<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Phishing on bubka hacks stuff</title><link>https://hexpysya.github.io/tags/phishing/</link><description>Recent content in Phishing on bubka hacks stuff</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><lastBuildDate>Tue, 14 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://hexpysya.github.io/tags/phishing/index.xml" rel="self" type="application/rss+xml"/><item><title>LD-Lumma Stealer - DLL Side-Loading via Click Fix Phishing</title><link>https://hexpysya.github.io/blue_team/ld-lumma-stealer---dll-side-loading-via-click-fix-phishing/</link><pubDate>Tue, 14 Apr 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/blue_team/ld-lumma-stealer---dll-side-loading-via-click-fix-phishing/</guid><description>A Click Fix phishing email impersonating Microsoft lured Dylan into visiting a malicious site, which executed a disguised PowerShell command launching mshta.exe to download Lumma Stealer payload from overcoatpassably.shop. The host was contained before confirmed data exfiltration.</description></item><item><title>LD-Malicious Macro Executed</title><link>https://hexpysya.github.io/blue_team/ld-malicious-macro-has-been-executed/</link><pubDate>Tue, 14 Apr 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/blue_team/ld-malicious-macro-has-been-executed/</guid><description>A phishing email from &lt;a href="mailto:jake.admin@cybercommunity.info" &gt;jake.admin@cybercommunity.info&lt;/a&gt; delivered a ZIP-archived Word macro document, which executed a PowerShell downloader fetching messbox.exe from greyhathacker.net. The host Jayne was contained after execution was confirmed.</description></item><item><title>ELK-BumbleBee - GOLD CABIN</title><link>https://hexpysya.github.io/blue_team/elk-bumblebee---gold-cabin/</link><pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/blue_team/elk-bumblebee---gold-cabin/</guid><description>An employee at CompliantSecure received a phishing email from emkei.cz, downloaded a malicious ISO containing BumbleBee loader 23.dll, which established C2 to 3.68.97.124 and injected into ImagingDevices.exe, dumped LSASS credentials, laterally moved to DC01 via PsExec using markw credentials, staged AdFind and AnyDesk, created sql_admin backdoor account, moved to FileServer01 and Support01, exfiltrated archived share data, and deployed Conti ransomware dropping R3ADM3.txt ransom notes.</description></item><item><title>ELK-Black Basta</title><link>https://hexpysya.github.io/blue_team/elk-black-basta/</link><pubDate>Thu, 09 Apr 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/blue_team/elk-black-basta/</guid><description>A finance employee opened a malicious Excel macro from a drive-by download, which executed a VBS dropper, loaded WindowsUpdaterFX.dll via regsvr32, established persistence, dropped Pancake.jpg.exe as a C2 backdoor, performed internal reconnaissance, laterally moved to a domain controller via PsExec using compromised credentials, exfiltrated client data to MEGA via rclone, deleted shadow copies, and deployed BlackBasta ransomware.</description></item><item><title>CDEF-HawkEye</title><link>https://hexpysya.github.io/investigations/cdef-hawkeye/</link><pubDate>Wed, 25 Mar 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/investigations/cdef-hawkeye/</guid><description>A victim host downloaded a HawkEye Keylogger dropper via HTTP, which established persistence, periodically checked the external IP via bot.whatismyipaddress.com, and exfiltrated harvested credentials every 10 minutes over SMTP.</description></item><item><title>HTB-Liberty</title><link>https://hexpysya.github.io/investigations/htb-liberty/</link><pubDate>Wed, 25 Mar 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/investigations/htb-liberty/</guid><description>Password spraying led to domain account compromise, followed by NetNTLM hash theft via a malicious .url file, RDP access, data exfiltration to a C2 server, and PSWA backdoor installation for persistence.</description></item><item><title>LD-Deceptive Mail Detected</title><link>https://hexpysya.github.io/blue_team/ld-phishing-alert/</link><pubDate>Tue, 17 Mar 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/blue_team/ld-phishing-alert/</guid><description>A phishing email with a password-protected ZIP delivered AsyncRAT via a SILENTBUILDER dropper. The victim executed the payload, establishing an active C2 channel and triggering full host reconnaissance before containment.</description></item><item><title>LD-Malicious Attachment Detected</title><link>https://hexpysya.github.io/blue_team/ld-malicious-attachment-detected---phishing-alert/</link><pubDate>Mon, 16 Mar 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/blue_team/ld-malicious-attachment-detected---phishing-alert/</guid><description>Investigation of a phishing email delivering a malicious Excel attachment exploiting CVE-2017-11882, leading to payload download and privilege escalation via JuicyPotato</description></item><item><title>THM-Phishing Unfolding</title><link>https://hexpysya.github.io/blue_team/thm-phishing-unfolding/</link><pubDate>Mon, 16 Mar 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/blue_team/thm-phishing-unfolding/</guid><description/></item><item><title>THM-Phishing</title><link>https://hexpysya.github.io/blue_team/thm-phishing/</link><pubDate>Tue, 10 Mar 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/blue_team/thm-phishing/</guid><description>Three phishing campaigns were identified across four alerts: a legitimate HR onboarding email (false positive), a fake Amazon delivery notification whose bit.ly link was blocked by the firewall, and a Microsoft account spoofing email from m1crosoftsupport.co whose link was allowed through the firewall</description></item><item><title>HTB-A Call from the Museum</title><link>https://hexpysya.github.io/investigations/htb-a-call-from-the-museum/</link><pubDate>Sat, 07 Mar 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/investigations/htb-a-call-from-the-museum/</guid><description>A phishing email with a password-protected ZIP delivered an LNK file that executed an obfuscated PowerShell stager — collecting system fingerprint data, checking in to a C2, and fetching a next-stage implant using hardcoded credentials. A decoy PDF was opened simultaneously to distract the victim.</description></item></channel></rss>