paquita.masto.host is one of the many independent Mastodon servers you can use to participate in the fediverse.
Esta es una instancia feminista, antifascista, antirracista y LGTBIQ-friendly que lucha activamente contra el acoso a sus usuarios y usuarias en todas sus formas, explícitas e implícitas.

Administered by:

Server stats:

316
active users

#labhost

0 posts0 participants0 posts today
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/FBI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FBI</span></a> shares massive list of 42,000 <a href="https://mastodon.thenewoil.org/tags/LabHost" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LabHost</span></a> <a href="https://mastodon.thenewoil.org/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a> domains</p><p><a href="https://www.bleepingcomputer.com/news/security/fbi-shares-massive-list-of-42-000-labhost-phishing-domains/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/fbi-shares-massive-list-of-42-000-labhost-phishing-domains/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
gtbarry<p>Police take down $249-a-month global phishing service used by 2,000 hackers</p><p>Law enforcement officials in 19 countries have shut down an online platform that earned at least $1 million by selling phishing kits to cybercriminals, helping them launch attacks on tens of thousands of people worldwide. </p><p><a href="https://mastodon.social/tags/LabHost" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LabHost</span></a> <a href="https://mastodon.social/tags/Met" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Met</span></a> <a href="https://mastodon.social/tags/police" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>police</span></a> <a href="https://mastodon.social/tags/Europol" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Europol</span></a> <a href="https://mastodon.social/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a> <a href="https://mastodon.social/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.social/tags/hackers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hackers</span></a> <a href="https://mastodon.social/tags/Hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacking</span></a></p><p><a href="https://www.cnn.com/2024/04/18/tech/labhost-cybercrime-phishing-arrests/index.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">cnn.com/2024/04/18/tech/labhos</span><span class="invisible">t-cybercrime-phishing-arrests/index.html</span></a></p>
Matt Willemsen<p>Phishing-as-a-service platform LabHost shut down in global operation<br><a href="https://therecord.media/phishing-platform-labhost-shutdown-europol" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">therecord.media/phishing-platf</span><span class="invisible">orm-labhost-shutdown-europol</span></a> <a href="https://mastodon.social/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.social/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a> <a href="https://mastodon.social/tags/LabHost" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LabHost</span></a> <a href="https://mastodon.social/tags/seized" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>seized</span></a> <a href="https://mastodon.social/tags/GlobalOperation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GlobalOperation</span></a></p>
Not Simon<p>Phishing-as-a-Service (PhaaS) provider LabHost was taken down in an international law enforcement operation on 18 April 2024. <strong>Chainalysis</strong> maps out LabHost's on-chain activity and use of cryptocurrency. This includes the likely payment of monthly fees by cybercriminals (for LabHost's phishing tools) to identified LabHost cryptocurrency wallets. "LabHost then sent most of those funds to a few mainstream exchanges, presumably to be cashed out, as well as to a popular mixer, likely to launder the funds and obfuscate their origins." LabHost also sent funds to a payment processor (merchant services provider) and an Infrastructure-as-a-Service provider (while not identified, Chainalysis alludes to other criminal organizations using these services for web hosting, email tools, proxy services, etc.). There are links to iSpoof, another illicit provider of tools used for fraud that was shut down by the Metropolitan Police and other law enforcement agencies in 2022. 🔗 <a href="https://www.chainalysis.com/blog/labhost-disruption-phishing-as-a-service/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">chainalysis.com/blog/labhost-d</span><span class="invisible">isruption-phishing-as-a-service/</span></a></p><p><a href="https://infosec.exchange/tags/LabHost" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LabHost</span></a> <a href="https://infosec.exchange/tags/PhaaS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PhaaS</span></a> <a href="https://infosec.exchange/tags/iSpoof" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iSpoof</span></a> <a href="https://infosec.exchange/tags/blockchain" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blockchain</span></a> <a href="https://infosec.exchange/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://infosec.exchange/tags/moneylaundering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>moneylaundering</span></a></p>
Not Simon<p><strong>Group-IB</strong> also participated in the global takdown operation of LabHost Phishing-as-a-Service provider, a sophisticated criminal network offering stolen credit card data for sale. They dive into the operations of LabHost and its subsidiary, LabCVV. LabHost stands out due to its unique business model, which includes not only phishing services but also avenues for monetizing stolen credit cards and banking credentials through services like LabRefund. Grou-IB performs a source code analysis of the phishing template, analysis of cybercrime communications on Telegram and the dark web, of LabSend spam management service, and of LabCVV Card Shop. IOC provided 🔗 <a href="https://www.group-ib.com/blog/labhost-operation/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">group-ib.com/blog/labhost-oper</span><span class="invisible">ation/</span></a></p><p><a href="https://infosec.exchange/tags/LabHost" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LabHost</span></a> <a href="https://infosec.exchange/tags/PhaaS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PhaaS</span></a> <a href="https://infosec.exchange/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> <a href="https://infosec.exchange/tags/IOC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IOC</span></a></p>
Graham Cluley<p>Seems to me that a new role has emerged for those who want a career in cybersecurity: Cybercriminal Troll.</p><p>Police around the world are making videos to scare the bejeezus out of scammers and hackers, revealing in a jaunty way how they are about to be busted.</p><p>Nice one Met Police.</p><p><a href="https://mastodon.green/tags/LabHost" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LabHost</span></a> <a href="https://mastodon.green/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.green/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.green/tags/scam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>scam</span></a> <a href="https://mastodon.green/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a></p>
Not Simon<p><strong>Trend Micro</strong> reports that on Thursday 18 April 2024, the UK’s Metropolitan Police Service, along with fellow UK and international law enforcement, and several trusted private industry partners, conducted an operation that succeeded in taking down the Phishing-as-a-Service (PhaaS) provider LabHost. This move was also timed to coincide with a number of key arrests related to this operation. Trend Micro briefly explains what LabHost was, how it affected its victims, and the impact of this law enforcement operation. 🔗 <a href="https://www.trendmicro.com/en_us/research/24/d/labhost-takedown.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">trendmicro.com/en_us/research/</span><span class="invisible">24/d/labhost-takedown.html</span></a></p><p><a href="https://infosec.exchange/tags/LabHost" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LabHost</span></a> <a href="https://infosec.exchange/tags/PhaaS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PhaaS</span></a> <a href="https://infosec.exchange/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a></p>