Iran-Linked APT35, Skimming By Magecart 4, Rancour, And Emotet Resurgence

October 11, 2019 Digital Shadows

We’re back in London this week! Viktoria chats with Adam Cook, Philip Doherty, and Josh Poole on this week’s top stories:

  • APT35 Targets Email of US political figures & prominent Iranians
  • Skimming activity by Magecart 4 reveals potential link to Cobalt Group
  • Chinese threat group Rancour casts phishing line to South-East Asian government
  • Emotet Resurgence

Resources From This Week:
Account Takeover Kill Chain 5 Step Analysis: https://www.digitalshadows.com/blog-and-research/the-account-takeover-kill-chain-a-five-step-analysis/

Weekly Intelligence Summary: https://resources.digitalshadows.com/weekly-intelligence-summary

Make sure to subscribe to us wherever you listen to your podcasts for the latest episodes. Thanks for listening! - ShadowTalk team

Previous Post
ANU Breach Report: Mapping to Mitre ATT&CK Framework
ANU Breach Report: Mapping to Mitre ATT&CK Framework

We decided to map this intrusion to the Mitre ATT&CK framework, as we have done previously for:

Next Post
Dark Web Overdrive: The Criminal Marketplace Understood Through Cyberpunk Fiction
Dark Web Overdrive: The Criminal Marketplace Understood Through Cyberpunk Fiction

How can the modern network of .onion marketplaces be understood through novels about a cyberpunk dystopia?...