Why Nostr? What is Njump?
2024-10-12 10:34:13
in reply to

Michał "rysiek" Woźniak · 🇺🇦 on Nostr: yeah. The attack used a lookalike domain, I checked when was it created and when was ...

yeah.

The attack used a lookalike domain, I checked when was it created and when was the certificate issued.

I also had one of the attacker's VM's IP address, where the phishing site was hosted.

That allowed me to check the logs and see if it pops up earlier. And lo and behold, there it was, quite a lot at some point. Probably when they were building the phishing site and pulling our resources for it.

It was very satisfying to see all this prep work go down the drain. 😉
Author Public Key
npub1afml2kzwamqxppl50207sf5jwgl3l6ugn6hnuwugtxt7ctnhdtkqjq5gp4