<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Swapneel Patnekar, Author at DNS Security &amp; Threat Intelligence Blog | Shreshta</title>
	<atom:link href="https://shreshtait.com/blog/author/pswapneel/feed/" rel="self" type="application/rss+xml" />
	<link>https://shreshtait.com/blog/author/pswapneel/</link>
	<description>DNS Security &#38; Threat Intelligence</description>
	<lastBuildDate>Tue, 30 Sep 2025 09:40:27 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Zerodha users targeted with a pig-butchering scam</title>
		<link>https://shreshtait.com/blog/2024/09/zerodha-users-targeted-with-a-pig-butchering-scam/</link>
		
		<dc:creator><![CDATA[Vivek Halappanavar&#160;and&#160;Swapneel Patnekar]]></dc:creator>
		<pubDate>Wed, 11 Sep 2024 08:04:56 +0000</pubDate>
				<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[india]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[pig-buchering]]></category>
		<category><![CDATA[scam]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<category><![CDATA[zerodha]]></category>
		<guid isPermaLink="false">https://shreshtait.com/blog/?p=7279</guid>

					<description><![CDATA[<p><img width="150" height="150" src="https://shreshtait.com/blog/wp-content/uploads/2024/09/722e607b34d0e227b1fb223de7bc3572-150x150.webp" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Image of a shattered piggy bank depicting a pig-butchering scam" decoding="async" srcset="https://shreshtait.com/blog/wp-content/uploads/2024/09/722e607b34d0e227b1fb223de7bc3572-150x150.webp 150w, https://shreshtait.com/blog/wp-content/uploads/2024/09/722e607b34d0e227b1fb223de7bc3572-300x300.webp 300w, https://shreshtait.com/blog/wp-content/uploads/2024/09/722e607b34d0e227b1fb223de7bc3572-768x768.webp 768w, https://shreshtait.com/blog/wp-content/uploads/2024/09/722e607b34d0e227b1fb223de7bc3572-70x70.webp 70w, https://shreshtait.com/blog/wp-content/uploads/2024/09/722e607b34d0e227b1fb223de7bc3572.webp 1024w" sizes="(max-width: 150px) 100vw, 150px" />Threat researchers at Shreshta have uncovered a pig-butchering scam targeting Zerodha users. The phishing websites are impersonating Zerodha, a reputed stockbroking and financial services company, duping investors into investing in fake crypto and investment schemes. What is a pig-butchering scam? A pig butchering scam, a.k.a. &#8220;Sha Zhu Pan&#8221; or Shazhupan, (Chinese: 杀猪盘), translated as Killing [&#8230;]</p>
<p>The post <a href="https://shreshtait.com/blog/2024/09/zerodha-users-targeted-with-a-pig-butchering-scam/">Zerodha users targeted with a pig-butchering scam</a> appeared first on <a href="https://shreshtait.com/blog">DNS Security &amp; Threat Intelligence Blog | Shreshta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Whois API free</title>
		<link>https://shreshtait.com/blog/2024/08/whois-api-free/</link>
		
		<dc:creator><![CDATA[Swapneel Patnekar]]></dc:creator>
		<pubDate>Mon, 26 Aug 2024 17:15:48 +0000</pubDate>
				<category><![CDATA[DNS]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[API]]></category>
		<category><![CDATA[dns]]></category>
		<category><![CDATA[free]]></category>
		<category><![CDATA[whois]]></category>
		<guid isPermaLink="false">https://shreshtait.com/blog/?p=7175</guid>

					<description><![CDATA[<p><img width="150" height="150" src="https://shreshtait.com/blog/wp-content/uploads/2024/08/Whois-API-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Whois API free description image" decoding="async" srcset="https://shreshtait.com/blog/wp-content/uploads/2024/08/Whois-API-150x150.jpg 150w, https://shreshtait.com/blog/wp-content/uploads/2024/08/Whois-API-300x300.jpg 300w, https://shreshtait.com/blog/wp-content/uploads/2024/08/Whois-API-70x70.jpg 70w, https://shreshtait.com/blog/wp-content/uploads/2024/08/Whois-API.jpg 500w" sizes="(max-width: 150px) 100vw, 150px" />Are you looking for a reliable, easy-to-use, and free Whois API? Our new Whois API service offers fast, accurate domain information data, making it an ideal solution for security researchers, SOC analysts etc The Whois API provides the creation date and registrar name. The API requires no registration or token generation. The above request, returns [&#8230;]</p>
<p>The post <a href="https://shreshtait.com/blog/2024/08/whois-api-free/">Whois API free</a> appeared first on <a href="https://shreshtait.com/blog">DNS Security &amp; Threat Intelligence Blog | Shreshta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>ShadowFindr &#8211; Uncover domain shadowing attacks</title>
		<link>https://shreshtait.com/blog/2024/03/shadowfindr-uncover-domain-shadowing-attacks/</link>
		
