article thumbnail

The Original APT: Advanced Persistent Teenagers

Krebs on Security

“Someone was trying to phish employee credentials, and they were good at it,” Wired reported. “They were calling up consumer service and tech support personnel, instructing them to reset their passwords. ” Twitter revealed that a key tactic of the group was “phone spear phishing” (a.k.a.

article thumbnail

Ransomware world in 2021: who, how and why

SecureList

Hackers who are on the lookout for publicly disclosed vulnerabilities (1-days) in internet facing software, such as VPN appliances or email gateways. The ransomware is now distributed mainly through compromised RDP accesses, phishing, and software vulnerabilities. Access sellers.

article thumbnail

Ransomware by the numbers: Reassessing the threat’s global impact

SecureList

In certain cases, they used spear-phishing campaigns to install Cobalt Strike RAT, while other attacks involved exploiting a vulnerable internet-facing service (e.g., Citrix ADC/NetScaler or Pulse Secure VPN) or weak RDP credentials to breach the network. Maze primarily targeted businesses and large organizations. Conclusion.