用户执行 攻击者可以依靠用户的特定操作来获得执行。 这可以是直接代码执行,例如当用户打开鱼叉式钓鱼附件 (Spearphishing Attachment) 传递的恶意可执行文件时,该文件带有图标和文...
ATT&CK - 内置鱼叉
内置鱼叉 攻击者可以使用内部骗局来获得其他信息的访问权,或者在他们已经可以访问环境中的帐户或系统之后利用同一组织内的其他用户。内部鱼叉式攻击是一种多阶段攻击,其中通过使用以前安装的恶意软件控制用户的设...
钓鱼策略:CHAVECLOAK银行木马的新目标
Users in Brazil are the target of a new banking trojan known as CHAVECLOAK that's propagated via phi...
TA577利用ZIP附件窃取NTLM哈希
The threat actor known as TA577 has been observed using ZIP archive attachments in phishing emails w...
新型的网络钓鱼工具针对加密货币用户
A novel phishing kit has been observed impersonating the login pages of well-known cryptocurrency se...
网络钓鱼策略新变种:UAC-0050组织分发Remcos RAT
The threat actor known as UAC-0050 is leveraging phishing attacks to distribute Remcos RAT using new...
节假日礼品卡欺诈的崛起威胁
Microsoft is warning of an uptick in malicious activity from an emerging threat cluster it's trackin...
红队网络基础设施建设
在设计红队的网络基础设施架构时,要考虑到否能够提供长期(数周、数月、数年)和稳定的响应服务。 设计注意事项 (Design Considerations) 功能分离 (Functional Segre...
微软发布警告:黑客利用OAuth进行加密货币挖矿和网络钓鱼
Microsoft has warned that adversaries are using OAuth applications as an automation tool to deploy v...
网络钓鱼是如何盗取用户凭证的
Account credentials, a popular initial access vector, have become a valuable commodity in cybercrime...
网络钓鱼攻击的新趋势:二维码在网络钓鱼中的应用
Phishing attacks are steadily becoming more sophisticated, with cybercriminals investing in new ways...
网络犯罪分子使用EvilProxy网络钓鱼工具瞄准美国公司高管
Senior executives working in U.S.-based organizations are being targeted by a new phishing campaign ...