Remove threat-intelligence javascript-obfuscation-moves-to-phishing-emails
article thumbnail

Microsoft warns of a evasive year-long spear-phishing campaign targeting Office 365 users

Security Affairs

Microsoft warns of a long-running spear-phishing campaign that has targeted Office 365 customers in multiple attacks since July 2020. Microsoft revealed that a year-long spear-phishing campaign has targeted Office 365 customers in multiple attacks starting with July 2020. com , or api[.]statvoo[.]com

Phishing 118
article thumbnail

Ingenious Phishing Tactics in the Modern Scammer's Toolbox

SecureWorld News

When it comes to impactful types of internet-borne crime, phishing is the name of the game. According to Verizon's 2023 Data Breach Investigations Report (DBIR), a whopping 74% of breaches involve a human element, which is exactly what phishing aims to exploit. And for good reason. Tactics matter a lot, too.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Phishing Campaign Used Morse Code to Evade Detection: Microsoft

eSecurity Planet

A phishing campaign that Microsoft security researchers have been tracking for about a year highlights not only the ongoing success of social engineering efforts by hackers to compromise systems, but also the extent to which the bad actors will go to cover their tracks while stealing user credentials. Invoice-Themed Lures.

Phishing 109
article thumbnail

LemonDuck no longer settles for breadcrumbs

Malwarebytes

LemonDuck has evolved from a Monero cryptominer into LemonCat, a Trojan that specializes in backdoor installation, credential and data theft, and malware delivery, according to the Microsoft 365 Defender Threat Intelligence Team, which explained their findings in a two-part story [ 1 ][ 2 ] on the Microsoft Security blog.

Malware 88
article thumbnail

VileRAT: DeathStalker’s continuous strike at foreign and cryptocurrency exchanges

SecureList

Notably, we exposed why we believe the threat actor may fit a group of mercenaries, offering hack-for-hire services, or acting as an information broker to support competitive and financial intelligence efforts. We discovered it in Q2 2020 as part of an update of the Evilnum modus operandi, and attributed it to DeathStalker.

article thumbnail

IT threat evolution Q1 2021

SecureList

The company’s Orion IT, a solution for monitoring and managing customers’ IT infrastructure, was compromised by threat actors. We have observed numerous activities of the Lazarus group over many years, with the threat actor changing targets depending on its objectives. Putting the ‘A’ into APT.

Malware 94