Publications

Reports
Blog
News

Filter

19 January 2022

Campaigns abusing corporate trusted infrastructure hunt for corporate credentials on ICS networks

Targets of spyware attacks in which each malware sample has a limited-scope and a short lifetime include industrial enterprises. Victim organizations’ SMTP services are abused to send phishing emails and collect stolen data.

Industries 27
Types of threats 26
Industrial control systems 3
Technologies 26
Companies and organisations 12
Products and services 14
APT 29
Laws and regulation 6
Malware 30

Select an author

Select a date

Filter

Industrial control systems 2
Types of threats 6
Companies and organisations 5
Laws and regulation 2
Technologies 3
Industries 1

Select an author

Select a date

Filter

Companies and organisations 49
Types of threats 22
Technologies 11
Malware 25
Products and services 58
Industries 3
Events and conferences 2
Industrial control systems 5
APT 1
Laws and regulation 2

Select a date

Select a tag

Industries 27
Types of threats 26
Industrial control systems 3
Technologies 26
Companies and organisations 12
Products and services 14
APT 29
Laws and regulation 6
Malware 30

Select an author

Select a date

Filter

Select a tag

Industrial control systems 2
Types of threats 6
Companies and organisations 5
Laws and regulation 2
Technologies 3
Industries 1

Select an author

Select a date

Filter

Select a tag

Companies and organisations 49
Types of threats 22
Technologies 11
Malware 25
Products and services 58
Industries 3
Events and conferences 2
Industrial control systems 5
APT 1
Laws and regulation 2

Select a date

Filter