In a ___ Blog post, Microsoft 365. The Defender Threat Intelligence team shares that the campaign was launched to obtain usernames and passwords, but has since collected other information, such as IP addresses and the location of its victims, which the attackers have used. Later used in intrusion attempts.
The researchers note, “This phishing campaign exemplifies the threat of modern email.
We’re looking at how our readers use VPNs with streaming sites like Netflix so we can improve our content and offer better advice. This survey will take no more than 60 seconds of your time, and we would appreciate it if you would share your experiences with us.
Because the campaign includes various details about targets, such as their e-mail address and company logo, Microsoft believes the attackers obtained the details during an earlier espionage exercise.
A constantly evolving threat.
Security researchers note that the campaign is also a great example of how email-based attacks keep trying to bypass. Email security Solution.
For example, in order to keep security teams at bay, the attackers changed their methods of ambiguity and encryption on average every 37 days.
“These attackers use a number of encoding techniques using plain text HTML code, including old and unusual encryption methods such as Morse code, to hide parts of these attacks.” Directories and encoded scripts. Is called by
Comparing it to a puzzle, the researchers noted that the pieces of the campaign appear to be harmless to the individual, and only when they are found will their nefarious intentions be revealed.