W5LtFUPm6g7111bbdcuxu3bfUg5qaCq8seb5paCtrrT7zMaMhAryEmYLQGGjrx3GZ5DRtkKsp6Jq4BKUHtqHWt9ECK6y55Bgn7GrssBtijMvCVLePPNiQZE47q3EVBMhmfQF1tRqKnSaXqvGB6vVLytUjuTnn?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[A Look Inside an Apple iCloud Phishing Panel.]]></title><description><![CDATA[So by sheer dumb luck today, we managed to nab a nice phishing panel and gain access to its backend literally as it got deployed to the internet. We were monitoring the Certificate Transparency logs for]]></description><link>http://direct.ecency.com/technology/@balor/a-look-inside-an-apple-icloud-phishing-panel</link><guid isPermaLink="true">http://direct.ecency.com/technology/@balor/a-look-inside-an-apple-icloud-phishing-panel</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[balor]]></dc:creator><pubDate>Sat, 25 May 2019 13:31:24 GMT</pubDate><enclosure url="https://images.ecency.com/p/W5LtFUPm6g7111bbdcuxu3bfUg5qaCq8seb5paCtrrT7zPh1CE36wGRHuofEHdqP5G7chKHs7xMogBhQ3ce9MKsAZn7Bya9yD1tCR65qh22xBiW1eNdetq98GgRDJu8EddeCoJMELCPtjXHTzJQ37GfnADCdc?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[A Somewhat Overdue Introduction...]]></title><description><![CDATA[So I forgot to post an introduction post, due to being a bit busy posting up a bunch of content and working out some of the backend stuff for the Fried Phish Project. So I am balor, a security]]></description><link>http://direct.ecency.com/introduceyourself/@balor/a-somewhat-overdue-introduction</link><guid isPermaLink="true">http://direct.ecency.com/introduceyourself/@balor/a-somewhat-overdue-introduction</guid><category><![CDATA[introduceyourself]]></category><dc:creator><![CDATA[balor]]></dc:creator><pubDate>Fri, 24 May 2019 11:47:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/D5zH9SyxCKd9GJ4T6rkBdeqZw1coQAaQyCUzUF4FozBvW6n9DY1yY1cnmC7cmov8LtEc1hmYbotHxmFFXDFmGDxhmcPxYEeQKYGDduucvBCPuy5Ttx5T3C3Vudg1sqcDgNLrZU?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[An Example of a DHL Phishing Attack (Featuring: Comic Sans).]]></title><description><![CDATA[So this is another really, really crude phishing kit that I have seen around the place quite a lot in the past while, targeting users of the DHL service. Effectively it seeks to jack peoples DHL accounts]]></description><link>http://direct.ecency.com/technology/@balor/an-example-of-a-dhl-phishing-attack-featuring-comic-sans</link><guid isPermaLink="true">http://direct.ecency.com/technology/@balor/an-example-of-a-dhl-phishing-attack-featuring-comic-sans</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[balor]]></dc:creator><pubDate>Fri, 24 May 2019 11:05:45 GMT</pubDate><enclosure url="https://images.ecency.com/p/W5LtFUPm6g7111bbdcuxu3bfUg5qaCq8seb5paCtrrT7zSDYtXy7inAjsTWmvtJSoaetmCZBvpdBwPbsUSvfopnJxNXdWE3VkbpxJx3Rk2tpRpAfwV3RJ4VkJirVG1TjYy5eicBf2prT3rTYNEJTywKRQWtWr?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[An Example of an Alibaba (and Gmail!) Phishing Attack.]]></title><description><![CDATA[So this is a moderately interesting one, in that you get twice the fuckery for half the price. What appeared to be, on first glance, a phishing page targeting Alibaba users, also harvests your login]]></description><link>http://direct.ecency.com/technology/@balor/an-example-of-an-alibaba-and-gmail-phishing-attack</link><guid isPermaLink="true">http://direct.ecency.com/technology/@balor/an-example-of-an-alibaba-and-gmail-phishing-attack</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[balor]]></dc:creator><pubDate>Fri, 24 May 2019 08:26:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/W5LtFUPm6g7111bbdcuxu3bfUg5qaCq8seb5paCtrrT7zMjh7QzFMJdiC7RrXJSTnJt5pFA7eufPZw3am3XiQbnvPkg9fNb4kgvHzk2V8J8jgSNmn4j5MiBfmRDBX9vfbKciuVNdvsiVBqTJRoDBSK9WrhKwt?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[An Outlook Phishing Page Hosted on a Kenyan Government Website.]]