lateral movement

  1. Akira Ransomware: How Unsecured IoT Devices are the New Target

    Hackers are continuously upping their game, and the latest twist in the ransomware saga comes from a group known as Akira. In 2024, Akira ransomware has accounted for approximately 15% of cybersecurity incidents, leveraging an ingenious—and unsettling—tactic: using unsecured IoT devices like...
  2. How Akira Ransomware Weaponized an Unsecured Webcam to Bypass Enterprise Security

    The story of how the Akira ransomware group weaponized an unsecured webcam to circumvent enterprise-grade security—and the lessons it offers—reads like a stark warning for every organization, large or small, that believes their digital moats are impenetrable. In an age where Endpoint Detection...
  3. Microsoft Defender for Endpoint: Enhancing Security with Automatic IP Containment

    Introduction Microsoft Defender for Endpoint is receiving a significant upgrade that aims to tighten security defenses by automatically blocking unwanted traffic from undiscovered endpoints. This innovative feature is designed to stem malicious lateral movement within network environments...
  4. HubPhish Campaign: How Cybercriminals Exploit Trusted Platforms like HubSpot

    If you thought phishing was stuck sending shady attachments through email, think again. Today’s cybercriminals are crafting smarter, more insidious attacks, like the recent HubPhish campaign. This targeted operation leveraged none other than HubSpot, a widely trusted marketing and sales...
  5. AA21-200B: Chinese State-Sponsored Cyber Operations: Observed TTPs

    Original release date: July 19, 2021 Summary This advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework, Version 9, and MITRE D3FEND™ framework, version 0.9.2-BETA-3. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques...
  6. AA21-200A: Tactics, Techniques, and Procedures of Indicted APT40 Actors Associated with China’s MSS Hainan State Security Department

    Original release date: July 19, 2021 Summary This Joint Cybersecurity Advisory was written by the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) to provide information on a Chinese Advanced Persistent Threat (APT) group known in open-source...
  7. AA20-280A: Emotet Malware

    Original release date: October 6, 2020 Summary This Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise framework for all referenced threat actor techniques. This product was written by the Cybersecurity and...
  8. AA20-107A: Continued Threat Actor Exploitation Post Pulse Secure VPN Patching

    Original release date: April 16, 2020 | Last revised: June 30, 2020 Summary Note: This Activity Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise framework for all referenced threat actor techniques and mitigations...
  9. AA20-107A: Continued Threat Actor Exploitation Post Pulse Secure VPN Patching

    Original release date: April 16, 2020 Summary Note: This Activity Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise framework for all referenced threat actor techniques and mitigations. This Alert provides an update...
  10. AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide

    Original release date: October 11, 2018 Summary This report is a collaborative research effort by the cyber security authorities of five nations: Australia, Canada, New Zealand, the United Kingdom, and the United States.Link Removed[2][3][4]Link Removed In it we highlight the use of five...