Publications

Reports
Blog
News

Filter

19 January 2022

Campaigns abusing corporate trusted infrastructure hunt for corporate credentials on ICS networks

Targets of spyware attacks in which each malware sample has a limited-scope and a short lifetime include industrial enterprises. Victim organizations’ SMTP services are abused to send phishing emails and collect stolen data.

Types of threats 23
Industries 26
Industrial control systems 3
Technologies 24
Products and services 13
Companies and organisations 11
Laws and regulation 6
Malware 30
APT 29

Select an author

Select a date

Filter

Industrial control systems 2
Types of threats 6
Companies and organisations 5
Laws and regulation 2
Technologies 3
Industries 1

Select an author

Select a date

Filter

Companies and organisations 49
Types of threats 22
Technologies 11
Malware 25
Products and services 58
Industries 3
Events and conferences 2
Industrial control systems 5
APT 1
Laws and regulation 2

Select a date

Select a tag

Types of threats 23
Industries 26
Industrial control systems 3
Technologies 24
Products and services 13
Companies and organisations 11
Laws and regulation 6
Malware 30
APT 29

Select an author

Select a date

Filter

Select a tag

Industrial control systems 2
Types of threats 6
Companies and organisations 5
Laws and regulation 2
Technologies 3
Industries 1

Select an author

Select a date

Filter

Select a tag

Companies and organisations 49
Types of threats 22
Technologies 11
Malware 25
Products and services 58
Industries 3
Events and conferences 2
Industrial control systems 5
APT 1
Laws and regulation 2

Select a date

Filter