Cofense Intelligence
@CofenseIntel
Followers
2K
Following
204
Media
573
Statuses
4K
#Phishing and #malware analysis from Cofense Research, Cofense Intelligence and the Phishing Defense Center.
Joined September 2012
๐จ New โComplaint Stealerโ Malware Escalates, Targeting Cryptocurrency Wallets & Hospitality Sector๐จ @CofenseIntel has seen an increase in the last few days in the newly christened #ComplaintStealer malware. Here's what we know so far ๐ https://t.co/M93kFW34Hg
0
1
1
Major U.S. energy org targeted in QR code phishing attack - @billtoulas
https://t.co/bbWlmbRypL
bleepingcomputer.com
A phishing campaign was observed predominantly targeting a notable energy company in the US, employing QR codes to slip malicious emails into inboxes and bypass security.
4
87
134
"Human intuition is often much better at recognizing these differences, so training employees to be vigilant against phishing threats is a critical element of good cyber defense." Another great discovery from @CofenseIntel. Written by @wirelesswench. https://t.co/Ij8klhNmOh
darkreading.com
Secure email gateways and end users alike are being fooled by a cyberattack campaign that's enjoying skyrocketing volumes against businesses in every industry, globally.
0
1
2
โ๐๐ฅ๐๐๐๐๐ก๐ ๐ก๐๐ช๐ฆโ#Emotet has resumed activity this morning, sending emails with attached .zip files that are not password protected. Learn more below โฌ๏ธ https://t.co/kbXBKNGzan
0
17
67
Emotet Update: Loader DLLs for #Emotet botnet- (Epochs 4 and 5) have recently been updated, and #malicious #email dissemination may not be far behind! We're anticipating email activity will resume in the next couple of weeks, if not days. Stay vigilant.
0
2
8
#Emotet is back, and reaching inboxes! #Malicious XLS files are attached to emails, sometimes zipped. #Email subjects appear to be taken from email reply-chains. Cofense #Phishing Defense Center has seen multiple instances of Emotet in corporate inboxes this morning. Example:
0
2
6
โNEW #BEC REPORTโ ๐ช๐ต๐ฎ๐ ๐ต๐ฎ๐ฝ๐ฝ๐ฒ๐ป๐ ๐๐ต๐ฒ๐ป ๐๐ผ๐ ๐ด๐ถ๐๐ฒ #๐๐๐ ๐๐ฐ๐ฎ๐บ๐บ๐ฒ๐ฟ๐ $๐ฑ๐ฌ๐ฌ ๐๐ผ๐ฟ๐๐ต ๐ผ๐ณ ๐ด๐ถ๐ณ๐ ๐ฐ๐ฎ๐ฟ๐ฑ๐? That's what @iHeartMalware wanted to find out. Shocker, they move extremely fast. Read the full report ๐ https://t.co/PFjUQREWWm
1
8
54
Need to know what's up in the phishing threat landscape? Check out our Q3 Phishing Intelligence Trends Review, out now! https://t.co/VKbYbnW5Ib
0
0
0
๐จNEW: Scammers Are Targeting Hurricane Relief Funds From FEMA๐จ @iHeartMalware has evidence that shows scammers are actively sharing tutorials and documents with criminal networks on how to steal relief funds from @fema. Here's what we know โฌ๏ธ https://t.co/Inag9cvVfh
1
16
57
Reply-Chain #phishing email found by our Phishing Defense Center (PDC) after it was missed by #Proofpoint. Reply-chain tactic โ using an existing email threat to tack on the #phishing email โ gaining trust from the recipient to increase the likelihood of them interacting. (1/4)
2
3
24
Microsoft 365 phishing attacks impersonate U.S. govt agencies - @billtoulas
https://t.co/0KI1UuqjrB
bleepingcomputer.com
An ongoing phishing campaign targeting U.S. government contractors has expanded its operation to push higher-quality lures and better-crafted documents.
1
47
66
Ever wonder how a threat actor might selectively target government contractors without even knowing whether the recipient of a #phishing #email is one? We've got details on a long-standing activity set with convincing lures and #spoofed gov websites โก๏ธ https://t.co/OotoQDEjTK
0
0
1
Uber hack updates from @iHeartMalware ๐ VPN credentials compromised via social engineering and hard-coded credentials in scripts led to the compromise of Uber's infrastructure. Also, make sure you use MFA on your VPN and train your users not to leak VPN credentials. #cybersec
0
7
24
#Lampion malware is back, this time targeting @WeTransfer. We found this #phishing attack in environments using #Microsoft as their standard email security. @billtoulas @BleepinComputer #malware #cybersecurity
Lampion malware returns in phishing attacks abusing WeTransfer - @billtoulas
https://t.co/BqXni8RV8T
0
0
0
New insights from the team on a unique attack using customer feedback systems that were utilized to launch #phishing attacks. These emails were found by our Phishing Defense Center in environments protected by Microsoft.
Unusual Microsoft 365 Phishing Campaign Spoofs eFax Via Compromised Dynamics Voice Account https://t.co/47HX6A7Psx by Elizabeth Monalbano #365 #phishing
0
0
2
A well-crafted credential #phishing campaign is specifically targeting the food manufacturing industry, spoofing @USDA. Images below are of the original phish and subsequent landing/harvesting pages. @CofenseIntel customers can find details in Cofense ThreatHQ.
0
2
3
Q2 2022 is in the books! We've distilled some of the most important takeaways for you to catch up on between meetings today, but if you want the full picture of today's #Phishing Threat Landscape, there's also a link to download the complete report here:
0
0
0
Check out our recently released Business Email Compromise (BEC) study. Cofense Intelligence & @CofenseLabs teams phished hundreds of scammers and gained some amazing insights into their techniques and mindset! https://t.co/53RIQCHSmV
0
2
9