×

Register to Access Intelligence Summary

First Name
Last Name
Job Title
Company
Country
State
Thank you!
Error - something went wrong!
   

Weekly Intelligence Summary 13 Mar 2020

March 13, 2020

In the spotlight this week: The financially motivated threat actor “TA505” has continued unleashing phishing-related cyber attacks in late 2019 and early 2020, regularly debuting new or updated malware to better evade detection and successfully infect their targets. The threat actor will very likely remain active throughout 2020, and poses a persistent cyber threat to a range of organizations and sectors (based on their previous targeting). Regardless of what malware TA505 uses―there is a variety―the vast majority of their attacks rely on spearphishing to gain initial access to a targeted system. This illustrates that phishing, despite being well known as an attack vector, remains highly effective.

Previous Post
Apollon Dark Web Marketplace: Exit Scams and DDoS Campaigns
Apollon Dark Web Marketplace: Exit Scams and DDoS Campaigns

  Imagine logging on to your favorite e-commerce site, finding your favorite author’s newest book for sale,...

Next Post
Necurs Botnet, SMB Vulnerability, Coronavirus Scams, And Dark Web Updates
Necurs Botnet, SMB Vulnerability, Coronavirus Scams, And Dark Web Updates

Necurs Botnet, SMB Vulnerability, Coronavirus Scams, and Dark Web Updates - Hear this week's ShadowTalk epi...