mitchellkrogza / phishing

Central Repository for Adding Domains / Links to the Phishing.Database project - https://github.com/mitchellkrogza/Phishing.Database/
49 stars 212 forks source link

add squad.cl to add-wildcard-domain #473

Closed g0d33p3rsec closed 3 months ago

g0d33p3rsec commented 3 months ago

Phishing Domain/URL/IP(s):

https://squad.cl/M3M0cTZMNmg5RTFuOEE=
https://squad.cl/M3g0QjdKMWc0VzdvOVQ=
https://squad.cl/M2c0RTYxOE00azlNOEw=
https://squad.cl/MzEzbTB5MHQwbTZvMVU=
https://squad.cl/M1gySTl0OWQ4cDlDOE8= 
https://squad.cl/M1AzUjBnMjY1cTcxOUw=
https://squad.cl/Mzc0UjN0NG05RDlPM0g=
https://squad.cl/Mzk0ajNhMEswQTdtMng=

Impersonated domain

https://www.tut.ac.za/
https://www.ufh.ac.za/
https://www.ufs.ac.za/
https://www.wsu.ac.za/
https://www.microsoft365.com/
https://www.tiktok.com/

Describe the issue

This domain is now hosting the phishing kit that previously at benyex.cl (#468), lebomashilo[.]co[.]za (https://github.com/mitchellkrogza/phishing/pull/462), havenhills[.]za[.]com (https://github.com/mitchellkrogza/phishing/pull/459), intrinsicisle[.]za[.]com (https://github.com/mitchellkrogza/phishing/pull/452), reluzformaturas[.]com[.]br (https://github.com/mitchellkrogza/phishing/pull/435), abcmueblesbogota[.]com (https://github.com/mitchellkrogza/phishing/pull/432), ergoterapiacaribu[.]ch (https://github.com/mitchellkrogza/phishing/pull/426), ijconnects[.]com (https://github.com/mitchellkrogza/phishing/pull/421), cbcaps[.]shop (https://github.com/mitchellkrogza/phishing/pull/417), bersowir[.]org (https://github.com/mitchellkrogza/phishing/pull/416), brunotasso[.]com[.]br (https://github.com/mitchellkrogza/phishing/pull/413), wisbechguide[.]uk (https://github.com/mitchellkrogza/phishing/pull/408), pescacancun[.]com (https://github.com/mitchellkrogza/phishing/pull/406), bkengineersindia[.]com (https://github.com/mitchellkrogza/phishing/pull/405), englishplusmore[.]com (https://github.com/mitchellkrogza/phishing/pull/404), carnesboinobre[.]com[.]br (https://github.com/mitchellkrogza/phishing/pull/398), technowide[.]com[.]tr (https://github.com/mitchellkrogza/phishing/pull/396), jestertunes[.]com (https://github.com/mitchellkrogza/phishing/pull/393), safecartusa[.]com (https://github.com/mitchellkrogza/phishing/pull/391), foreverfarley[.]com (https://github.com/mitchellkrogza/phishing/pull/387), azezieldraconous[.]com (https://github.com/mitchellkrogza/phishing/pull/381), westernautomobileassembly[.]com (https://github.com/mitchellkrogza/phishing/pull/376) , littleswanaircon[.]com[.]sg (https://github.com/mitchellkrogza/phishing/pull/372), iwan2travel[.]com (https://github.com/mitchellkrogza/phishing/pull/370), applesforfred[.]com (https://github.com/mitchellkrogza/phishing/pull/369), theaerie[.]ca (https://github.com/mitchellkrogza/phishing/pull/367), nico[.]sa (https://github.com/mitchellkrogza/phishing/pull/366), ajstelecom[.]com[.]mx (https://github.com/mitchellkrogza/phishing/pull/362), and others (more than 130 domains since 2021).

Related external source

Screenshot

Click to expand ![image](https://github.com/user-attachments/assets/f462e89a-3f02-4443-a1b0-8943fc80bf1d) ![image](https://github.com/user-attachments/assets/a5e2edab-361f-4630-b4da-e72e133e86cc) ![image](https://github.com/user-attachments/assets/dffa9f57-dd4e-4e18-8ee0-d95888029e43) ![image](https://github.com/user-attachments/assets/ae9b393c-b945-4c89-97eb-89a3cff84e2b) ![image](https://github.com/user-attachments/assets/ecdae920-a9b8-460b-8d1b-53164b5bcf4b) ![image](https://github.com/user-attachments/assets/cb0d493f-b89e-4c4a-b9ee-0d9085ccdab7) ![image](https://github.com/user-attachments/assets/14fce4d6-1dd9-46a4-8027-4e0ba6c408ab) ![image](https://github.com/user-attachments/assets/41c9d699-ea19-4d19-a420-ed798b062ec4)