Publications

Reports
Blog
News

Filter

19 January 2022

Campaigns abusing corporate trusted infrastructure hunt for corporate credentials on ICS networks

Targets of spyware attacks in which each malware sample has a limited-scope and a short lifetime include industrial enterprises. Victim organizations’ SMTP services are abused to send phishing emails and collect stolen data.

Laws and regulation 6
Industries 23
Types of threats 16
Malware 30
APT 29
Products and services 13
Industrial control systems 3
Technologies 22
Companies and organisations 10

Select an author

Select a date

Filter

Industrial control systems 2
Types of threats 6
Companies and organisations 5
Laws and regulation 2
Technologies 3
Industries 1

Select an author

Select a date

Filter

Companies and organisations 49
Types of threats 22
Technologies 11
Malware 25
Products and services 58
Industries 3
Events and conferences 2
Industrial control systems 5
APT 1
Laws and regulation 2

Select a date

Select a tag

Laws and regulation 6
Industries 23
Types of threats 16
Malware 30
APT 29
Products and services 13
Industrial control systems 3
Technologies 22
Companies and organisations 10

Select an author

Select a date

Filter

Select a tag

Industrial control systems 2
Types of threats 6
Companies and organisations 5
Laws and regulation 2
Technologies 3
Industries 1

Select an author

Select a date

Filter

Select a tag

Companies and organisations 49
Types of threats 22
Technologies 11
Malware 25
Products and services 58
Industries 3
Events and conferences 2
Industrial control systems 5
APT 1
Laws and regulation 2

Select a date

Filter