Publications

Reports
Blog
Events

Filter

19 January 2022

Campaigns abusing corporate trusted infrastructure hunt for corporate credentials on ICS networks

Targets of spyware attacks in which each malware sample has a limited-scope and a short lifetime include industrial enterprises. Victim organizations’ SMTP services are abused to send phishing emails and collect stolen data.

Select a date

Select an author 22
APT 30
Companies and organisations 13
Industrial control systems 4
Industries 29
Laws and regulation 7
Malware 30
Products and services 14
Technologies 28
Types of threats 29

Filter

Select a date

Select an author 6
APT 1
Companies and organisations 51
Events and conferences 2
Industrial control systems 5
Industries 4
Laws and regulation 4
Malware 25
Products and services 58
Technologies 13
Types of threats 25

Filter

Select a date

Companies and organisations 6
Conferences 4
Products and services 1
Technologies 1
Types of events 8

Select a date

Select an author 22
APT 30
Companies and organisations 13
Industrial control systems 4
Industries 29
Laws and regulation 7
Malware 30
Products and services 14
Technologies 28
Types of threats 29
Filter

Select a date

Select an author 6
APT 1
Companies and organisations 51
Events and conferences 2
Industrial control systems 5
Industries 4
Laws and regulation 4
Malware 25
Products and services 58
Technologies 13
Types of threats 25
Filter

Select a date

Companies and organisations 6
Conferences 4
Products and services 1
Technologies 1
Types of events 8
Filter