Phishing with hacked sites
Scammers are hacking websites powered by WordPress and placing phishing pages inside hidden directories. We share some statistics and tips on recognizing a hacked site. Continue reading Phishing with hacked sites
Collaborate Disseminate
Scammers are hacking websites powered by WordPress and placing phishing pages inside hidden directories. We share some statistics and tips on recognizing a hacked site. Continue reading Phishing with hacked sites
In Q3 2022, the situation on the DDoS market stabilized, and sophisticated attacks on HTTP(S) began to hold sway over simple TCP attacks. Continue reading DDoS attacks in Q3 2022
Politically-motivated cyberattacks dominated the DDoS landscape in the second quarter of 2022 just as they did in Q1. Also, we saw the continuation of a trend that began in spring: an increase in superlong attacks. Continue reading DDoS attacks in Q2 2022
We’ve analyzed the life cycle of phishing pages, how they transform during their active period, and the domains where they’re located. Continue reading The life cycle of phishing pages
The APT trends reports are based on our threat intelligence research and provide a representative snapshot of what we have discussed in greater detail in our private APT reports. This is our latest installment, focusing on activities that we observed during Q3 2021. Continue reading APT trends report Q3 2021
This report shares our insights into the Russian-speaking cybercrime world and the changes in how it operates that have happened in the past five years. Continue reading Russian-speaking cybercrime evolution: What changed from 2016 to 2021
This report shares our insights into the Russian-speaking cybercrime world and the changes in how it operates that have happened in the past five years. Continue reading Russian-speaking cybercrime evolution: What changed from 2016 to 2021
We’ve already looked at links under old YouTube videos or in Wikipedia articles which at some point turned bad and began pointing to partner program pages, phishing sites, or even malware. It was as if the attackers were purposely buying up domains, but such a scenario always seemed to us too complicated. Continue reading Redirect auction
Recently, we identified several cases where Google Analytics was misused: attackers injected malicious code into sites, which collected all the data entered by users, and then sent it via Analytics. Continue reading Web skimming with Google Analytics
Over the past two years we have reviewed how adult content has been used to spread malware and abuse users’ privacy. This is a trend that’s unlikely to go away, especially under current circumstances. While many pornography platforms are enjoying an influx of new users and providing legitimate and safe services, the security risks remain, if not increase. Continue reading Explicit content and cyberthreats: 2019 report