Syndicated Blog

Cofense
Cofense
New “Complaint Stealer” Malware Escalates

New “Complaint Stealer” Malware Escalates, Targeting Cryptocurrency Wallets & Hospitality Sector

By Cofense Intelligence A series of campaigns delivering the newly christened “Complaint Stealer” malware began in mid-October and escalated within the last 2 days. The Complaint Stealer malware is an Information Stealer ...
New “Complaint Stealer” Malware Escalates, Targeting Cryptocurrency Wallets & Hospitality Sector

New “Complaint Stealer” Malware Escalates, Targeting Cryptocurrency Wallets & Hospitality Sector

By Cofense Intelligence A series of campaigns delivering the newly christened “Complaint Stealer” malware began in mid-October and escalated within the last 2 days. The Complaint Stealer malware is an Information Stealer ...
Voice phishing Figure 1

Access Key Used in Voice Messaged Phishing Campaign

By: Robert O’Callaghan A method of communication that remains important in our modern world is that of the voice message. The PDC recently observed a phishing campaign where threat actors included an ...
Figure 1: Malicious Smart Link Structure.

Resurgence of LinkedIn Smart Links Identified in Sizable Credential Phishing Campaign

By: Nathaniel Raymond In 2022, the Cofense Phishing Defense Center (PDC) detected phishing campaigns that used LinkedIn links called Smart Links or “slink” to bypass security email gateway or SEG to deliver ...
Figure 1: Malicious Smart Link Structure.

Resurgence of LinkedIn Smart Links Identified in Sizable Credential Phishing Campaign

By: Nathaniel Raymond In 2022, the Cofense Phishing Defense Center (PDC) detected phishing campaigns that used LinkedIn links called Smart Links or “slink” to bypass security email gateway or SEG to deliver ...

Cofense Named Best Overall Enterprise Email Security Solution of the Year  

| | Press Releases
LEESBURG, Va. – July 26, 2023 – Cofense, the leading provider of phishing detection and response (PDR) solutions, today announced the general availability of Cofense Protect+ MSP, a multi-tenant, advanced email security and ...
Figure 1 - Email

Browser-in-the-Browser (BitB) Attack Takes Advantage of Single-Sign-On Trust

| | Threat Intelligence Insights
Found in environments protected by: Microsoft EOP  By Elmer Hernandez, Cofense Phishing Defense Center  The Phishing Defence Center (PDC) has observed malicious html attachments intended to carry out Browser-in-the-Browser (BitB) attacks. What ...
Figure 1: Example 1 - "Reconnaissance" or "Bait" Email used in real phishing example.

Luxury Hotels Remain Major Target of Ongoing Social Engineering Attack

| | Threat Intelligence Insights
By Dylan Duncan 85% of phishing emails from current campaign have come in the last 60 days; Hospitality Industry Still Very at Risk of Advanced Malware Capable of Ransomware Delivery Tweet This ...
Figure 1: Original Posting of LokiBot by Lokistov.

LokiBot – Phishing Malware Baseline

By Madalynn Carr Report date: 09/07/2023 LokiBot is an Information Stealer with expanding capabilities depending on the threat actor. This malware family was originally written in C++ and targets Windows devices. LokiBot ...

Demystifying Smishing vs Phishing Attacks for a Safer Online Experience

Staying safe online is more important than ever. Cybercriminals are becoming more sophisticated in their methods, making it key for internet users to be well-informed about threats. One common type of attack ...