Sekoia.io

@sekoia_io@infosec.exchange
111 Followers
1 Following
155 Posts
A #SOCplatform boosted by #AI and #threatintelligence, combining #SIEM, #SOAR, #Automation in a single solution. Used by End-users, MSSP and APIs
Websitehttps://sekoia.io
Bloghttps://blog.sekoia.io
GitHubhttps://github.com/SEKOIA-IO

🔍 Phishing-as-a-Service (#PhaaS) is driving a wave of large-scale, sophisticated attacks against organisations.

In our new blogpost, we provide an overview of the key techniques, tactics and social engineering schemes that cybercriminals use in AitM phishing attacks.

🎣 Leveraging our telemetry and proactive hunting, we ranked the most widespread AitM phishing kits - #Tycoon2FA, #Storm1167, #NakedPages, #Sneaky2FA, and more.

Additionally, the article includes summary sheets covering 11 AitM phishing kits.

📝 Our latest #TDR report delivers an in-depth analysis of Adversary-in-the-Middle (#AitM) #phishing threats - targeting Microsoft 365 and Google accounts - and their ecosystem.

This report shares actionable intelligence to help analysts detect and investigate AitM phishing.

🧀 The Sharp Taste of #Mimo’lette: Analyzing Mimo’s Latest Campaign targeting #Craft CMS

https://blog.sekoia.io/the-sharp-taste-of-mimolette-analyzing-mimos-latest-campaign-targeting-craft-cms/

The Sharp Taste of Mimo'lette: Analyzing Mimo’s Latest Campaign targeting Craft CMS

Analysis of the CVE-2025-32432 compromise chain by Mimo: exploitation, loader, crypto miner, proxyware, and detection opportunities.

Sekoia.io Blog

🪤 Sekoia #TDR's new exclusive research uncovers the #ViciousTrap, a honeypot network deployed on compromised edge devices.

https://blog.sekoia.io/vicioustrap-infiltrate-control-lure-turning-edge-devices-into-honeypots-en-masse/

ViciousTrap - Infiltrate, Control, Lure: Turning edge devices into honeypots en masse. 

Discover ViciousTrap, a newly identified threat who turning edge devices into honeypots en masse targeting

Sekoia.io Blog

Our new report describes one of the latest observed infection chains (delivering #AsyncRAT) relying on the #Cloudflare tunnel infrastructure and the attacker’s #TTPs with a principal focus on detection opportunities.

https://blog.sekoia.io/detecting-multi-stage-infection-chains-madness/

Detecting Multi-Stage Infection Chains Madness

Learn about detecting multi-stage infection chains using Cloudflare tunnel infrastructures delivering RATs.

Sekoia.io Blog

Since the apparition of the #Interlock ransomware, the Sekoia #TDR team observed its operators evolving, improving their toolset (#LummaStealer and #BerserkStealer), and leveraging new techniques such as #ClickFix to deploy the ransomware payload.

https://blog.sekoia.io/interlock-ransomware-evolving-under-the-radar/

Interlock ransomware evolving under the radar

ClickFix ransomware attack uses deceptive prompts and PowerShell loaders to deploy threats like Interlock under the radar.

Sekoia.io Blog
🎉 It's not about a CTI investigation or a Detection Engineering topic, but today we are happy to announce that Sekoia.io has raised €26m!
https://www.sekoia.io/en/presse/sekoia-io-secures-e26-million-in-series-b-to-democratize-cyber-operations-with-ai-and-cyber-intelligence/
Sekoia.io Secures €26 Million in Series B to Democratize Cyber Operations with AI and Cyber Intelligence

Sekoia.io raises €26m in Series B to reinvent security operations (SOC) with AI and cyber threat intelligence

Sekoia.io

🇰🇵 Sekoia #TDR team investigated a malicious campaign that employs fake job interview websites to deliver backdoors on Windows and macOS - #GolangGhost using #ClickFix tactic. Dubbed #ClickFake Interview, this campaign has been attributed to #Lazarus, a #DPRK state-sponsored threat actor, which has been targeting the cryptocurrency industry since at least 2017.

https://blog.sekoia.io/clickfake-interview-campaign-by-lazarus/

From Contagious to ClickFake Interview: Lazarus leveraging the ClickFix tactic

Discover how Lazarus leverages fake job sites in the ClickFake Interview campaign targeting crypto firms using the ClickFix tactic.

Sekoia.io Blog
This new variant introduces additional interactions with the Binance Smart Chain, as well as new ClickFix lures displaying:
- a fake Cloudflare Turnstile with unusual web traffic
- a fake reCAPTCHA along with a DNS error