Publications

Reports
Blog
Events

Filter

19 January 2022

Campaigns abusing corporate trusted infrastructure hunt for corporate credentials on ICS networks

Targets of spyware attacks in which each malware sample has a limited-scope and a short lifetime include industrial enterprises. Victim organizations’ SMTP services are abused to send phishing emails and collect stolen data.

Industries 29
Types of threats 29
Industrial control systems 3
Technologies 28
Companies and organisations 13
Products and services 14
APT 29
Laws and regulation 6
Malware 30

Select an author

Select a date

Filter

Industrial control systems 5
Types of threats 25
Companies and organisations 51
Laws and regulation 3
Technologies 13
Industries 4
Malware 25
Products and services 58
Events and conferences 2
APT 1

Select an author

Select a date

Filter

Companies and organisations 6
Types of events 8
Technologies 1
Conferences 4
Products and services 1

Select a date

Select a tag

Industries 29
Types of threats 29
Industrial control systems 3
Technologies 28
Companies and organisations 13
Products and services 14
APT 29
Laws and regulation 6
Malware 30

Select an author

Select a date

Filter

Select a tag

Industrial control systems 5
Types of threats 25
Companies and organisations 51
Laws and regulation 3
Technologies 13
Industries 4
Malware 25
Products and services 58
Events and conferences 2
APT 1

Select an author

Select a date

Filter

Select a tag

Companies and organisations 6
Types of events 8
Technologies 1
Conferences 4
Products and services 1

Select a date

Filter