		<dc:creator><![CDATA[Swapneel Patnekar]]></dc:creator>
		<pubDate>Wed, 13 Mar 2024 16:07:29 +0000</pubDate>
				<category><![CDATA[DNS]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[dns]]></category>
		<category><![CDATA[domain registrant]]></category>
		<category><![CDATA[domain registrar]]></category>
		<category><![CDATA[domain shadowing]]></category>
		<category><![CDATA[shadowfinder]]></category>
		<category><![CDATA[shadowfindr]]></category>
		<guid isPermaLink="false">https://shreshtait.com/blog/?p=6549</guid>

					<description><![CDATA[<p><img width="150" height="150" src="https://shreshtait.com/blog/wp-content/uploads/2024/03/hans-veth-YXUopi5p-bc-unsplash-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Owl hiding in a tree symbolizing the concept of Who is living off your domain name" decoding="async" srcset="https://shreshtait.com/blog/wp-content/uploads/2024/03/hans-veth-YXUopi5p-bc-unsplash-150x150.jpg 150w, https://shreshtait.com/blog/wp-content/uploads/2024/03/hans-veth-YXUopi5p-bc-unsplash-70x70.jpg 70w" sizes="(max-width: 150px) 100vw, 150px" />At the DNS Community Day organized by DNS-OARC at the APRICOT 2024/APNIC 57 conference, we released ShadowFindr, a web tool to detect potential domain shadowing attacks. Who is living off your domain name? ShadowFindr is a web tool built for domain name registrants that helps identify potential domain shadowing attacks. We have written about domain [&#8230;]</p>
<p>The post <a href="https://shreshtait.com/blog/2024/03/shadowfindr-uncover-domain-shadowing-attacks/">ShadowFindr &#8211; Uncover domain shadowing attacks</a> appeared first on <a href="https://shreshtait.com/blog">DNS Security &amp; Threat Intelligence Blog | Shreshta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Domain shadowing</title>
		<link>https://shreshtait.com/blog/2024/02/domain-shadowing/</link>
		
		<dc:creator><![CDATA[Swapneel Patnekar]]></dc:creator>
		<pubDate>Sat, 24 Feb 2024 13:15:06 +0000</pubDate>
				<category><![CDATA[DNS]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[dns]]></category>
		<category><![CDATA[domain shadowing]]></category>
		<guid isPermaLink="false">https://shreshtait.com/blog/?p=6423</guid>

					<description><![CDATA[<p><img width="150" height="150" src="https://shreshtait.com/blog/wp-content/uploads/2024/02/hans-veth-YXUopi5p-bc-unsplash-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Image of an owl hidden in a tree, notion is very similar to a domain shadowing attack" decoding="async" loading="lazy" srcset="https://shreshtait.com/blog/wp-content/uploads/2024/02/hans-veth-YXUopi5p-bc-unsplash-150x150.jpg 150w, https://shreshtait.com/blog/wp-content/uploads/2024/02/hans-veth-YXUopi5p-bc-unsplash-70x70.jpg 70w" sizes="auto, (max-width: 150px) 100vw, 150px" />Domain shadowing is a technique listed by MITRE ATT&#38;CK as T1584.001 sub-technique of T1584 This technique is not to be confused with subdomain hijacking What is a domain shadowing attack? Threat actors gain control of the DNS control panel of legitimate domain names by brute force and stealthily insert subdomains pointing to the attackers&#8217; network [&#8230;]</p>
<p>The post <a href="https://shreshtait.com/blog/2024/02/domain-shadowing/">Domain shadowing</a> appeared first on <a href="https://shreshtait.com/blog">DNS Security &amp; Threat Intelligence Blog | Shreshta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Web shell &#8211; A primer</title>
		<link>https://shreshtait.com/blog/2024/02/web-shell-a-primer/</link>
		
		<dc:creator><![CDATA[Vivek Halappanavar,&#160;Swapneel Patnekar&#160;and&#160;Pranay Patil]]></dc:creator>
		<pubDate>Thu, 22 Feb 2024 06:51:44 +0000</pubDate>
				<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[cyber threats]]></category>
		<category><![CDATA[technical analysis]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<category><![CDATA[Web Shell]]></category>
		<guid isPermaLink="false">https://shreshtait.com/blog/?p=5873</guid>

