What tracking an attacker email infrastructure tells us about persistent cybercriminal operations

Credit to Author: Eric Avena| Date: Mon, 01 Feb 2021 17:00:06 +0000

Sweeping research into massive attacker infrastructures, as well as our real-time monitoring of malware campaigns and attacker activity, directly inform Microsoft security solutions, allowing us to build or improve protections that block malware campaigns and other email threats, both current and future, as well as provide enterprises with the tools for investigating and responding to email campaigns in real-time.

The post What tracking an attacker email infrastructure tells us about persistent cybercriminal operations appeared first on Microsoft Security.

Read more

Threat actor leverages coin miner techniques to stay under the radar – here’s how to spot them

Credit to Author: Eric Avena| Date: Mon, 30 Nov 2020 22:30:31 +0000

BISMUTH, which has been running increasingly complex cyberespionage attacks as early as 2012, deployed Monero coin miners in campaigns from July to August 2020. The group’s use of coin miners was unexpected, but it was consistent with their longtime methods of blending in.

The post Threat actor leverages coin miner techniques to stay under the radar – here’s how to spot them appeared first on Microsoft Security.

Read more