<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Vivek Halappanavar, Author at DNS Security &amp; Threat Intelligence Blog | Shreshta</title>
	<atom:link href="https://shreshtait.com/blog/author/vivek/feed/" rel="self" type="application/rss+xml" />
	<link>https://shreshtait.com/blog/author/vivek/</link>
	<description>DNS Security &#38; Threat Intelligence</description>
	<lastBuildDate>Tue, 30 Sep 2025 05:35:29 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Zerodha users targeted with a pig-butchering scam</title>
		<link>https://shreshtait.com/blog/2024/09/zerodha-users-targeted-with-a-pig-butchering-scam/</link>
		
		<dc:creator><![CDATA[Vivek Halappanavar&#160;and&#160;Swapneel Patnekar]]></dc:creator>
		<pubDate>Wed, 11 Sep 2024 08:04:56 +0000</pubDate>
				<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[india]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[pig-buchering]]></category>
		<category><![CDATA[scam]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<category><![CDATA[zerodha]]></category>
		<guid isPermaLink="false">https://shreshtait.com/blog/?p=7279</guid>

					<description><![CDATA[<p><img width="150" height="150" src="https://shreshtait.com/blog/wp-content/uploads/2024/09/722e607b34d0e227b1fb223de7bc3572-150x150.webp" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Image of a shattered piggy bank depicting a pig-butchering scam" decoding="async" srcset="https://shreshtait.com/blog/wp-content/uploads/2024/09/722e607b34d0e227b1fb223de7bc3572-150x150.webp 150w, https://shreshtait.com/blog/wp-content/uploads/2024/09/722e607b34d0e227b1fb223de7bc3572-300x300.webp 300w, https://shreshtait.com/blog/wp-content/uploads/2024/09/722e607b34d0e227b1fb223de7bc3572-768x768.webp 768w, https://shreshtait.com/blog/wp-content/uploads/2024/09/722e607b34d0e227b1fb223de7bc3572-70x70.webp 70w, https://shreshtait.com/blog/wp-content/uploads/2024/09/722e607b34d0e227b1fb223de7bc3572.webp 1024w" sizes="(max-width: 150px) 100vw, 150px" />Threat researchers at Shreshta have uncovered a pig-butchering scam targeting Zerodha users. The phishing websites are impersonating Zerodha, a reputed stockbroking and financial services company, duping investors into investing in fake crypto and investment schemes. What is a pig-butchering scam? A pig butchering scam, a.k.a. &#8220;Sha Zhu Pan&#8221; or Shazhupan, (Chinese: 杀猪盘), translated as Killing [&#8230;]</p>
<p>The post <a href="https://shreshtait.com/blog/2024/09/zerodha-users-targeted-with-a-pig-butchering-scam/">Zerodha users targeted with a pig-butchering scam</a> appeared first on <a href="https://shreshtait.com/blog">DNS Security &amp; Threat Intelligence Blog | Shreshta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Community Services</title>
		<link>https://shreshtait.com/blog/2024/08/community-services/</link>
		
		<dc:creator><![CDATA[Vivek Halappanavar]]></dc:creator>
		<pubDate>Tue, 06 Aug 2024 09:30:00 +0000</pubDate>
				<category><![CDATA[DNS]]></category>
		<category><![CDATA[Protective DNS]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[domain shadowing attacks]]></category>
		<category><![CDATA[newly registered domain names]]></category>
		<category><![CDATA[open resolvers]]></category>
		<category><![CDATA[shadowfinder]]></category>
		<category><![CDATA[shadowfindr]]></category>
		<guid isPermaLink="false">https://shreshtait.com/blog/?p=6999</guid>

					<description><![CDATA[<p><img width="150" height="150" src="https://shreshtait.com/blog/wp-content/uploads/2024/08/1-1-150x150.png" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Shreshta Community Services image" decoding="async" srcset="https://shreshtait.com/blog/wp-content/uploads/2024/08/1-1-150x150.png 150w, https://shreshtait.com/blog/wp-content/uploads/2024/08/1-1-300x300.png 300w, https://shreshtait.com/blog/wp-content/uploads/2024/08/1-1-70x70.png 70w, https://shreshtait.com/blog/wp-content/uploads/2024/08/1-1.png 500w" sizes="(max-width: 150px) 100vw, 150px" />This page lists the community services we offer, including our CheckOpenResolver, ShadowFinder, Newly registered domain name feeds and Whois API etc Checkopenresolver This service allows Internet users to verify if their router, firewall, or CPE (Customer Premises Equipment) device functions as an open resolver. An open resolver can be exploited in DNS amplification attacks, posing [&#8230;]</p>
<p>The post <a href="https://shreshtait.com/blog/2024/08/community-services/">Community Services</a> appeared first on <a href="https://shreshtait.com/blog">DNS Security &amp; Threat Intelligence Blog | Shreshta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>APAC DNS Forum</title>
		<link>https://shreshtait.com/blog/2024/08/apac-dns-forum/</link>
		
