WMC Global Threat Intelligence Team

WMC Global Threat Intelligence Team


Recent posts by WMC Global Threat Intelligence Team

2 min read

Office 365 Phishing Uses Image Inversion to Bypass Detection

By WMC Global Threat Intelligence Team on 11/4/20 9:00 AM

Many detection engines crawl websites and follow links to determine whether a website is malicious or masquerading as another. The difficulty threat actors face combatting these advanced technologies is that their phishing websites must bypass the detection engine, while simultaneously gaining a victim’s trust by displaying images and themes that mimic the targeted website.

Topics: Phishing Microsoft Office 365 Image Inversion
4 min read

Bank of Guam Phishing Campaign Analysis

By WMC Global Threat Intelligence Team on 10/30/20 1:00 PM

Topics: Phishing Phishing Kit Banking 2FA Bank of Guam Two-Factor Authentication
9 min read

Netflix-Branded Mobile Phishing Campaigns in August

By WMC Global Threat Intelligence Team on 9/23/20 9:30 AM

Threat actors target a range of services often either due to credential resale value or to target higher value accounts in credential stuffing campaigns. Last month, WMC Global tracked three unique Netflix-branded phishing campaigns that resulted in over 390,000 unique URLs (Figure 1). These campaigns were solely distributed via text messages (SMS) to US mobile numbers. WMC Global’s analysis in the campaigns provides unparalleled visibility into Netflix-branded phishing attacks.

Topics: SMS Attack Phishing Phishing Kit Netflix
6 min read

Phishing Kit Exfiltration Methods

By WMC Global Threat Intelligence Team on 8/19/20 9:05 AM

At WMC Global, we analyze hundreds of phishing kits every week, which use a range of lures to steal credentials from victims, and we examine the exfiltration mechanisms used by threat actors to harvest stolen credentials from victims. The majority of phishing kits use a simple email exfiltration method to send victims’ data—compromised credentials—to a mailbox owned by the threat actor; the second most common method of exfiltration was writing the stolen data to a file stored on the website host. Though there are many exfiltration methods available to threat actors, our analysis found email and file write exfiltration to be amongst the most common.

Topics: Phishing Phishing Kit Data Exfiltration
4 min read

Cazanova Phisher Steals From Himself

By WMC Global Threat Intelligence Team on 8/14/20 10:30 AM

Using a variety of tools and techniques, WMC Global actively tracks threat actors engaged in credential phishing attacks—from canary detection to phishing site launch to the selling of compromised credentials, WMC Global monitors phishing activities the world over. 

Topics: Phishing Phishing Kit Cazanova Phoenix Coder Threat Intel
3 min read

COVID Update

By WMC Global Threat Intelligence Team on 8/12/20 10:00 AM

Throughout the early months of the COVID-19 pandemic, when companies and consumers were forced to adapt to remote working arrangements and adopt digital interactions with family and friends to stay connected, PhishFeed witnessed a stark rise in phishing attacks, particularly in attacks configured to show only on mobile devices. Since January 2020, PhishFeed has collected tens of thousands of phishing URLs and kits, many of which were branded with COVID-themed domains, URLs, or attack content by the responsible threat actors, as seen in Figure 1.

Topics: Covid SMS Attack Phishing Covid-19
25 min read

Deep Dive Into Cazanova Morphine Phishing Kit

By WMC Global Threat Intelligence Team on 8/10/20 9:00 AM

WMC Global proactively tracks phishing sites and analyzes the backend code to understand tactics, techniques, and procedures (TTPs) used by threat actors to steal consumers' credentials and other personally identifiable information (PII) for financial gain.

Topics: Deep Dive Kit Analysis Phishing Phishing Kit Cazanova