Darcula could allow campaigns to be built and managed.
Operators of the darcula phishing-as-a-service have been evaluating an updated iteration which has been improved to enable website spoofing via link inputs on its page builder.
Named "darcula-suite 3.0", a Netcraft analysis said it could allow for clones of any website to be created through a browser automation tool that facilitates HTML and asset exports from linked webpages.
Reported by SC US, aside from including administrator and performance dashboards that allow phishing campaign management and performance visualizations, respectively, darcula-suite 3.0 also allows notifications via Telegram.
"While the fraud hallmarks of bad grammar and spelling errors continue to decline as generative AI becomes more prevalent among bad actors, offers and messages that are 'too good to be true' or require urgent action should continue to be treated with significant skepticism," said researchers.
Written by
Dan Raywood is a B2B journalist with 25 years of experience, including covering cybersecurity for the past 17 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes.
He has spoken at events including 44CON, Infosecurity Europe, RANT Forum, BSides Scotland, Steelcon and the National Cyber Security Show, and served as editor of SC Media UK, Infosecurity Magazine and IT Security Guru. He was also an analyst with 451 Research and a product marketing lead at Tenable.