

“Attackers have and will continue to use cutting-edge Researchers observed almost 400,000 letters, a 100,000 increase than in This year, IPFS phishing began to grow in scale, reaching more than 24,000īusiest month in terms of IPFS phishing activity. Observed two: 15,000 IPFS phishing letters-a-day for most of the time. Targeting different users, sometimes even in dozens of campaigns. This way, one link can be used in several phishing campaigns Top of the phishing form and email address entered into the login field willĬhange too. What is interesting about this technique is where the HTML pagesĬontains the recipient’s email address. Phishing content the purpose of which is to obtain the victim’s account loginĪnd password. As for now, the campaign isĬontaining IPFS links are hardly ever original as they contain the typical IPFS files were first appeared in October 2022. Its owners to delete it, but the method will probably never work withĪttempt to combat IPFS phishing by regularly deleting links to fraudulentĭeletion of links at gateway level does not always happen as quickly as theīlocking of a phishing website, cloud form, or document.

If somebody wants a file to disappear from the system completely, they can urge Phishing letters dispatched to would-be victims.ĭistributed file system allows attackers to cut back on phishing page hosting costs.īesides, it’s impossible to delete files uploaded by third parties from IPFS. The scammers also include file access links via a gateway into They place HTML filesĬontaining a phishing form in IPFS and use gateways as proxies, so that victimsĬan open the file, whether or not they are running an IPFS client on theirĭevices.

To view the files residing in IPFS freely without installing any software, theĪctively using IPFS for email phishing attacks. By default, uploading orĭownloading a file to IPFS requires special software (IPFS client). It to IPFS and downloaded directly from that computer. The file itself resides on the computer of the user who had “uploaded” Unlike centralized systems, IPFS usesĪddressing performed according to unique content identifiers (CID), and notįile paths. Users around the world to exchange files. This technique, used for both ongoing massĪnd targeted phishing campaigns, saw almost 400,000 phishing emails detected inįile System) is a peer-to-peer distributed file system enabling

To be one of the cutting-edge technologies of Web 3.0, to target companiesīy Kaspersky, researchers reveal how attackers are putting phishing HTML files Using this safe, decentralized and reliable way for file distribution, considered Woburn, MA – MaKaspersky experts have discovered how cybercriminalsĭistribution in email phishing attacks.