					<description><![CDATA[<p><img width="150" height="150" src="https://shreshtait.com/blog/wp-content/uploads/2024/02/Untitled-design4-150x150.png" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Web shell example PHP code" decoding="async" loading="lazy" srcset="https://shreshtait.com/blog/wp-content/uploads/2024/02/Untitled-design4-150x150.png 150w, https://shreshtait.com/blog/wp-content/uploads/2024/02/Untitled-design4-300x300.png 300w, https://shreshtait.com/blog/wp-content/uploads/2024/02/Untitled-design4-70x70.png 70w, https://shreshtait.com/blog/wp-content/uploads/2024/02/Untitled-design4.png 500w" sizes="auto, (max-width: 150px) 100vw, 150px" />What is a web shell? A web shell is a malicious script written using commonly used web application languages such as PHP, JSP, or ASP. They provide an attacker with a easy way to attack a compromised web server via web-based vulnerabilities, and once installed on a web server&#8217;s operating system, the web shell&#8217;s facilitate [&#8230;]</p>
<p>The post <a href="https://shreshtait.com/blog/2024/02/web-shell-a-primer/">Web shell &#8211; A primer</a> appeared first on <a href="https://shreshtait.com/blog">DNS Security &amp; Threat Intelligence Blog | Shreshta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>DNS KeyTrap vulnerability</title>
		<link>https://shreshtait.com/blog/2024/02/dns-keytrap-vulnerability/</link>
		
		<dc:creator><![CDATA[Swapneel Patnekar]]></dc:creator>
		<pubDate>Sat, 17 Feb 2024 12:21:32 +0000</pubDate>
				<category><![CDATA[DNS]]></category>
		<category><![CDATA[DNS Firewall]]></category>
		<category><![CDATA[Protective DNS]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[denial of service]]></category>
		<category><![CDATA[dns]]></category>
		<category><![CDATA[DNSSEC]]></category>
		<category><![CDATA[india]]></category>
		<category><![CDATA[KeyTrap]]></category>
		<category><![CDATA[vulnerability]]></category>
		<guid isPermaLink="false">https://shreshtait.com/blog/?p=6100</guid>

					<description><![CDATA[<p><img width="150" height="150" src="https://shreshtait.com/blog/wp-content/uploads/2024/02/New-Blog-Instagram-Post-150x150.png" class="attachment-thumbnail size-thumbnail wp-post-image" alt="DNS KeyTrap vulnerability" decoding="async" loading="lazy" srcset="https://shreshtait.com/blog/wp-content/uploads/2024/02/New-Blog-Instagram-Post-150x150.png 150w, https://shreshtait.com/blog/wp-content/uploads/2024/02/New-Blog-Instagram-Post-300x300.png 300w, https://shreshtait.com/blog/wp-content/uploads/2024/02/New-Blog-Instagram-Post-1024x1024.png 1024w, https://shreshtait.com/blog/wp-content/uploads/2024/02/New-Blog-Instagram-Post-768x768.png 768w, https://shreshtait.com/blog/wp-content/uploads/2024/02/New-Blog-Instagram-Post-70x70.png 70w, https://shreshtait.com/blog/wp-content/uploads/2024/02/New-Blog-Instagram-Post.png 1080w" sizes="auto, (max-width: 150px) 100vw, 150px" />DNS KeyTrap vulnerability is a critical flaw in the design of DNSSEC (DNS Security Extensions). A single DNS packet can exhaust the CPU, causing a Denial of Service in a DNSSEC validating recursive resolver. Security researchers at the&#160;German National Research Center for Applied Cybersecurity ATHENE&#160;uncovered the critical flaw, which has been assigned and listed as&#160;CVE-2023-50387&#160;and&#160;CVE-2023-50868 [&#8230;]</p>
<p>The post <a href="https://shreshtait.com/blog/2024/02/dns-keytrap-vulnerability/">DNS KeyTrap vulnerability</a> appeared first on <a href="https://shreshtait.com/blog">DNS Security &amp; Threat Intelligence Blog | Shreshta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>What is a DNS Firewall?</title>
		<link>https://shreshtait.com/blog/2024/02/dns-firewall/</link>
		
		<dc:creator><![CDATA[Swapneel Patnekar]]></dc:creator>
		<pubDate>Tue, 06 Feb 2024 17:03:54 +0000</pubDate>
				<category><![CDATA[DNS]]></category>
		<category><![CDATA[DNS Firewall]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[dns]]></category>
		<category><![CDATA[dns firewall]]></category>
		<category><![CDATA[dns security]]></category>
		<category><![CDATA[protective dns]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://shreshtait.com/blog/?p=5691</guid>

					<description><![CDATA[<p><img width="150" height="150" src="https://shreshtait.com/blog/wp-content/uploads/2024/02/Gradient-geometrical-Internet-security-Instagram-Post-1-150x150.png" class="attachment-thumbnail size-thumbnail wp-post-image" alt="what is a dns firewall" decoding="async" loading="lazy" srcset="https://shreshtait.com/blog/wp-content/uploads/2024/02/Gradient-geometrical-Internet-security-Instagram-Post-1-150x150.png 150w, https://shreshtait.com/blog/wp-content/uploads/2024/02/Gradient-geometrical-Internet-security-Instagram-Post-1-300x300.png 300w, https://shreshtait.com/blog/wp-content/uploads/2024/02/Gradient-geometrical-Internet-security-Instagram-Post-1-1024x1024.png 1024w, https://shreshtait.com/blog/wp-content/uploads/2024/02/Gradient-geometrical-Internet-security-Instagram-Post-1-768x768.png 768w, https://shreshtait.com/blog/wp-content/uploads/2024/02/Gradient-geometrical-Internet-security-Instagram-Post-1-70x70.png 70w, https://shreshtait.com/blog/wp-content/uploads/2024/02/Gradient-geometrical-Internet-security-Instagram-Post-1.png 1080w" sizes="auto, (max-width: 150px) 100vw, 150px" />A DNS firewall also known as Protective DNS is an enterprise network security solution. It filters and manages DNS queries and responses. It protects organizations from cyber threats. These threats include phishing, malware, cryptojacking, domain generation algorithms(DGA), command and control (C2) domain names. It determines which domain names users can access based on set rules [&#8230;]</p>
<p>The post <a href="https://shreshtait.com/blog/2024/02/dns-firewall/">What is a DNS Firewall?</a> appeared first on <a href="https://shreshtait.com/blog">DNS Security &amp; Threat Intelligence Blog | Shreshta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Having Teen Patti fun? Beware of malware apps!</title>
		<link>https://shreshtait.com/blog/2024/02/having-teen-patti-fun-beware-of-malware-apps/</link>
		
		<dc:creator><![CDATA[Swapneel Patnekar]]></dc:creator>
		<pubDate>Sat, 03 Feb 2024 08:55:01 +0000</pubDate>
				<category><![CDATA[DNS]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[browse safe]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[india]]></category>
		<category><![CDATA[malicious android apk]]></category>
		<category><![CDATA[protective dns]]></category>
		<category><![CDATA[teen patti fun]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://shreshtait.com/blog/?p=5552</guid>

					<description><![CDATA[<p><img width="150" height="150" src="https://shreshtait.com/blog/wp-content/uploads/2024/02/vikas-makwana-Qx6CvJlTMys-unsplash-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Image of a man holding three cards" decoding="async" loading="lazy" srcset="https://shreshtait.com/blog/wp-content/uploads/2024/02/vikas-makwana-Qx6CvJlTMys-unsplash-150x150.jpg 150w, https://shreshtait.com/blog/wp-content/uploads/2024/02/vikas-makwana-Qx6CvJlTMys-unsplash-70x70.jpg 70w" sizes="auto, (max-width: 150px) 100vw, 150px" />Having Teen Patti fun? Beware of malware apps! Shreshta Threat Intelligence team have detected many websites providing Teen Patti game downloads infected with malware. About Teen Patti Teen Patti is a gambling card game. Teen Patti originated in India and is popular throughout South Asia. It evolved from the English game of three-card brag, with [&#8230;]</p>
<p>The post <a href="https://shreshtait.com/blog/2024/02/having-teen-patti-fun-beware-of-malware-apps/">Having Teen Patti fun? Beware of malware apps!</a> appeared first on <a href="https://shreshtait.com/blog">DNS Security &amp; Threat Intelligence Blog | Shreshta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>What are Newly Registered Domain Names?</title>
		<link>https://shreshtait.com/blog/2024/01/what-are-newly-registered-domain-names/</link>
		
		<dc:creator><![CDATA[Swapneel Patnekar]]></dc:creator>
		<pubDate>Tue, 30 Jan 2024 13:03:06 +0000</pubDate>
				<category><![CDATA[Protective DNS]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[dataset]]></category>
		<category><![CDATA[dns]]></category>
		<category><![CDATA[newly registered domain names]]></category>
		<category><![CDATA[NRD]]></category>
		<category><![CDATA[recently registered domain names]]></category>
		<category><![CDATA[siem]]></category>
		<guid isPermaLink="false">https://shreshtait.com/blog/?p=4981</guid>

					<description><![CDATA[<p><img width="150" height="150" src="https://shreshtait.com/blog/wp-content/uploads/2024/01/Domain-Names1-150x150.png" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Image with wooden blocks with the text newly registered domain names" decoding="async" loading="lazy" srcset="https://shreshtait.com/blog/wp-content/uploads/2024/01/Domain-Names1-150x150.png 150w, https://shreshtait.com/blog/wp-content/uploads/2024/01/Domain-Names1-70x70.png 70w" sizes="auto, (max-width: 150px) 100vw, 150px" />On any given day, thousands of domain names are registered on a daily basis on the Internet. Newly Registered domain names (NRD) are used by enterprises and individuals for legitimate purposes and by threat actors for malicious purposes. What are newly registered domain names? By definition, a newly registered domain name(NRD) is one which has [&#8230;]</p>
<p>The post <a href="https://shreshtait.com/blog/2024/01/what-are-newly-registered-domain-names/">What are Newly Registered Domain Names?</a> appeared first on <a href="https://shreshtait.com/blog">DNS Security &amp; Threat Intelligence Blog | Shreshta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Fake Google Play Store</title>
		<link>https://shreshtait.com/blog/2024/01/fake-google-play-store/</link>
		
		<dc:creator><![CDATA[Swapneel Patnekar]]></dc:creator>
		<pubDate>Thu, 18 Jan 2024 12:47:11 +0000</pubDate>
				<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[browse safe]]></category>
		<category><![CDATA[fake]]></category>
		<category><![CDATA[google]]></category>
		<category><![CDATA[india]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[play store]]></category>
		<category><![CDATA[sideload]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://shreshtait.com/blog/?p=5271</guid>

					<description><![CDATA[<p><img width="150" height="150" src="https://shreshtait.com/blog/wp-content/uploads/2024/01/DALL·E-2024-01-22-03.14.26-Design-a-clean-and-modern-representation-of-the-Google-Play-Store-icon.-The-icon-should-feature-the-iconic-play-button-symbol-composed-of-Googles-ch-150x150.png" class="attachment-thumbnail size-thumbnail wp-post-image" alt="google play store icon" decoding="async" loading="lazy" srcset="https://shreshtait.com/blog/wp-content/uploads/2024/01/DALL·E-2024-01-22-03.14.26-Design-a-clean-and-modern-representation-of-the-Google-Play-Store-icon.-The-icon-should-feature-the-iconic-play-button-symbol-composed-of-Googles-ch-150x150.png 150w, https://shreshtait.com/blog/wp-content/uploads/2024/01/DALL·E-2024-01-22-03.14.26-Design-a-clean-and-modern-representation-of-the-Google-Play-Store-icon.-The-icon-should-feature-the-iconic-play-button-symbol-composed-of-Googles-ch-300x300.png 300w, https://shreshtait.com/blog/wp-content/uploads/2024/01/DALL·E-2024-01-22-03.14.26-Design-a-clean-and-modern-representation-of-the-Google-Play-Store-icon.-The-icon-should-feature-the-iconic-play-button-symbol-composed-of-Googles-ch-768x768.png 768w, https://shreshtait.com/blog/wp-content/uploads/2024/01/DALL·E-2024-01-22-03.14.26-Design-a-clean-and-modern-representation-of-the-Google-Play-Store-icon.-The-icon-should-feature-the-iconic-play-button-symbol-composed-of-Googles-ch-70x70.png 70w, https://shreshtait.com/blog/wp-content/uploads/2024/01/DALL·E-2024-01-22-03.14.26-Design-a-clean-and-modern-representation-of-the-Google-Play-Store-icon.-The-icon-should-feature-the-iconic-play-button-symbol-composed-of-Googles-ch.png 1024w" sizes="auto, (max-width: 150px) 100vw, 150px" />Executive Summary While malicious and fake apps in the Google Play Store is common, Shreshta Threat Intelligence team has detected multiple fake Google Play Store websites which impersonate the Google Play Store. This gives an impression to the user, that they are visiting the Google Play Store. If the user clicks on the Install button, [&#8230;]</p>
<p>The post <a href="https://shreshtait.com/blog/2024/01/fake-google-play-store/">Fake Google Play Store</a> appeared first on <a href="https://shreshtait.com/blog">DNS Security &amp; Threat Intelligence Blog | Shreshta</a>.</p>
]]></description>
		
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Page Caching using Disk: Enhanced 
Lazy Loading (feed)
Database Caching 40/79 queries in 0.022 seconds using Disk

Served from: shreshtait.com @ 2026-04-23 04:43:48 by W3 Total Cache
-->