
Natalya Shornikova
Articles
-
May 6, 2024 |
securelist.com | Andrey Gunkin |Alexander Fedotov |Natalya Shornikova |Dmitry Kalinin
Money is what always attracts cybercriminals. A significant share of scam, phishing and malware attacks is about money. With trillions of dollars of digital payments made every year, it is no wonder that attackers target electronic wallets, online shopping accounts and other financial assets, inventing new techniques and reusing good old ones.
-
Apr 22, 2024 |
securelist.com | Andrey Gunkin |Alexander Fedotov |Natalya Shornikova |Eduardo Ovalle
We continue covering the activities of the APT group ToddyCat. In our previous article, we described tools for collecting and exfiltrating files (LoFiSe and PcExter). This time, we have investigated how attackers obtain constant access to compromised infrastructure, what information on the hosts they are interested in, and what tools they use to extract it.
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →