Search This Blog

Powered by Blogger.

Blog Archive

Labels

Footer About

Footer About

Labels

Showing posts with label Account. Show all posts

X Faces Global Outage Twice in Hours, Thousands of Users Report Access Issues

 

Hours apart, fresh disruptions hit X - once called Twitter - as glitches blocked entry for countless people across regions. Though brief, these lapses fuel unease over stability under Musk’s control, following a trail of prior breakdowns just lately. A pattern forms without needing bold claims: service falters too often now. 

Early afternoon saw service disruptions start across the U.S., per Downdetector figures, hitting a high point near 3:50 PM EST with about 25,000 affected individuals. Later that evening, roughly at 8:00 PM EST, another wave emerged - over 6,000 people then faced login difficulties. 

Problems surfaced across multiple areas, according to user feedback. Close to fifty percent struggled just to open the app on their phones. Some saw broken features within the feed or site navigation failing mid-use. Interruptions popped up globally - not confined by borders - hitting people in both UK cities and Indian towns alike. 

Fewer incidents appeared out of India at first, yet the next wave brought a clear rise - more than six hundred alerts came through by dawn. That same split trend showed up elsewhere, too: data from StatusGator backed the idea of two separate waves hitting at different times. 

Even though the problem spread widely, X stayed silent on what triggered it. Still, users asking about glitches got answers from Grok, its built-in chat assistant. A hiccup in systems stopped feeds from refreshing, according to the bot. Pages showed errors instead of content during the episode. Past patterns hint at fast fixes when similar faults occurred. Resolution could come without delay, the machine implied. 

Frustration spread through user communities when services went down unexpectedly. Online spaces filled quickly as people shared what they encountered during the downtime. Some saw pages fail to load halfway; others found nothing loaded at all. Reports pointed to repeated problems over recent weeks, not just isolated moments. 

A pattern emerged - not sudden failure, but lingering instability across visits. Still reeling from another outage, X faces mounting pressure as service disruptions chip away at reliability worldwide. A fresh breakdown underscores persistent weaknesses in its operational backbone. 

With each failure, trust erodes just a bit more among users who depend on steady access. Problems aren’t isolated - they ripple through regions where uptime matters most. Behind the scenes, fixes appear slow, inconsistent, or both. What looked like progress now seems fragile under repeated strain.

W3LL Store: Unmasking a Covert Phishing Operation Targeting 8,000+ Microsoft 365 Accounts

 

A hitherto undisclosed "phishing empire" has been identified in a series of cyber attacks targeting Microsoft 365 business email accounts spanning six years. 

According to a report from cybersecurity firm Group-IB, the threat actor established an underground market called W3LL Store, catering to a closed community of around 500 threat actors. This market offered a custom phishing kit called W3LL Panel, specifically designed to bypass Multi-Factor Authentication (MFA), alongside 16 other specialized tools for Business Email Compromise (BEC) attacks.

Between October 2022 and July 2023, the phishing infrastructure is estimated to have aimed at over 56,000 corporate Microsoft 365 accounts,  compromising at least 8,000 of them. The majority of the attacks were concentrated in countries including the U.S., the U.K., Australia, Germany, Canada, France, the Netherlands, Switzerland, and Italy. The operators of this operation reportedly reaped approximately $500,000 in illegal gains.

Various sectors fell victim to this phishing campaign, notably manufacturing, IT, consulting, financial services, healthcare, and legal services. Group-IB pinpointed almost 850 distinct phishing websites associated with the W3LL Panel during the same timeframe.

The Singapore-based cybersecurity company has characterized W3LL as a comprehensive phishing tool that offers an array of services, encompassing customized phishing tools, mailing lists, and access to compromised servers. This underscores the growing prevalence of phishing-as-a-service (PhaaS) platforms.

The threat actor responsible for this kit has been active since 2017, initially focusing on creating tailored software for bulk email spam (referred to as PunnySender and W3LL Sender) before shifting their attention towards developing phishing tools for infiltrating corporate email accounts.

A key element of W3LL's arsenal is an adversary-in-the-middle (AiTM) phishing kit, capable of evading multi-factor authentication (MFA) protections. It is available for purchase at $500 for a three-month subscription, followed by a monthly fee of $150. The panel not only harvests credentials but also includes anti-bot features to bypass automated web content scanners, prolonging the lifespan of their phishing and malware campaigns.

The W3LL Store extends a 70/30 split on commissions earned through its reseller program to PhaaS affiliates, along with a 10% "referral bonus" for bringing in other trusted parties. To prevent unauthorized distribution or resale, each copy of the panel requires a license-based activation.

BEC attacks employing the W3LL phishing kit involve a preparatory phase to verify email addresses using an auxiliary utility known as LOMPAT, followed by the delivery of phishing messages. Victims who interact with the deceptive link or attachment are directed through an anti-bot script to filter out unauthorized visitors, subsequently landing on the phishing page via a redirect chain employing AiTM tactics to extract credentials and session cookies.

With this access, the threat actor proceeds to log into the target's Microsoft 365 account without triggering MFA, utilizing a custom tool called CONTOOL for automated account discovery. This enables the extraction of emails, phone numbers, and other sensitive information.

Noteworthy tactics employed by the malware author include using Hastebin, a file-sharing service, to store stolen session cookies, and utilizing platforms like Telegram and email for exfiltrating the credentials to criminal actors.

This disclosure comes shortly after Microsoft's warning regarding the proliferation of AiTM techniques through PhaaS platforms, such as EvilGinx, Modlishka, Muraena, EvilProxy, and Greatness, which facilitate unauthorized access to privileged systems at scale without the need for re-authentication.

"What really makes W3LL Store and its products stand out from other underground markets is the fact that W3LL created not just a marketplace but a complex phishing ecosystem with a fully compatible custom toolset that covers almost entire killchain of BEC and can be used by cybercriminals of all technical skill levels," Group-IB's Anton Ushakov said.

"The growing demand for phishing tools has created a thriving underground market, attracting an increasing number of vendors. This competition drives continuous innovation among phishing developers, who seek to enhance the efficiency of their malicious tools through new features and approaches to their criminal operations."