‘Sneaky Log’ Microsoft Spoofing Scheme Sidesteps Two-Factor Security

The phishing-as-a-service kit from Sneaky Log creates fake authentication pages to farm account information, including two-factor security codes. Continue reading ‘Sneaky Log’ Microsoft Spoofing Scheme Sidesteps Two-Factor Security

Law enforcement action deletes PlugX malware from thousands of machines

The remote access trojan was being used by a Chinese collective operating since 2014.

The post Law enforcement action deletes PlugX malware from thousands of machines appeared first on CyberScoop.

Continue reading Law enforcement action deletes PlugX malware from thousands of machines

Fancy Bear spotted using real Kazak government documents in spearpishing campaign

The malware-laced files include draft versions of diplomatic statements, correspondence letters, internal administrative notes and other documents.

The post Fancy Bear spotted using real Kazak government documents in spearpishing campaign appeared first on CyberScoop.

Continue reading Fancy Bear spotted using real Kazak government documents in spearpishing campaign