></title><description><![CDATA[So this is a curious case, while reviewing our logs of phishing sites detected, we spotted a Kenyan government domain amongst the logs, so of course we had to investigate. The phishing page we landed on]]></description><link>http://direct.ecency.com/technology/@balor/an-outlook-phishing-page-hosted-on-a-kenyan-government-website</link><guid isPermaLink="true">http://direct.ecency.com/technology/@balor/an-outlook-phishing-page-hosted-on-a-kenyan-government-website</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[balor]]></dc:creator><pubDate>Mon, 20 May 2019 12:22:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/W5LtFUPm6g7111bbdcuxu3bfUg5qaCq8seb5paCtrrT7zRceLCbFiD2uQ4psxtYUqQMa6D3gVysPUGCWuqd1fvgjchW7Fto5G4pXxKDKv8QnFJ2uPaSawJiMM9vmsjwYdvkT5TFL1CqeqmYe7ZQhcvdGsfD4S?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[An Example of an Ourtime.com (Dating Site) Phishing Attack.]]></title><description><![CDATA[So this one is a little amusing, we came across it after updating our phishing sample collector to also search for dating-site related keywords. The kit is targeting users of "Ourtime.com", a]]></description><link>http://direct.ecency.com/technology/@balor/an-example-of-an-ourtime-com-dating-site-phishing-attack</link><guid isPermaLink="true">http://direct.ecency.com/technology/@balor/an-example-of-an-ourtime-com-dating-site-phishing-attack</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[balor]]></dc:creator><pubDate>Thu, 16 May 2019 13:38:39 GMT</pubDate><enclosure url="https://images.ecency.com/p/W5LtFUPm6g7111bbdcuxu3bfUg5qaCq8seb5paCtrrT7zPh6bDBdVAjnwx4nGReWYiCkZyags6qgCqdB8bhDdzDzttHEFSMrvi111YcwybodC87A3x2taSmrt8gQ7ZnsEz4NytWospyCtXVqXh4fDXiY8xDgz?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[An Example of an Outlook Phishing Attack.]]></title><description><![CDATA[So here we have another phishing setup we discovered as part of the "Fried Phish" project, this time targeting Spanish speaking Outlook webmail users. This one is rather crude, but the way we]]></description><link>http://direct.ecency.com/technology/@balor/an-example-of-an-outlook-phishing-attack</link><guid isPermaLink="true">http://direct.ecency.com/technology/@balor/an-example-of-an-outlook-phishing-attack</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[balor]]></dc:creator><pubDate>Wed, 15 May 2019 18:59:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/W5LtFUPm6g7111bbdcuxu3bfUg5qaCq8seb5paCtrrT7zNq386ha4D1sJzdYvKKgc6uTc5ex7Xb6yjPzjkGqW8zU1MwQkuppyVzQqUkk7ZvjWFn86mta6EuySUS6CWEAprLe7mHUTjjmRGbcgEDofbt2CDKNn?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[An Example of a Cox Phishing Attack.]]></title><description><![CDATA[So here we have another phishing setup we discovered as part of the "Fried Phish" project, this time targeting customers of Cox Communications, an ISP and TV provider in the United States. This]]></description><link>http://direct.ecency.com/technology/@balor/an-example-of-a-cox-phishing-attack</link><guid isPermaLink="true">http://direct.ecency.com/technology/@balor/an-example-of-a-cox-phishing-attack</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[balor]]></dc:creator><pubDate>Wed, 15 May 2019 10:28:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/W5LtFUPm6g7111bbdcuxu3bfUg5qaCq8seb5paCtrrT7zRA3RkHwxW9DuS53sQt5mfWMqwRJMsbRs9TiPyCSf47w3kNRXyDcfB7FHp9dcNLdz39ygmJY2GKhjcKsHEufrSJDih3oMsSPfzrRMQBoKk1mYJbPC?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[An Example of a Maersk Phishing Attack.]]></title><description><![CDATA[So for my first post here, as part of the "Fried Phish" project I'll give you all a look behind the scenes of a phishing campaign we came across today, while scouring the internet for evil. So]]></description><link>http://direct.ecency.com/technology/@balor/an-example-of-a-maersk-phishing-attack</link><guid isPermaLink="true">http://direct.ecency.com/technology/@balor/an-example-of-a-maersk-phishing-attack</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[balor]]></dc:creator><pubDate>Tue, 14 May 2019 16:38:51 GMT</pubDate><enclosure url="https://images.ecency.com/p/W5LtFUPm6g7111bbdcuxu3bfUg5qaCq8seb5paCtrrT7zNo753Z9xg32Rt78paWUJ3qeYNU94HoQ4iNvruAsqNNcxPjEncm4u9zwoYAmFVZZZXV6fWVJJtBiHoXSRbyQKLnmqYhzkPBLKSvnMcX4A681wxJbQ?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>