Wednesday , April 2 2025

Emerging Phishing Threat in Bangladesh’s Cyber Space

BGD e-GOV CIRT report highlights a recent surge in phishing attacks targeting Bangladeshi government organizations, law enforcement, and educational institutions. These attacks aim to steal sensitive information by impersonating official entities and using malicious attachments and links.

Key details include:

Check Point said BreachForum post old data

Israeli cybersecurity firm Check Point has responded to a hacker who claimed to have stolen valuable information from its systems....
Read More
Check Point said BreachForum post old data

Apple Warns of 3 Zero Day Vulns Actively Exploited

Apple has issued an urgent security advisory about 3 critical zero-day vulnerabilities—CVE-2025-24200, CVE-2025-24201, and CVE-2025-24085—that are being actively exploited in...
Read More
Apple Warns of 3 Zero Day Vulns Actively Exploited

24,000 unique IP attempted to access Palo Alto GlobalProtect portals

GreyNoise has detected a sharp increase in login scanning aimed at Palo Alto Networks PAN-OS GlobalProtect portals. In the past...
Read More
24,000 unique IP attempted to access Palo Alto GlobalProtect portals

CVE-2025-1268
Patch urgently! Canon Fixes Critical Printer Driver Flaw

Canon has announced a critical security vulnerability, CVE-2025-1268, in printer drivers for its production printers, multifunction printers, and laser printers....
Read More
CVE-2025-1268  Patch urgently! Canon Fixes Critical Printer Driver Flaw

Within Minute, RamiGPT To Escalate Privilege Gaining Root Access

RamiGPT is an AI security tool that targets root accounts. Using PwnTools and OpwnAI, it quickly navigated privilege escalation scenarios...
Read More
Within Minute, RamiGPT To Escalate Privilege Gaining Root Access

Australian fintech database exposed in 27000 records

Cybersecurity researcher Jeremiah Fowler recently revealed a sensitive data exposure involving the Australian fintech company Vroom by YouX, previously known...
Read More
Australian fintech database exposed in 27000 records

Over 200 Million Info Leaked Online Allegedly Belonging to X

Safety Detectives' Cybersecurity Team found a forum post where a threat actor shared a .CSV file with over 200 million...
Read More
Over 200 Million Info Leaked Online Allegedly Belonging to X

FBI investigating cyberattack at Oracle, Bloomberg News reports

The Federal Bureau of Investigation (FBI) is probing the cyberattack at Oracle (ORCL.N), opens new tab that has led to...
Read More
FBI investigating cyberattack at Oracle, Bloomberg News reports

OpenAI Offering $100K Bounties for Critical Vulns

OpenAI has increased its maximum bug bounty payout to $100,000, up from $20,000, to encourage the discovery of critical vulnerabilities...
Read More
OpenAI Offering $100K Bounties for Critical Vulns

Splunk Alert User RCE and Data Leak Vulns

Splunk has released a security advisory about critical vulnerabilities in Splunk Enterprise and Splunk Cloud Platform. These issues could lead...
Read More
Splunk Alert User RCE and Data Leak Vulns

Target Sectors:
Government organizations
Law enforcement agencies
Educational institutions

Source: BGD e-GOV CIRT

Phishing Characteristics:

Subject and Sender: Mimic official communications, often appearing as security updates.
Body Content: Urges urgent action (e.g., clicking links or downloading attachments), using formal language and references to official documents.
Attachments: Malicious files (e.g., .rar, .pdf, .html) and renamed files to bypass filters.
Phishing Links: Redirect to fake login pages or forms that collect sensitive data.

Indicators of Compromise (IOCs):

Domain Spoofing: This domain is made to look like real government websites but is hosted on netlify.app, a free hosting service.

Non-functional Links: Placeholder links (https[:]// briefcase, https[:]// remove) highlight a lack of legitimacy.

Attachment Mismatch: The email references an attachment, but the link leads to a questionable page instead of the file.

Content Encoding: The email content is encoded, making it harder to read easily.

Source: BGD e-GOV CIRT

Detection Rules:

Suricata Rules to detect phishing URLs and IPs.
Sigma Rules to identify suspicious IP connections and phishing links in network logs.

Note:
These rules help technical teams use Indicators of Compromise (IoCs) for threat hunting and detection. Customize them to match your SIEM and security tools. Always review and adjust these rules to suit your environment and security needs.

Mitigation Actions:

Be Alert: Avoid clicking unknown links and downloading suspicious attachments.
Report Phishing: Forward suspicious emails to IT/security teams.
Protect Credentials: Never share login details through email; enable multi-factor authentication.
Training: Stay informed on phishing tactics and red flags.
Monitoring: Use IOCs, Suricata, and Sigma rules for threat detection and continuous system monitoring.
System Security: Patch systems, apply the principle of least privilege, and use email filtering.
Incident Response: Ensure a tested plan and report incidents to BGD e-GOV CIRT.

These recommendations are aimed at reducing the risk of successful phishing attacks through vigilance, timely detection, and system security measures.

Alert! Fake Crowdstrike Recruitment Emails Spread XMRig cryptominer

Check Also

AI ENGINEERING HACKATHON

Register Now
AI Engineering Hackathon: Registration Open

On April 19, 2025 (Saturday), Brain Station 23 and Poridhi are jointly going to organize …

Leave a Reply

Your email address will not be published. Required fields are marked *