Compromised email accounts can be bought on Dark Web markets for a relatively low fee (price range is $8-$25). In a targeted attack, the receiving end knows the company or maybe even the person who allegedly sent the mail. The emails are sent from compromised accounts which is a way to establish a level of trust without requiring a high skill level on the attacker’s side. Its most common method is to send targeted phishing emails with links to malware hosted on legitimate services like Dropbox and Onehub. Over the years, the group has deployed many different tactics, including Log4Shell attacks. The group is tracked by various vendors under other names such as Boggy Serpens, Cobalt Ulster, Earth Vetala, Mercury, Seedworm, Static Kitten, and TEMP.Zagros. The group is believed to have targeted a variety of government and private organizations across various sectors, including telecommunications, local governments, defense, oil, and natural gas. MuddyWater is suspected of being associated with Iran's Ministry of Intelligence and Security. The targets in this campaign are reportedly in Armenia, Azerbaijan, Egypt, Iraq, Israel, Jordan, Oman, Qatar, Tajikistan, and the United Arab Emirates. Researchers have uncovered a new campaign by hacking group MuddyWater, aka Static Kitten, in which a legitimate remote access tool is sent to targets from a compromised email account.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |