The company denied that the fake WhatsApp page and others linked servers have anything to do with them. But we found certs signed by the company and a login page that displays the company logo and the logo of their spyware product.
Here's a screenshot of the WhatsApp phishing page. If target clicked through a few screens, they'd download a malicious iPhone MDM profile designed to collect phone ID and IMEI, among other data.

It's unclear what the next step in the attack was, or who the targets were.
You can follow @lorenzofb.
Tip: mention @twtextapp on a Twitter thread with the keyword “unroll” to get a link to it.

Latest Threads Unrolled:

By continuing to use the site, you are consenting to the use of cookies as explained in our Cookie Policy to improve your experience.