Publications

Reports
Blog
News

Filter

19 January 2022

Campaigns abusing corporate trusted infrastructure hunt for corporate credentials on ICS networks

Kirill Kruglov

Targets of spyware attacks in which each malware sample has a limited-scope and a short lifetime include industrial enterprises. Victim organizations’ SMTP services are abused to send phishing emails and collect stolen data.

APT 6
Companies and organisations 9
Industrial control systems 3
Industries 16
Laws and regulation 3
Malware 18
Products and services 12
Technologies 16
Types of threats 9

Select an author

Select a date

Filter

Companies and organisations 4
Industrial control systems 2
Industries 1
Laws and regulation 2
Technologies 3
Types of threats 3

Select an author

Select a date

Filter

APT 1
Companies and organisations 49
Events and conferences 2
Industrial control systems 5
Industries 3
Laws and regulation 2
Malware 25
Products and services 58
Technologies 11
Types of threats 22

Select a date

Select a tag

APT 6
Companies and organisations 9
Industrial control systems 3
Industries 16
Laws and regulation 3
Malware 18
Products and services 12
Technologies 16
Types of threats 9

Select an author

Select a date

Filter

Select a tag

Companies and organisations 4
Industrial control systems 2
Industries 1
Laws and regulation 2
Technologies 3
Types of threats 3

Select an author

Select a date

Filter

Select a tag

APT 1
Companies and organisations 49
Events and conferences 2
Industrial control systems 5
Industries 3
Laws and regulation 2
Malware 25
Products and services 58
Technologies 11
Types of threats 22

Select a date

Filter