Bolster, a company that provides multi-channel protection against phishing, has reported that its CheckPhish site, known for being one of the top phishing and scam detection sites on the web, has seen an increase in malicious activities. Within the first 24 hours following the CrowdStrike software incident, more than 40 phishing and fraudulent lookalike domains were discovered.
Bolster has already identified various types of phishing scams, including malicious domains offering technical or legal support, fake CrowdStrike crypto tokens, and sites that are still in the process of being built. The CheckPhish community has also compiled a growing list of ‘CrowdStrike’ typo squats.
For more such updates follow us on Google News ITsecuritywire News. Please subscribe to our Newsletter for more updates.