article thumbnail

Agent Tesla Spyware Used in Phishing Campaign

Heimadal Security

Agent Tesla initially detected in late 2014, is a known spyware aimed at collecting sensitive data from a victim’s device, such as stored application credentials and keyboard inputs (keylogger). The post Agent Tesla Spyware Used in Phishing Campaign appeared first on Heimdal Security Blog.

Spyware 69
article thumbnail

Threat landscape for industrial automation systems, Q1 2024

SecureList

Main threat sources The internet, email clients, and removable storage devices remain the primary sources of threats to computers in an organization’s operating technology infrastructure. The sources of most malicious objects used for initial infection are the internet and email.

Spyware 61
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Threat landscape for industrial automation systems. H2 2023

SecureList

Percentage of ICS computers on which malicious objects were blocked in selected industries Main threat sources The internet, email clients and removable media remained the main sources of threats to computers connected to enterprise OT networks. By percentage of ICS computers on which spyware was blocked. pp Worms : by 0.43

Spyware 105
article thumbnail

Security Affairs newsletter Round 462 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

Judge ordered NSO Group to hand over the Pegasus spyware code to WhatsApp Cybercrime BlackCat Ransomware Affiliate TTPs American Express credit cards EXPOSED in third-party vendor data breach – account numbers and names among details accessed in hack LockBit 3.0’S

Spyware 87
article thumbnail

Spam and phishing in 2022

SecureList

Short-lived phishing sites often offered to see the premieres before the eagerly awaited movie or television show was scheduled to hit the screen. At the beginning of that year, we still observed phishing attacks that used the themes of infection and prevention as the bait.

article thumbnail

News alert: Criminal IP and Quad9 collaborate to exchange domain and IP threat intelligence

The Last Watchdog

This process not only safeguards computers, mobile devices, and IoT systems from a diverse array of threats like malware, phishing, spyware, and botnets, ensuring privacy, but also optimizes performance.

DNS 130
article thumbnail

Spam and phishing in 2020

SecureList

The Kaspersky Anti-Phishing component blocked 434,898,635 attempts at accessing scam sites. The most frequent targets of phishing attacks were online stores (18.12 The contact phone trick was heavily used both in email messages and on phishing pages. Agentb malware family. Trends of the year. Malicious links.

Phishing 140