logo

tldr - powered by Generative AI

Ongoing social engineering campaign targets enterprises with spam emails and phone calls to gain initial access for exploitation.
  • Threat actors overwhelm users with spam emails and phone calls, offering assistance to download remote monitoring software.
  • Emails appear as newsletter sign-up confirmations to bypass email protection solutions.
  • Impersonating as IT team, threat actors trick users into installing remote desktop software to resolve email issues.
  • Remote access is used to download additional payloads for credential harvesting and persistence on hosts.
  • Campaign observed attempting to deploy Cobalt Strike beacons within compromised networks.
  • Attack chain delivers remote monitoring tools like ConnectWise ScreenConnect and NetSupport RAT, associated with FIN7 actors.
  • Phorpiex botnet used to distribute LockBit Black ransomware in a high-volume campaign.
  • Mallox ransomware group brute-forces Microsoft SQL servers to deploy Mallox file-encrypting malware via PureCrypter loader.
Tags:  
social engineering
spam emails
phone calls
remote access
credential harvesting

Post a comment

Related articles