sekoia_io Profile Banner
Sekoia.io Profile
Sekoia.io

@sekoia_io

Followers
4K
Following
333
Media
231
Statuses
828

A #SOCplatform boosted by #AI and #threatintelligence, combining #SIEM, #SOAR, #Automation in a single solution. Used by End-users, MSSP and APIs

Paris, France
Joined September 2017
Don't wanna be here? Send us removal request.
@sekoia_io
Sekoia.io
2 months
📝 Our latest #TDR report delivers an in-depth analysis of Adversary-in-the-Middle (#AitM) #phishing threats - targeting Microsoft 365 and Google accounts - and their ecosystem. This report shares actionable intelligence to help analysts detect and investigate AitM phishing.
Tweet media one
1
28
63
@sekoia_io
Sekoia.io
24 days
💡 Curious how the full infection chain works? We have broken it all down for you here 😈👇.
Tweet card summary image
blog.sekoia.io
Discover how Lazarus leverages fake job sites in the ClickFake Interview campaign targeting crypto firms using the ClickFix tactic.
0
3
8
@sekoia_io
Sekoia.io
24 days
Multiple fake employees are now promoting this bogus company on LinkedIn:.- hxxps://www.linkedin.com/in/serhii-s-723b3435b/.- hxxps://www.linkedin.com/in/vitalii-bilousov-141658341/.- hxxps://www.linkedin.com/in/jose-rincon-61a97521/. Also on Telegram:.- hxxps://t.me/waventic.
1
1
3
@sekoia_io
Sekoia.io
24 days
No OS left behind. It happily infects Windows, macOS, and Linux systems. Unlike before, they're not impersonating a real crypto company. Instead, they have built a completely #fake brand from scratch: https://waventic[.]com.
Tweet media one
1
2
2
@sekoia_io
Sekoia.io
24 days
And everything is hosted on a single platform. At the end of the process, you're politely asked to download a 'driver' to magically make your webcam work ✨.Spoiler alert: it's not a driver, it's #GolangGhost, a custom malware with remote access capabilities.
1
2
2
@sekoia_io
Sekoia.io
24 days
Well, this campaign is still alive and evolving. Since then, dozens of new domains have surfaced. And in June, things got even more interesting 👀 . We came across a new site: apply[.]waventic[.]com . This time, it has been upgraded: fresh visuals, new interview questions. .
1
2
2
@sekoia_io
Sekoia.io
24 days
🔥 Hot summer, sizzling crypto. and scammers turning up the heat 🔥. Back in March, Sekoia #TDR team published a deep-dive report on a #Lazarus cluster we dubbed #ClickFake Interview, leveraging the #ClickFix technique in their #ContagiousInterview campaign.
Tweet media one
1
9
23
@sekoia_io
Sekoia.io
1 month
You can find the phishing kit sheets on our blog: And on our Community GitHub:
Tweet card summary image
blog.sekoia.io
Explore the 2025 landscape of Adversary-in-the-Middle phishing threats with data, trends, and top detection insights.
0
4
5
@sekoia_io
Sekoia.io
1 month
These sheets aim to assist SOC analysts in detecting and investigating #AitM #phishing compromises by offering context, technical details, infrastructure overview, detection opportunities, and more. All are available in the PDF report and our Community GitHub.
Tweet media one
1
6
7
@sekoia_io
Sekoia.io
1 month
A few weeks ago, we published our global analysis of Adversary-in-the-Middle #phishing threats, providing actionable intelligence on multiple #AitM phishing kits. This report includes 11 sheets covering the most widespread #AitM phishing kits as of Q1 2025.
Tweet media one
1
22
52
@sekoia_io
Sekoia.io
2 months
RT @crep1x: We are excited to share our latest blogpost on AitM phishing threats - covering common TTPs, the PhaaS ecosystem, the most wide….
0
10
0
@sekoia_io
Sekoia.io
2 months
We hope SOC, CERT and CTI teams find our global analysis of AitM phishing threats both insightful and actionable. Dive in here ⬇️.
Tweet card summary image
blog.sekoia.io
Explore the 2025 landscape of Adversary-in-the-Middle phishing threats with data, trends, and top detection insights.
1
4
10
@sekoia_io
Sekoia.io
2 months
🕵️ We also highlight multiple detection opportunities for AitM attacks in Microsoft Entra environments. All technical details are available on our community GitHub:
Tweet media one
1
4
7
@sekoia_io
Sekoia.io
2 months
🎣 Leveraging our telemetry and proactive hunting, we ranked the most widespread AitM phishing kits - #Tycoon2FA, #Storm1167, #NakedPages, #Sneaky2FA, and more. Additionally, the article includes summary sheets covering 11 AitM phishing kits.
Tweet media one
1
1
3
@sekoia_io
Sekoia.io
2 months
🔍 Phishing-as-a-Service (#PhaaS) is driving a wave of large-scale, sophisticated attacks against organisations. In our new blogpost, we provide an overview of the key techniques, tactics and social engineering schemes that cybercriminals use in AitM phishing attacks.
Tweet media one
1
2
4
@sekoia_io
Sekoia.io
3 months
🧀 The Sharp Taste of #Mimo’lette: Analyzing Mimo’s Latest Campaign targeting #Craft CMS.
0
6
12
@sekoia_io
Sekoia.io
3 months
🪤 Sekoia #TDR's new exclusive research uncovers the #ViciousTrap, a honeypot network deployed on compromised edge devices.
Tweet card summary image
blog.sekoia.io
Discover ViciousTrap, a newly identified threat who turning edge devices into honeypots en masse targeting
0
5
20
@sekoia_io
Sekoia.io
4 months
Our new report describes one of the latest observed infection chains (delivering #AsyncRAT) relying on the #Cloudflare tunnel infrastructure and the attacker’s #TTPs with a principal focus on detection opportunities.
Tweet media one
1
14
40
@sekoia_io
Sekoia.io
4 months
Since the apparition of the #Interlock ransomware, the Sekoia #TDR team observed its operators evolving, improving their toolset (#LummaStealer #BerserkStealer), and leveraging new techniques such as #ClickFix to deploy the ransomware payload.
Tweet media one
0
16
37
@sekoia_io
Sekoia.io
4 months
🎉 It's not about a CTI investigation or a Detection Engineering topic, but today we are happy to announce that has raised €26m! .
Tweet media one
0
6
14