Publications

Reports
Blog
Events

Filter

19 January 2022

Campaigns abusing corporate trusted infrastructure hunt for corporate credentials on ICS networks

Targets of spyware attacks in which each malware sample has a limited-scope and a short lifetime include industrial enterprises. Victim organizations’ SMTP services are abused to send phishing emails and collect stolen data.

Select a date

Select an author 22
Types of threats 29
APT 30
Industrial control systems 4
Industries 29
Technologies 28
Laws and regulation 7
Companies and organisations 13
Products and services 14
Malware 30

Filter

Select a date

Select an author 6
Laws and regulation 4
Industrial control systems 5
Technologies 13
Malware 25
Companies and organisations 51
Types of threats 25
Industries 4
Products and services 58
Events and conferences 2
APT 1

Filter

Select a date

Companies and organisations 6
Conferences 4
Types of events 8
Technologies 1
Products and services 1

Select a date

Select an author 22
Types of threats 29
APT 30
Industrial control systems 4
Industries 29
Technologies 28
Laws and regulation 7
Companies and organisations 13
Products and services 14
Malware 30
Filter

Select a date

Select an author 6
Laws and regulation 4
Industrial control systems 5
Technologies 13
Malware 25
Companies and organisations 51
Types of threats 25
Industries 4
Products and services 58
Events and conferences 2
APT 1
Filter

Select a date

Companies and organisations 6
Conferences 4
Types of events 8
Technologies 1
Products and services 1
Filter