Website | https://sekoia.io |
Blog | https://blog.sekoia.io |
GitHub | https://github.com/SEKOIA-IO |
Website | https://sekoia.io |
Blog | https://blog.sekoia.io |
GitHub | https://github.com/SEKOIA-IO |
🔍 Phishing-as-a-Service (#PhaaS) is driving a wave of large-scale, sophisticated attacks against organisations.
In our new blogpost, we provide an overview of the key techniques, tactics and social engineering schemes that cybercriminals use in AitM phishing attacks.
🎣 Leveraging our telemetry and proactive hunting, we ranked the most widespread AitM phishing kits - #Tycoon2FA, #Storm1167, #NakedPages, #Sneaky2FA, and more.
Additionally, the article includes summary sheets covering 11 AitM phishing kits.
🪤 Sekoia #TDR's new exclusive research uncovers the #ViciousTrap, a honeypot network deployed on compromised edge devices.
Our new report describes one of the latest observed infection chains (delivering #AsyncRAT) relying on the #Cloudflare tunnel infrastructure and the attacker’s #TTPs with a principal focus on detection opportunities.
https://blog.sekoia.io/detecting-multi-stage-infection-chains-madness/
Since the apparition of the #Interlock ransomware, the Sekoia #TDR team observed its operators evolving, improving their toolset (#LummaStealer and #BerserkStealer), and leveraging new techniques such as #ClickFix to deploy the ransomware payload.
https://blog.sekoia.io/interlock-ransomware-evolving-under-the-radar/
🇰🇵 Sekoia #TDR team investigated a malicious campaign that employs fake job interview websites to deliver backdoors on Windows and macOS - #GolangGhost using #ClickFix tactic. Dubbed #ClickFake Interview, this campaign has been attributed to #Lazarus, a #DPRK state-sponsored threat actor, which has been targeting the cryptocurrency industry since at least 2017.
https://blog.sekoia.io/clickfake-interview-campaign-by-lazarus/