Content area

Abstract

Social engineering attacks Social engineering attacks, especially cybercriminals targeting enterprises with fake overdue invoices, continued to be a big endpoint threat in Q1. [...]we observed numerous abuses of the Windows Background Intelligent Transfer Service (BITS) (T1197) – a tool built into Windows used by administrators to transfer files between web servers and file shares [8]. [1] https://hp.com/wolf [2] WikiLoader (Malware Family) (fraunhofer.de) [3] CWE - CWE-601: URL Redirection to Untrusted Site ('Open Redirect') (4.15) (mitre.org) [4] Obfuscated Files or Information: Encrypted/Encoded File, Sub-technique T1027.013 - Enterprise | MITRE ATT&CK® [5] Web Service, Technique T1102 - Enterprise | MITRE ATT&CK® [6] Hijack Execution Flow: DLL Side-Loading, Sub-technique T1574.002 - Enterprise | MITRE ATT&CK® [7] LOLBAS (lolbas-project.github.io) [8] BITS Jobs, Technique T1197 - Enterprise | MITRE ATT&CK® ------------

Details

10000008
Title
The latest trends in the threat landscape
Publication title
CIO; Framingham
Publication year
2024
Publication date
Nov 1, 2024
Publisher
Foundry
Place of publication
Framingham
Country of publication
United States
ISSN
08949301
Source type
Trade Journal
Language of publication
English
Document type
News
ProQuest document ID
3123235807
Document URL
https://www.proquest.com/trade-journals/latest-trends-threat-landscape/docview/3123235807/se-2?accountid=208611
Copyright
Copyright Foundry Nov 1, 2024
Last updated
2024-11-02
Database
ProQuest One Academic