		<dc:creator><![CDATA[Vivek Halappanavar]]></dc:creator>
		<pubDate>Sat, 03 Aug 2024 07:25:01 +0000</pubDate>
				<category><![CDATA[DNS]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[apac dns forum]]></category>
		<category><![CDATA[dns]]></category>
		<category><![CDATA[dns security]]></category>
		<category><![CDATA[domain shadowing attacks]]></category>
		<category><![CDATA[india]]></category>
		<category><![CDATA[shadowfinder]]></category>
		<category><![CDATA[shadowfindr]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://shreshtait.com/blog/?p=7140</guid>

					<description><![CDATA[<p><img width="150" height="150" src="https://shreshtait.com/blog/wp-content/uploads/2024/08/channels4_profile-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="APAC DNS Forum logo" decoding="async" srcset="https://shreshtait.com/blog/wp-content/uploads/2024/08/channels4_profile-150x150.jpg 150w, https://shreshtait.com/blog/wp-content/uploads/2024/08/channels4_profile-300x300.jpg 300w, https://shreshtait.com/blog/wp-content/uploads/2024/08/channels4_profile-768x768.jpg 768w, https://shreshtait.com/blog/wp-content/uploads/2024/08/channels4_profile-70x70.jpg 70w, https://shreshtait.com/blog/wp-content/uploads/2024/08/channels4_profile.jpg 900w" sizes="(max-width: 150px) 100vw, 150px" />Our CEO Swapneel Patnekar recently delivered a presentation titled &#8220;Who is living off your domain name?&#8221; at the ICANN APAC DNS Forum 2024. About APAC DNS Forum The Asia Pacific Domain Name System Forum is a meaningful platform for the regional DNS community to network, exchange ideas, and explore collaboration opportunities in relation to the [&#8230;]</p>
<p>The post <a href="https://shreshtait.com/blog/2024/08/apac-dns-forum/">APAC DNS Forum</a> appeared first on <a href="https://shreshtait.com/blog">DNS Security &amp; Threat Intelligence Blog | Shreshta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>DNS-OARC DNS Community Day</title>
		<link>https://shreshtait.com/blog/2024/03/dns-oarc-dns-community-day/</link>
		
		<dc:creator><![CDATA[Vivek Halappanavar]]></dc:creator>
		<pubDate>Tue, 12 Mar 2024 15:35:22 +0000</pubDate>
				<category><![CDATA[DNS]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[apnic 57]]></category>
		<category><![CDATA[apricot 2024]]></category>
		<category><![CDATA[checkopenresolver]]></category>
		<category><![CDATA[dns]]></category>
		<category><![CDATA[dns community day]]></category>
		<category><![CDATA[dns oarc]]></category>
		<category><![CDATA[dns-oarc]]></category>
		<category><![CDATA[open resolvers]]></category>
		<category><![CDATA[shadowserver]]></category>
		<guid isPermaLink="false">https://shreshtait.com/blog/?p=6530</guid>

					<description><![CDATA[<p><img width="150" height="150" src="https://shreshtait.com/blog/wp-content/uploads/2024/02/DNS-Community-Day@2x-150x150.png" class="attachment-thumbnail size-thumbnail wp-post-image" alt="dns-oarc community day apricot" decoding="async" loading="lazy" srcset="https://shreshtait.com/blog/wp-content/uploads/2024/02/DNS-Community-Day@2x-150x150.png 150w, https://shreshtait.com/blog/wp-content/uploads/2024/02/DNS-Community-Day@2x-70x70.png 70w" sizes="auto, (max-width: 150px) 100vw, 150px" />The DNS-OARC folks organized a DNS Community Day at the APRICOT 2024/APNIC 57 conference on 26th February 2024. About DNS-OARC The DNS Operations, Analysis, and Research Center (DNS-OARC) brings together key operators, implementors, and researchers on a trusted platform so they can coordinate responses to attacks and other concerns, share information and learn together. The [&#8230;]</p>
<p>The post <a href="https://shreshtait.com/blog/2024/03/dns-oarc-dns-community-day/">DNS-OARC DNS Community Day</a> appeared first on <a href="https://shreshtait.com/blog">DNS Security &amp; Threat Intelligence Blog | Shreshta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Web shell &#8211; A primer</title>
		<link>https://shreshtait.com/blog/2024/02/web-shell-a-primer/</link>
		
