Top Malware Trends of April

By Schyler Gallant, Alex Geoghagan, Cobi Aloia, Cofense Phishing Defense Center The Cofense Phishing Defense Center (PDC) employs expert Threat Analysts to analyze emails on behalf of enterprise customers across the globe, in various industries, who are analyzing phishing attacks delivering malware. To help keep up with evolving tactics and top ongoing threats affecting real […]

The post Top Malware Trends of April appeared first on Cofense.

Continue reading Top Malware Trends of April

Phishing Attack Alert: Suncorp Bank Impersonation Scams 

Found in Environments Protected By: Microsoft, FireEye  By Akhil Varghese, Cofense Phishing Defense Center  A recent phishing attack observed at Cofense Phishing Defense Center (PDC) has revealed a tactic used by cybercriminals to target Suncorp Bank customers. Phishing email uses an account deletion threat to create a sense of urgency and compel recipients to act […]

The post Phishing Attack Alert: Suncorp Bank Impersonation Scams  appeared first on Cofense.

Continue reading Phishing Attack Alert: Suncorp Bank Impersonation Scams 

Phishing Attack Alert: Suncorp Bank Impersonation Scams 

Found in Environments Protected By: Microsoft, FireEye  By Akhil Varghese, Cofense Phishing Defense Center  A recent phishing attack observed at Cofense Phishing Defense Center (PDC) has revealed a tactic used by cybercriminals to target Suncorp Bank customers. Phishing email uses an account deletion threat to create a sense of urgency and compel recipients to act […]

The post Phishing Attack Alert: Suncorp Bank Impersonation Scams  appeared first on Cofense.

Continue reading Phishing Attack Alert: Suncorp Bank Impersonation Scams 

Man-in-the-Middle (MitM) attacks reaching inboxes increase 35% since 2022

Author: Jamie Arndt A man-in-the-middle (MitM) attack is an adversary’s attempt to steal information by inserting themselves between victims and their legitimate, expected destination. Threat actors combining credential phishing with man-in-the-middle attacks have been another evolution in the threat landscape. In this context, rather than setting up one fake login page, the attacker lures victims […]

The post Man-in-the-Middle (MitM) attacks reaching inboxes increase 35% since 2022 appeared first on Cofense.

Continue reading Man-in-the-Middle (MitM) attacks reaching inboxes increase 35% since 2022

Man-in-the-Middle (MitM) attacks reaching inboxes increase 35% since 2022

Author: Jamie Arndt A man-in-the-middle (MitM) attack is an adversary’s attempt to steal information by inserting themselves between victims and their legitimate, expected destination. Threat actors combining credential phishing with man-in-the-middle attacks have been another evolution in the threat landscape. In this context, rather than setting up one fake login page, the attacker lures victims […]

The post Man-in-the-Middle (MitM) attacks reaching inboxes increase 35% since 2022 appeared first on Cofense.

Continue reading Man-in-the-Middle (MitM) attacks reaching inboxes increase 35% since 2022

The Art of Deception: Microsoft Phish Redirects Victims to a Catering Voice Recording

By Kurtis Nicks Don’t you just hate it when you receive an unexpected email about an EFT payment, asking you to “please see attached”? Well, buckle up, because the latest phishing scam has an interesting twist that leaves its victims more confused than ever. The Phishing Defense Center (PDC) has observed credential phishing campaigns that […]

The post The Art of Deception: Microsoft Phish Redirects Victims to a Catering Voice Recording appeared first on Cofense.

Continue reading The Art of Deception: Microsoft Phish Redirects Victims to a Catering Voice Recording

The Art of Deception: Microsoft Phish Redirects Victims to a Catering Voice Recording

By Kurtis Nicks Don’t you just hate it when you receive an unexpected email about an EFT payment, asking you to “please see attached”? Well, buckle up, because the latest phishing scam has an interesting twist that leaves its victims more confused than ever. The Phishing Defense Center (PDC) has observed credential phishing campaigns that […]

The post The Art of Deception: Microsoft Phish Redirects Victims to a Catering Voice Recording appeared first on Cofense.

Continue reading The Art of Deception: Microsoft Phish Redirects Victims to a Catering Voice Recording

Malicious email campaigns abusing Telegram bots rise tremendously in Q1 2023, surpassing all of 2022 by 310%

Q1 of 2023 was filled with many updates and changes to the major malware families used in phishing scams, as well as several notable deviations in tactics, techniques, and procedures (TTPs). Our Cofense Intelligence team issues Active Threat Reports (ATRs) based on observed malicious email threats, and in Q1 we had a 20% increase in […]

The post Malicious email campaigns abusing Telegram bots rise tremendously in Q1 2023, surpassing all of 2022 by 310% appeared first on Cofense.

Continue reading Malicious email campaigns abusing Telegram bots rise tremendously in Q1 2023, surpassing all of 2022 by 310%

Malicious email campaigns abusing Telegram bots rise tremendously in Q1 2023, surpassing all of 2022 by 310%

Q1 of 2023 was filled with many updates and changes to the major malware families used in phishing scams, as well as several notable deviations in tactics, techniques, and procedures (TTPs). Our Cofense Intelligence team issues Active Threat Reports (ATRs) based on observed malicious email threats, and in Q1 we had a 20% increase in […]

The post Malicious email campaigns abusing Telegram bots rise tremendously in Q1 2023, surpassing all of 2022 by 310% appeared first on Cofense.

Continue reading Malicious email campaigns abusing Telegram bots rise tremendously in Q1 2023, surpassing all of 2022 by 310%

Open-Source Gh0st RAT Still Haunting Inboxes 15 Years After Release

Found in Environments Protected by: Proofpoint By Nathaniel Raymond, Cofense Intelligence Gh0st RAT, a decades-old open-source remote administration tool (RAT), recently appeared in phishing campaigns targeting a healthcare organization. Gh0st Remote Administration Tool was created by a Chinese hacking group named C. Rufus Security Team that released it publicly in 2008. The public release of […]

The post <strong>Open-Source Gh0st RAT Still Haunting Inboxes 15 Years After Release</strong> appeared first on Cofense.

Continue reading Open-Source Gh0st RAT Still Haunting Inboxes 15 Years After Release