Publications

Reports
Blog
News

Filter

19 January 2022

Campaigns abusing corporate trusted infrastructure hunt for corporate credentials on ICS networks

Targets of spyware attacks in which each malware sample has a limited-scope and a short lifetime include industrial enterprises. Victim organizations’ SMTP services are abused to send phishing emails and collect stolen data.

APT 19
Companies and organisations 10
Industrial control systems 3
Industries 17
Laws and regulation 3
Malware 18
Products and services 12
Technologies 19
Types of threats 10

Select an author

Select a date

Filter

Companies and organisations 5
Industrial control systems 2
Industries 1
Laws and regulation 2
Technologies 3
Types of threats 6

Select an author

Select a date

Filter

APT 1
Companies and organisations 49
Events and conferences 2
Industrial control systems 5
Industries 3
Laws and regulation 2
Malware 25
Products and services 58
Technologies 11
Types of threats 22

Select a date

Select a tag

APT 19
Companies and organisations 10
Industrial control systems 3
Industries 17
Laws and regulation 3
Malware 18
Products and services 12
Technologies 19
Types of threats 10

Select an author

Select a date

Filter

Select a tag

Companies and organisations 5
Industrial control systems 2
Industries 1
Laws and regulation 2
Technologies 3
Types of threats 6

Select an author

Select a date

Filter

Select a tag

APT 1
Companies and organisations 49
Events and conferences 2
Industrial control systems 5
Industries 3
Laws and regulation 2
Malware 25
Products and services 58
Technologies 11
Types of threats 22

Select a date

Filter