Author name: William Thomas

SolarWinds Saga – Where Do We Stand?

The investigation into the SolarWinds supply-chain attack continues apace. In this follow-up to our previous blog published in the immediate aftermath of the attack (see here), we cover some of the major discoveries concerning what is quickly becoming one of the costliest cyberattacks in history, both monetarily and in terms of intelligence lost. The current […]

SolarWinds Saga – Where Do We Stand? Read More »

Credential harvesting campaign targets government, military, and private sector organisations

Cyjax analysts have uncovered a mass credential harvesting campaign targeting a wide range of sectors, including government, military, law enforcement, healthcare, finance, technology, manufacturing, and energy. Key campaign attributes Malicious use of the SendGrid email marketing service to distribute URLs to the landing pages. Phishing emails leverage an image with an embedded URL that masquerades

Credential harvesting campaign targets government, military, and private sector organisations Read More »

Cyjax’s Top 10 of 2020

2020 has seen a wide range of attacks and the evolution of the threat landscape. Ransomware attacks have dominated the headlines, alongside state-sponsored APT groups targeting the global COVID-19 response effort. New threat actors have emerged, and well-established groups have persisted undeterred, using upgraded tactics, techniques, and procedures (TTPs). #1 Global malicious email campaigns Throughout

Cyjax’s Top 10 of 2020 Read More »

Gone Phishin’ – Cybersecurity presentation with William Thomas

On 30 October, Cyjax analyst William Thomas presented his talk on the phishing threat landscape at BeerCon2: Rise of the Rookie. The presentation was wide-ranging and included an exploration of threat actors leveraging the cloud to support delivery, bypassing defence mechanisms, and the top-tier threats in this ecosystem. Will’s talk can be found on the

Gone Phishin’ – Cybersecurity presentation with William Thomas Read More »

Office 365 credential-harvesting campaign leveraging Basecamp

Cyjax analysts recently uncovered an Office 365 credential-harvesting campaign that masquerades as “A Message from Your CEO”. The delivery system leveraged in these attacks uses multiple techniques to bypass secure email gateways (SEG), one of which has surfaced again in a BazarLoader infection chain. This technique is effective because Basecamp and Google Cloud hosting are

Office 365 credential-harvesting campaign leveraging Basecamp Read More »

Credential harvesting campaigns target governments and cybersecurity companies

Threat analysts at Cyjax have uncovered multiple mass credential harvesting campaigns that have recently been targeting cybersecurity companies, government entities, and organisations in a range of other sectors. Reverse engineering these campaigns revealed the attacker’s infrastructure and stolen data store. Throughout July and August 2020, we detected two separate credential harvesting campaigns targeting accounts for

Credential harvesting campaigns target governments and cybersecurity companies Read More »

Scroll to Top