Proofpoint researchers describe a campaign targeting German-speaking regions in which credential phishing leads to an Android banking Trojan and concludes with an additional phishing scheme executed by the banking Trojan itself.
Proofpoint researchers detail the history of the threat actor known as the “KovCoreG Gang” and the evolution of the malicious tools they use across a variety of campaigns.
Proofpoint researchers detail the trends and notable events from the third quarter of 2017.
Proofpoint researchers discover one of the first in-the-wild use of the Flash vulnerability CVE-2017-11292 in malicious document attacks by APT28.
Proofpoint researchers track an actor and their attacks on targets with potential military and government interests.
Proofpoint researchers describe recent malvertising activity by the so-called “KovCoreG group” impacting several high-ranking websites.
Proofpoint researchers detail the malware and notable campaigns associated with one of the most prolific threat actors: TA505.
Proofpoint researchers track versions of the Retefe banking Trojan that use the now infamous EternalBlue exploit to move within networks after initial infections.
As with other recent high-profile elections, Proofpoint researchers have observed a direct correlation among spam volumes, major events, and opinion polls in the German national election.
Proofpoint researchers track a new campaign by a Chinese APT actor using the promise of leaked Game of Thrones content in lures delivering a well-known RAT.