Tuesday, March 4, 2025
HomeComputer SecurityFBI Warns that Hackers use Secure HTTPS Websites to Trick Users and...

FBI Warns that Hackers use Secure HTTPS Websites to Trick Users and to Steal Sensitive Logins

Published on

SIEM as a Service

Follow Us on Google News

FBI issued a warning that threat actors use secure HTTPS websites to trick the users and to acquire sensitive login credentials, banking information and other personal details.

Internet users tend to believe that if the padlock is present “look for the lock,” then the Website is legitimate and safe. However, in reality, the SSL certificates don’t tell you anything about site legitimacy, the SSL/TLS certificates are to encrypt the connection between the browser and the server, which avoids intrusion from hackers.

“Unfortunately, cybercriminals are banking on the public’s trust of “https” and the lock icon. They are more frequently incorporating website certificates—third-party verification that a site is secure—when they send potential victims emails that imitate trustworthy companies or email contacts,” states FBI.

According to PhishLabs alarming report in the third quarter of 2018, around 49% of all phishing sites use SSL/TLS certificates. That’s an increase from 25% in 2017 and 35% in the second quarter of 2018.

With SSL certificates, there are of different types.

Extended Validation(EV): Which is quite expensive and requires some, and the company behind the TLS certificate should be verified. The EV certificates are the one displays the company name in the browser address bar.

Organization Validated (OV): This type of certificate verify the ownership of the domain and also the organization’s information, it is also difficult for cyber attackers to acquire to the certificate.

Domain validation (DV): Easy to acquire, you only need to prove the ownership of the domain and the authorities like Let’s Encrypt providing the certificate for free. Hackers mainly exploit DV type of certificates.

Threat actors using abused Code-signing certificate from reputable companies as a layer of obfuscation in distributing malicious payloads.

Certificate Transparency aims to remedy these certificate-based threats; it helps in Earlier detection, Faster mitigation, and better oversight.

There are several ways to analyze the Website is legitimate or not; the first and the most recommended method is to check online page scanners.

Cybercriminals are using various sophisticated techniques to fool online users to drop malware and other cyber threats to cause unbearable damages. So beware of the malicious Website, don’t blindly open the Website and check the website safety before opening it.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Update Alert: Google Warns of Critical Android Vulnerabilities Under Exploit

Google’s March 2025 Android Security Bulletin has unveiled two critical vulnerabilities—CVE-2024-43093 and CVE-2024-50302—currently under...

BigAnt Server 0-Day Vulnerability Lets Attackers Run Malicious Code Remotely

A critical vulnerability in BigAntSoft's enterprise chat server software has exposed ~50 internet-facing systems...

Bubba AI, Inc. is Launching Comp AI to Help 100,000 Startups Get SOC 2 Compliant by 2032.

With the growing importance of security compliance for startups, more companies are seeking to...

IBM Storage Virtualize Flaws Allow Remote Code Execution

Two critical security flaws in IBM Storage Virtualize products could enable attackers to bypass...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Update Alert: Google Warns of Critical Android Vulnerabilities Under Exploit

Google’s March 2025 Android Security Bulletin has unveiled two critical vulnerabilities—CVE-2024-43093 and CVE-2024-50302—currently under...

BigAnt Server 0-Day Vulnerability Lets Attackers Run Malicious Code Remotely

A critical vulnerability in BigAntSoft's enterprise chat server software has exposed ~50 internet-facing systems...

IBM Storage Virtualize Flaws Allow Remote Code Execution

Two critical security flaws in IBM Storage Virtualize products could enable attackers to bypass...