		<dc:creator><![CDATA[Vivek Halappanavar,&#160;Swapneel Patnekar&#160;and&#160;Pranay Patil]]></dc:creator>
		<pubDate>Thu, 22 Feb 2024 06:51:44 +0000</pubDate>
				<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[cyber threats]]></category>
		<category><![CDATA[technical analysis]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<category><![CDATA[Web Shell]]></category>
		<guid isPermaLink="false">https://shreshtait.com/blog/?p=5873</guid>

					<description><![CDATA[<p><img width="150" height="150" src="https://shreshtait.com/blog/wp-content/uploads/2024/02/Untitled-design4-150x150.png" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Web shell example PHP code" decoding="async" loading="lazy" srcset="https://shreshtait.com/blog/wp-content/uploads/2024/02/Untitled-design4-150x150.png 150w, https://shreshtait.com/blog/wp-content/uploads/2024/02/Untitled-design4-300x300.png 300w, https://shreshtait.com/blog/wp-content/uploads/2024/02/Untitled-design4-70x70.png 70w, https://shreshtait.com/blog/wp-content/uploads/2024/02/Untitled-design4.png 500w" sizes="auto, (max-width: 150px) 100vw, 150px" />What is a web shell? A web shell is a malicious script written using commonly used web application languages such as PHP, JSP, or ASP. They provide an attacker with a easy way to attack a compromised web server via web-based vulnerabilities, and once installed on a web server&#8217;s operating system, the web shell&#8217;s facilitate [&#8230;]</p>
<p>The post <a href="https://shreshtait.com/blog/2024/02/web-shell-a-primer/">Web shell &#8211; A primer</a> appeared first on <a href="https://shreshtait.com/blog">DNS Security &amp; Threat Intelligence Blog | Shreshta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>ATO Scam</title>
		<link>https://shreshtait.com/blog/2024/02/ato-scam/</link>
		
		<dc:creator><![CDATA[Vivek Halappanavar]]></dc:creator>
		<pubDate>Wed, 14 Feb 2024 08:34:45 +0000</pubDate>
				<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[ATO Scam]]></category>
		<category><![CDATA[ATO Users]]></category>
		<category><![CDATA[Australian Tax Office]]></category>
		<category><![CDATA[Australian Tax Office Phishing Site]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://shreshtait.com/blog/?p=5799</guid>

					<description><![CDATA[<p><img width="150" height="150" src="https://shreshtait.com/blog/wp-content/uploads/2024/02/istockphoto-1176996544-612x612-1-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Tax blocks and coins" decoding="async" loading="lazy" srcset="https://shreshtait.com/blog/wp-content/uploads/2024/02/istockphoto-1176996544-612x612-1-150x150.jpg 150w, https://shreshtait.com/blog/wp-content/uploads/2024/02/istockphoto-1176996544-612x612-1-70x70.jpg 70w" sizes="auto, (max-width: 150px) 100vw, 150px" />Executive Summary Shreshta Threat Intelligence has uncovered a ATO Scam targeting Australian Taxation Office users.  Tax return scams involving myGov are on the rise and these deceptive sites, pretending to be a legitimate ATO website, seek to extract the users login credentials. We urge Australian citizens to be on guard against such phishing websites impersonating [&#8230;]</p>
<p>The post <a href="https://shreshtait.com/blog/2024/02/ato-scam/">ATO Scam</a> appeared first on <a href="https://shreshtait.com/blog">DNS Security &amp; Threat Intelligence Blog | Shreshta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Scams luring faster Ola electric scooter delivery date on the rise</title>
		<link>https://shreshtait.com/blog/2024/02/scams-luring-faster-ola-electric-scooter-delivery-date-on-the-rise/</link>
		
		<dc:creator><![CDATA[Vivek Halappanavar]]></dc:creator>
		<pubDate>Fri, 09 Feb 2024 10:06:32 +0000</pubDate>
				<category><![CDATA[DNS]]></category>
		<category><![CDATA[DNS Firewall]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[india]]></category>
		<category><![CDATA[ola electric scooters]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://shreshtait.com/blog/?p=5678</guid>

					<description><![CDATA[<p><img width="150" height="150" src="https://shreshtait.com/blog/wp-content/uploads/2024/02/ola-150x150.webp" class="attachment-thumbnail size-thumbnail wp-post-image" alt="ola electric scooter delivery date" decoding="async" loading="lazy" srcset="https://shreshtait.com/blog/wp-content/uploads/2024/02/ola-150x150.webp 150w, https://shreshtait.com/blog/wp-content/uploads/2024/02/ola-70x70.webp 70w" sizes="auto, (max-width: 150px) 100vw, 150px" />Shreshta Threat Intelligence has uncovered scams luring faster Ola electric scooter delivery date. The threat actors are launching phishing campaigns impersonating OLA , deceiving consumers into purchasing Ola electric scooters by promising a faster delivery date. Executive Summary As per our analysis, we conclude with high confidence that the attackers are launching phishing websites impersonating [&#8230;]</p>
<p>The post <a href="https://shreshtait.com/blog/2024/02/scams-luring-faster-ola-electric-scooter-delivery-date-on-the-rise/">Scams luring faster Ola electric scooter delivery date on the rise</a> appeared first on <a href="https://shreshtait.com/blog">DNS Security &amp; Threat Intelligence Blog | Shreshta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Phishing targeting Commonwealth Bank customers</title>
		<link>https://shreshtait.com/blog/2023/01/phishing-targeting-commonwealth-bank-customers/</link>
		
