Copyright Lures Mask a Multi‑Stage PureLog Stealer Attack on Key Industries
The infection begins when the victim manually executes a file disguised as a legal notice: Dokumentation über Verstöße gegen Rechte...
The infection begins when the victim manually executes a file disguised as a legal notice: Dokumentation über Verstöße gegen Rechte...
Following initial access, the threat actors conducted extensive lateral movement using a combination of legitimate administration tools and credential abuse....
While the execution of the bytecode was not successful in our tests, we saw that it contains strings and a...
New BoryptGrab Stealer Targets Windows Users via Deceptive GitHub Pages | Trend Micro (US) Content has been added to your...
The operations of phishing-as-a-service (PhaaS) platform Tycoon 2FA was taken offline this week by the combined effort of law enforcement that includes Europol and other partner agencies, as well...
Key takeaways Atomic (AMOS) Stealer has evolved from being distributed via cracked software to a more sophisticated supply chain attack...
Key takeaways Attackers abused Atlassian Cloud’s trusted domain for a spate of spam campaigns. The campaigns tried to leverage the...
We discovered two threat campaigns that used PeckBirdy in their operations. Based on victimology and the tools, tactics, and procedures...
Based on its geofencing behavior, we assess that the threat actors are likely of Russian origin, or those from the...