×

Register to Access Intelligence Summary

First Name
Last Name
Job Title
Company
Country
State
Thank you!
Error - something went wrong!
   

Weekly Intelligence Summary 13 Mar 2020

March 13, 2020

In the spotlight this week: The financially motivated threat actor “TA505” has continued unleashing phishing-related cyber attacks in late 2019 and early 2020, regularly debuting new or updated malware to better evade detection and successfully infect their targets. The threat actor will very likely remain active throughout 2020, and poses a persistent cyber threat to a range of organizations and sectors (based on their previous targeting). Regardless of what malware TA505 uses―there is a variety―the vast majority of their attacks rely on spearphishing to gain initial access to a targeted system. This illustrates that phishing, despite being well known as an attack vector, remains highly effective.

Previous Report
Weekly Intelligence Summary 20 Mar 2020
Weekly Intelligence Summary 20 Mar 2020

Microsoft and partners in 35 countries have taken legal and technical steps to disrupt the highly prolific ...

Next Report
Weekly Intelligence Summary 06 Mar 2020
Weekly Intelligence Summary 06 Mar 2020

In the Spotlight this week: The “Cerberus” banking trojan was observed stealing one-time password (OTP) cod...

×

Want these
Threat Intelligence reports sent straight to your inbox?

Subscribe below!

First Name
Last Name
Company
Country
State- optional
Job Title
Thank you!
Error - something went wrong!