		<dc:creator><![CDATA[Vivek Halappanavar]]></dc:creator>
		<pubDate>Mon, 23 Jan 2023 15:58:19 +0000</pubDate>
				<category><![CDATA[SDINET]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[dns]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://shreshtait.com/blog/?p=3766</guid>

					<description><![CDATA[<p><img width="150" height="150" src="https://shreshtait.com/blog/wp-content/uploads/2023/01/pswapneel_illustration_of_a_pile_of_dollars_in_32-bit_efddcf87-7ee7-41f3-8dc9-efc8da3fb07a-150x150.png" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Commonwealth Bank of Australia Phishing" decoding="async" loading="lazy" srcset="https://shreshtait.com/blog/wp-content/uploads/2023/01/pswapneel_illustration_of_a_pile_of_dollars_in_32-bit_efddcf87-7ee7-41f3-8dc9-efc8da3fb07a-150x150.png 150w, https://shreshtait.com/blog/wp-content/uploads/2023/01/pswapneel_illustration_of_a_pile_of_dollars_in_32-bit_efddcf87-7ee7-41f3-8dc9-efc8da3fb07a-70x70.png 70w" sizes="auto, (max-width: 150px) 100vw, 150px" />Security researchers at&#160;Shreshta IT, using our threat intelligence platform SDINET, have identified a phishing website targeting customers of the Commonwealth Bank of Australia. About Commonwealth Bank The Commonwealth Bank of Australia (CBA), or CommBank, is an Australian multinational bank with businesses across New Zealand, Asia, the United States, and the United Kingdom. It provides a [&#8230;]</p>
<p>The post <a href="https://shreshtait.com/blog/2023/01/phishing-targeting-commonwealth-bank-customers/">Phishing targeting Commonwealth Bank customers</a> appeared first on <a href="https://shreshtait.com/blog">DNS Security &amp; Threat Intelligence Blog | Shreshta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Phishing targeting Indiana Department of Workforce Development</title>
		<link>https://shreshtait.com/blog/2023/01/phishing-targeting-indiana-department-of-workforce-development/</link>
		
		<dc:creator><![CDATA[Vivek Halappanavar]]></dc:creator>
		<pubDate>Sat, 21 Jan 2023 06:24:23 +0000</pubDate>
				<category><![CDATA[Information Security]]></category>
		<category><![CDATA[SDINET]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[dns]]></category>
		<category><![CDATA[dwd]]></category>
		<category><![CDATA[indiana]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<category><![CDATA[united states]]></category>
		<guid isPermaLink="false">https://shreshtait.com/blog/?p=3718</guid>

					<description><![CDATA[<p><img width="150" height="150" src="https://shreshtait.com/blog/wp-content/uploads/2023/01/Screenshot-2023-04-03-at-10.20.22-PM-150x150.png" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://shreshtait.com/blog/wp-content/uploads/2023/01/Screenshot-2023-04-03-at-10.20.22-PM-150x150.png 150w, https://shreshtait.com/blog/wp-content/uploads/2023/01/Screenshot-2023-04-03-at-10.20.22-PM-70x70.png 70w" sizes="auto, (max-width: 150px) 100vw, 150px" />Threat researchers at Shreshta, have identified a phishing campaign targeting Indiana Department of Workforce Development (DWD) automated self-service Unemployment Insurance system. About Indiana Department of Workforce Development’s (DWD) Uplink is the name of the Indiana Department of Workforce Development’s automated self-service Unemployment Insurance system. The Uplink Claimant Self-Service System enables users to receive improved customer service [&#8230;]</p>
<p>The post <a href="https://shreshtait.com/blog/2023/01/phishing-targeting-indiana-department-of-workforce-development/">Phishing targeting Indiana Department of Workforce Development</a> appeared first on <a href="https://shreshtait.com/blog">DNS Security &amp; Threat Intelligence Blog | Shreshta</a>.</p>
]]></description>
		
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Page Caching using Disk: Enhanced 
Lazy Loading (feed)
Database Caching 35/77 queries in 0.020 seconds using Disk

Served from: shreshtait.com @ 2026-04-13 06:41:42 by W3 Total Cache
-->