Event JSON
{
"id": "3c37db941a498a39fa5d97595fae1a68a8d49885005900022444e011f4323e62",
"pubkey": "662250ce4d037de109a64a6a0230f7899f922b76346388b3e7ca06fe9490358d",
"created_at": 1741958316,
"kind": 1,
"tags": [
[
"imeta",
"url https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/160/976/012/619/024/original/7660ca7800fa00a1.png",
"m image/png"
],
[
"proxy",
"https://infosec.exchange/@briankrebs/114160980257383048",
"web"
],
[
"proxy",
"https://infosec.exchange/users/briankrebs/statuses/114160980257383048",
"activitypub"
],
[
"L",
"pink.momostr"
],
[
"l",
"pink.momostr.activitypub:https://infosec.exchange/users/briankrebs/statuses/114160980257383048",
"pink.momostr"
],
[
"-"
]
],
"content": "Called it. Wrote this back in Sept. 2024, about a clever Windows Powershell phishing scam that was targeting developers at the time. It uses a fake CAPTCHA that asks visitors to distinguish themselves from bots by pressing a combination of keyboard keys that causes Microsoft Windows to download password-stealing malware. Everyone said, bah, devs will never fall for this. Maybe, I said, but your average user would for sure.\n\nJudging from the number of recent media reports, it appears this one is pretty widespread at the moment.\n\nhttps://krebsonsecurity.com/2024/09/this-windows-powershell-phish-has-scary-potential/\nhttps://media.infosec.exchange/infosec.exchange/media_attachments/files/114/160/976/012/619/024/original/7660ca7800fa00a1.png\n",
"sig": "bb69fc30040893c814d3f247b1d8167da091588b20b5f1d5ed84786817d8c5cbde0a0119cbbb3828597f80072af7e7aa4b3e8882da4182ddc20e736b4a7ec90c"
}