spear phishing

  1. Beware Microsoft 365 OAuth Phishing: Protect Your Organization from Diplomatic Cyberattacks

    If you’ve already started mentally composing your next big idea in Outlook, you might want to hit “Save as Draft” for a moment—there’s a new cyberattack in town, and it’s got your Microsoft 365 credentials written all over it... possibly in Cyrillic. A New Breed of Phishing: Sophisticated Social...
  2. Russian Hackers Exploit Messaging Apps to Target Microsoft Accounts and Human Rights Groups

    Russian cybercriminals have added a new feather to their well-worn capes of mischief, now targeting Microsoft account holders by exploiting the trust we put into Signal and WhatsApp—apps once considered bastions of privacy. If you’re an IT professional, human rights advocate, or simply a...
  3. Russian Threat Actors Exploit OAuth to Hack Microsoft 365 Accounts of Ukraine-Linked NGOs

    In a recent development, Russian threat actors identified as UTA0352 and UTA0355 have been targeting Ukraine-linked nongovernmental organizations (NGOs) by exploiting the OAuth protocol to compromise Microsoft 365 accounts. The Mechanics of the Attack The attackers initiated their campaign with...
  4. New Spear-Phishing Tactics Target Microsoft 365 Users: What You Need to Know

    In the ever-shifting realm of cybersecurity, threat actors continue to refine their methods—and the latest report from KnowBe4’s CyberheistNews Vol 15 #08 reveals a chilling new approach. Russian threat groups, including the notorious SVR’s Cozy Bear, are exploiting a little-known authentication...
  5. Evolving Cyber Threats: Russian Spear-Phishing Attacks on Microsoft 365

    Cybercriminals continue to evolve their tactics, and the latest intelligence from KnowBe4 reveals yet another level of sophistication in spear-phishing campaigns. In a detailed blog update from KnowBe4, Russian threat actors—including groups linked to the SVR’s notorious Cozy Bear—are leveraging...
  6. Mustang Panda Exploits Microsoft Tool to Evade Antivirus Security

    In a striking demonstration of cybercrime ingenuity, a sophisticated Chinese APT group—known as Mustang Panda—has been found exploiting a legitimate Windows tool to slip past antivirus defenses. This emerging threat, uncovered by threat researchers at Trend Micro, involves the abuse of...
  7. Safeguarding Microsoft 365: How Russian Threat Actors Exploit Device Code Authentication

    In today’s rapidly evolving cybersecurity landscape, even the most trusted platforms can become targets for sophisticated attacks. Recent research from Volexity, as featured on the KnowBe4 Blog, has revealed that Russian threat actors—among them the notorious SVR-linked Cozy Bear—are leveraging...
  8. Spear-Phishing Alert: Device Code Authentication Targeted by Cybercriminals

    In a sophisticated twist on traditional cyberattacks, a spear-phishing campaign is now targeting Microsoft 365 accounts by hijacking the genuine device code authentication process. This emerging attack vector, steeped in deception and ingenuity, transforms a legitimate login mechanism into a...
  9. Star Blizzard's Latest Cyberattack: Spear-Phishing on WhatsApp Unveiled

    The world of cybersecurity continues to be as exhilarating as a high-speed car chase in a spy thriller, and as of mid-November 2024, the antics of Russian threat actor Star Blizzard, also known to some as SEABORGIUM, have taken center stage yet again. This time, their target is none other than...
  10. CISA Warns of Spear-Phishing Campaign Using Malicious RDP Files

    In a chilling reminder of the ever-looming cybersecurity threats we face, the Cybersecurity and Infrastructure Security Agency (CISA) recently announced a widespread spear-phishing campaign targeting organizations across various sectors, including government and information technology. Threat...
  11. AA21-201A: Chinese Gas Pipeline Intrusion Campaign, 2011 to 2013

    Original release date: July 20, 2021 Summary This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework, Version 9. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques. Note: CISA released technical information...
  12. AA21-148A: Sophisticated Spearphishing Campaign Targets Government Organizations, IGOs, and NGOs

    Original release date: May 28, 2021 Summary The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) are responding to a spearphishing campaign targeting government organizations, intergovernmental organizations (IGOs), and non-governmental...
  13. AA21-076A: TrickBot Malware

    Original release date: March 17, 2021 Summary This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques. The Cybersecurity and Infrastructure Security Agency...
  14. AA21-048A: AppleJeus: Analysis of North Korea’s Cryptocurrency Malware

    Original release date: February 17, 2021 Summary This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques. This joint advisory is the result of analytic efforts...
  15. AA20-301A: North Korean Advanced Persistent Threat Focus: Kimsuky

    Original release date: October 27, 2020 Summary This advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) version 7 framework. See the ATT&CK for Enterprise version 7 for all referenced threat actor tactics and techniques. This joint cybersecurity advisory...
  16. AA20-296B: Iranian Advanced Persistent Threat Actors Threaten Election-Related Systems

    Original release date: October 22, 2020 Summary The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) are warning that Iranian advanced persistent threat (APT) actors are likely intent on influencing and interfering with the U.S. elections to...
  17. AA20-266A: LokiBot Malware

    Original release date: September 22, 2020 Summary This Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise frameworks for all referenced threat actor techniques. This product was written by the Cybersecurity and...
  18. AA20-258A: Chinese Ministry of State Security-Affiliated Cyber Threat Actor Activity

    Original release date: September 14, 2020 Summary The Cybersecurity and Infrastructure Security Agency (CISA) has consistently observed Chinese Ministry of State Security (MSS)-affiliated cyber threat actors using publicly available information sources and common, well-known tactics...
  19. VIDEO AA20-049A: Ransomware Impacting Pipeline Operations

    Original release date: February 18, 2020 | Last revised: June 30, 2020 Summary Note: This Activity Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™) framework. See the MITRE ATT&CK for Enterprise and Link Removed frameworks for all referenced threat actor...
  20. VIDEO AA20-049A: Ransomware Impacting Pipeline Operations

    Original release date: February 18, 2020 Summary Note: This Activity Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™) framework. See the MITRE ATT&CK for Enterprise and Link Removed frameworks for all referenced threat actor techniques and mitigations. CISA...