×

Register to Access Intelligence Summary

First Name
Last Name
Job Title
Company
Country
State
Thank you!
Error - something went wrong!
   

Weekly Intelligence Summary 03 Apr 2020

April 3, 2020

The cybercriminal group “FIN7” recently distributed malware via USB flash drives mailed to United States-based targets. Also included in the packages were fake letters, gift cards, and gifts to entice targets to plug

the USB drives into their devices. This probably represents a highly effective attempt at social engineering, given the packages’ “personal” touch to increased perceived legitimacy, as well as the general user ignorance when it comes to cyber threats delivered by physical means. Malware distribution via physical devices is rare, because it requires additional operational and logistical resources. For this reason the attack vector will likely only be used rarely, and typically only by highly sophisticated threat actors.

Previous Report
Weekly Intelligence Summary 10 Apr 2020
Weekly Intelligence Summary 10 Apr 2020

APT37 re-emerges, exploits cloud for espionage

Next Report
Weekly Intelligence Summary 27 Mar 2020
Weekly Intelligence Summary 27 Mar 2020

This week an online troll took advantage of Zoom’s screen-sharing feature to subject participants of a dail...

×

Want these
Threat Intelligence reports sent straight to your inbox?

Subscribe below!

First Name
Last Name
Company
Country
State- optional
Job Title
Thank you!
Error - something went wrong!