Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Sniper Dz Fuels Massive Phishing Attacks

September 24, 2024
Reading Time: 2 mins read
in Alerts

Over the past year, over 140,000 phishing websites have been linked to the Sniper Dz phishing-as-a-service (PhaaS) platform, demonstrating its widespread use by cybercriminals. The platform offers a user-friendly admin panel that provides phishers with a catalog of phishing page templates. Users can either host these templates on Sniper Dz’s own infrastructure or download them to host on their own servers. Notably, Sniper Dz provides these services for free, which has contributed to its rapid adoption by threat actors looking to conduct credential theft campaigns.

One of the platform’s key features is its ability to exfiltrate stolen credentials back to the operators, a technique known as “double theft.” Phishers using Sniper Dz benefit from this setup, as the platform collects the credentials they steal, increasing the value of the service. The platform also operates a Telegram channel with more than 7,000 subscribers, where users share information and tools related to phishing attacks. This enables aspiring cybercriminals with limited technical skills to easily enter the world of phishing, furthering the reach of these cyber threats.

Sniper Dz also employs several evasion techniques to avoid detection by security systems. Phishing pages hosted on Sniper Dz’s infrastructure are hidden behind legitimate proxy servers, making it harder for security tools to trace the attack back to its origin. Additionally, the platform allows users to convert phishing templates to Blogger formats, which can then be hosted on Blogspot domains, further expanding the attack surface. These techniques make it increasingly difficult for defenders to combat phishing campaigns launched through Sniper Dz.

The impact of Sniper Dz is compounded by other phishing tactics, such as those revealed by Cisco Talos, which highlight the exploitation of poorly validated web forms for phishing attacks. Attackers abuse backend email systems to distribute malicious links and carry out phishing campaigns that bypass spam filters. This growing trend of phishing-as-a-service platforms and email-based attacks underscores the increasing sophistication and scale of cybercrime operations targeting unsuspecting internet users.

 

Reference:

  • Investigating Infrastructure and Tactics of Phishing-as-a-Service Platform Sniper Dz
Tags: Cyber AlertsCyber Alerts 2024Cyber threatsphishing-as-a-service (PhaaS)September 2024Sniper Dz
ADVERTISEMENT

Related Posts

Redis Use After Free Bug Enables RCE

Google Chrome RCE Flaw Details Leak

October 8, 2025
Redis Use After Free Bug Enables RCE

Redis Use After Free Bug Enables RCE

October 8, 2025
Redis Use After Free Bug Enables RCE

Microsoft Ties Storm 1175 To Medusa

October 8, 2025
XWorm 6.0 Returns With New Plugins

XWorm 6.0 Returns With New Plugins

October 7, 2025
XWorm 6.0 Returns With New Plugins

Rhadamanthys Stealer Evolves Again

October 7, 2025
XWorm 6.0 Returns With New Plugins

Steam And Microsoft Warn Of Unity Flaw

October 7, 2025

Latest Alerts

Microsoft Ties Storm 1175 To Medusa

Google Chrome RCE Flaw Details Leak

Redis Use After Free Bug Enables RCE

XWorm 6.0 Returns With New Plugins

Steam And Microsoft Warn Of Unity Flaw

Rhadamanthys Stealer Evolves Again

Subscribe to our newsletter

    Latest Incidents

    DraftKings Warns Of Account Breaches

    Doctors Imaging Data Breach Hits 171K

    Salesforce Refuses To Pay Ransom

    Red Hat Data Breach Escalates Further

    FC Barcelona Instagram Hacked By Scam

    Threat Actors Claim Huawei Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial