We are proud to announce a groundbreaking achievement in cybersecurity, as our team has developed an innovative method to detect and list one of the largest phishing campaigns ever identified. This extensive campaign is targeting postal services across multiple countries, including instances where two or more postal companies operate within the same nation.
With over 50+ global postal companies targeted and thousands of domains being registered daily to facilitate these phishing operations, this campaign is one of unprecedented scale. A significant portion of these domains are being registered under the .top registry.
Also see: ICANN Issued Breach Notice to .TOP Registry After URLAbuse Complaint
Today, we are excited to reveal that we are the only feed capable of detecting and tracking this massive phishing operation in real-time. Our URLAbuse feed has been enhanced with cutting-edge automated detection capabilities, including advanced features like time-stamped screenshots and fully qualified domain names (FQDN) captured by our postal phishing detection bot.
In the initial phase, only .Top domains will be listed in our feed, with plans to expand coverage to additional TLDs in the second phase. This upgrade transforms screenshots into far more than simple images—they become comprehensive forensic tools for tracking and combating phishing.
For the first 10 days following this update, results will be exclusively available on our main feed at urlabuse.com . They will not appear in the public dumps at https://urlabuse.com/public/html/doc.html.
Stay tuned as we continue to lead the fight against phishing on a global scale, providing invaluable insights and tools for the cybersecurity community.
For any inquiries, please contact us at team[at]urlabuse.com.
Add new comment