Threat Actors Leverage File-Sharing Service and Reverse Proxies for Credential Harvesting

Post a Comment

We analyzed a phishing campaign involving malicious emails containing a link to a file-sharing solution, which further leads to a PDF document with a secondary link designed to steal login info and session cookies.

Article Link: Threat Actors Leverage File-Sharing Service and Reverse Proxies for Credential Harvesting

1 post - 1 participant

Read full topic



Malware Analysis, News and Indicators - Latest topics
Sp123
"The real threat is actually not when the computer begins to think like a human, but when humans begin to think like computers."

Post a Comment