Recent Posts

Recent Blog Posts

The PhishLabs Blog

Breaking Down the Latest O365 Phishing Techniques

Posted by Jessica Ellis on Apr 1, '21

Microsoft Office 365 phish are some of the most common threats that reach end users inboxes. Over the course of a two-year period, PhishLabs has observed that O365 phish have accounted for more than half of all reported phish by enterprises - by a significant margin. 
Read More

Most Phishing Attacks Use Compromised Domains and Free Hosting

Posted by The PhishLabs Team on Mar 24, '21

To stage a phishing site, cybercriminals have several options. They can use a legitimate domain that has been compromised, they can abuse free hosting services, or they can register their own domain. Understanding the prevalence of each scenario is fundamental to detecting and mitigating these threats as early in the attack process as possible (including before they’ve been launched). PhishLabs recently analyzed more than 100,000 phishing sites to establish how many used compromised domains, free hosting, or maliciously-registered domains.  
Read More

Topics: Domains

Surge in ZLoader Attacks Observed

Posted by Jessica Ellis on Feb 23, '21

PhishLabs has observed a spike in malicious emails distributing ZLoader malware. The spike is notably one of the greatest upticks for a single payload observed in a 24-hour period over the past year, and is the first significant sign that another botnet may be stepping up in the aftermath of the Emotet takedown
Read More

Topics: Banking Trojan, Ransomware

OSINT: Mapping Threat Actor Social Media Accounts

Posted by The PhishLabs Team on Feb 15, '21

A threatening social media post targeting an executive, employee, brand, or any other asset often has merit to it, and investigating the online accounts associated with the threat actor is imperative in the process of assessing risk. By mapping social media accounts operated by the threat actor, as well as general social media risk monitoring, you can build a more comprehensive profile of the user and better assess the risk posed. It can also reveal the real-life identity of the user if they have attempted to remain anonymous.
 
We recently published a blog focused on the importance of determining a social media user’s location, and the same is true in gauging the behavior of an online user through posted content across their social media accounts. Past activity, interactions, and anonymous accounts may all help to determine the level of risk and can provide security teams valuable insight into whether or not mitigation should be pursued. 
 
Read More

Topics: OSINT

Emotet Dismantled, Trickbot, ZLoader, and BazarLoader Step In

Posted by Jessica Ellis on Feb 9, '21

Recently, we published a piece highlighting early stage loaders often used in ransomware attacks. One of the most prolific was Emotet, which has since been taken down via a coordinated, multi-national effort. How will this impact the threat landscape? In this post, we take a look at loader activity in the aftermath of the Emotet takedown.
 
Read More

Topics: Malware, Ransomware

Threat Actor using Social Media to Scam Credit Union Members

Posted by Jessica Ellis on Feb 1, '21

Recently, PhishLabs mitigated an attack using a fake social media page to steal the credentials of a credit union (CU) customer. Social media is increasingly used as a vehicle for attacks, and organizations should adopt  social media protection measures to stay ahead of threats. The below demonstrates how the attack was executed.
Read More

Topics: Social Media Threats

Sharp Increase in Emotet, Ransomware Droppers

Posted by Jessica Ellis on Jan 26, '21

Ransomware continues to be one of the most  impactful threats to enterprises. Aside from external vulnerabilities, its primary delivery method remains email phishing, with links or attachments containing early stage loaders. These loaders initiate attacks by compromising systems and installing additional malware. PhishLabs has analyzed these early stage loaders and observed a dramatic increase in ransomware droppers delivered via email. Below are the findings. 
 
Read More

Topics: Ransomware

Using Social Media OSINT to Determine Actor Locations

Posted by The PhishLabs Team on Jan 19, '21

Read More

Activists Leak Data Stolen in Ransomware Attacks

Posted by Jessica Ellis on Jan 7, '21

The activist group known as Distributed Denial of Secrets (DDoSecrets) has published almost one terabyte of data originally leaked to dark web sites by ransomware operators. In addition, they are privately making another 1.9 terabytes of stolen data available to journalists or academic researchers. 
Read More

Look-alike Domain Mitigation: Breaking Down the Steps

Posted by The PhishLabs Team on Dec 21, '20

Look-alike domains remain some of the most consistent elements of cyber attacks targeting organizations. At a high-level, there are two ways to mitigate the threat of a look-alike domain: remove the threat completely by taking it offline, or block attacks on your users by implementing IT security controls. If we dissect the construction of a look-alike domain, we see where each step in its creation represents a point where actions can be taken to mitigate the threat. 
Read More

What's this all about?

The PhishLabs Blog is where we share our insights and thoughts on cybercrime and online fraud.

Recent Posts

Subscribe to Email Updates

Posts by Topic

see all