<feed xmlns="http://www.w3.org/2005/Atom"> <id>https://bvrtis.github.io/</id><title>bartis</title><subtitle>Security research blog by bartis — Web Application Pentesting, Reverse Engineering and Vulnerability research.</subtitle> <updated>2026-03-10T01:36:59+01:00</updated> <author> <name>Daniele Bartiromo</name> <uri>https://bvrtis.github.io/</uri> </author><link rel="self" type="application/atom+xml" href="https://bvrtis.github.io/feed.xml"/><link rel="alternate" type="text/html" hreflang="en" href="https://bvrtis.github.io/"/> <generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator> <rights> © 2026 Daniele Bartiromo </rights> <icon>/assets/img/favicons/favicon.ico</icon> <logo>/assets/img/favicons/favicon-96x96.png</logo> <entry><title>One SMS, One Rabbit Hole: Exposing a Live Phishing Operation with 5561 Victims</title><link href="https://bvrtis.github.io/posts/one-sms-one-rabbit-hole-exposing-a-live-phishing-operation/" rel="alternate" type="text/html" title="One SMS, One Rabbit Hole: Exposing a Live Phishing Operation with 5561 Victims" /><published>2026-03-09T17:00:00+01:00</published> <updated>2026-03-09T17:00:00+01:00</updated> <id>https://bvrtis.github.io/posts/one-sms-one-rabbit-hole-exposing-a-live-phishing-operation/</id> <content type="text/html" src="https://bvrtis.github.io/posts/one-sms-one-rabbit-hole-exposing-a-live-phishing-operation/" /> <author> <name>Daniele Bartiromo</name> </author> <category term="Research" /> <category term="Phishing" /> <summary>Case Study: Analysis of a Phishing Infrastructure Targeting Stolen Smartphones Introduction A few months ago my smartphone was stolen. Shortly after the incident, one of the emergency contacts associated with the device recovery feature received an SMS containing a link to what appeared to be a legitimate Apple account recovery page. At first glance, this looked like a classic targeted ph...</summary> </entry> </feed>
