Cofense Intelligence (@cofenseintel) 's Twitter Profile
Cofense Intelligence

@cofenseintel

#Phishing and #malware analysis from Cofense Research, Cofense Intelligence and the Phishing Defense Center.

ID: 847956750

linkhttps://cofense.com/product-services/phishing-intelligence/ calendar_today26-09-2012 19:15:29

3,3K Tweet

2,2K Followers

92 Following

Cofense Intelligence (@cofenseintel) 's Twitter Profile Photo

Check out our recently released Business Email Compromise (BEC) study. Cofense Intelligence & @CofenseLabs teams phished hundreds of scammers and gained some amazing insights into their techniques and mindset! cofense.com/blog/phishing-โ€ฆ

Cofense Intelligence (@cofenseintel) 's Twitter Profile Photo

Q2 2022 is in the books! We've distilled some of the most important takeaways for you to catch up on between meetings today, but if you want the full picture of today's #Phishing Threat Landscape, there's also a link to download the complete report here: sprou.tt/1j4DJtyrL27

Cofense Intelligence (@cofenseintel) 's Twitter Profile Photo

Flash Alert! Dozens of C-level executives (mostly CFOs) have been directly targeted in an ongoing #phishing campaign #spoofing Docusign. Cofense Intelligence customers can read the full alert in our ThreatHQ portal, but here's a closeup look at an actual email from the campaign.

Flash Alert! Dozens of C-level executives (mostly CFOs) have been directly targeted in an ongoing #phishing campaign #spoofing Docusign.  Cofense Intelligence customers can read the full alert in our ThreatHQ portal, but here's a closeup look at an actual email from the campaign.
Cofense Intelligence (@cofenseintel) 's Twitter Profile Photo

A well-crafted credential #phishing campaign is specifically targeting the food manufacturing industry, spoofing Dept. of Agriculture. Images below are of the original phish and subsequent landing/harvesting pages. Cofense Intelligence customers can find details in Cofense ThreatHQ.

A well-crafted credential #phishing campaign is specifically targeting the food manufacturing industry, spoofing <a href="/USDA/">Dept. of Agriculture</a>. Images below are of the original phish and subsequent landing/harvesting pages. <a href="/CofenseIntel/">Cofense Intelligence</a> customers can find details in Cofense ThreatHQ.
Cofense Intelligence (@cofenseintel) 's Twitter Profile Photo

The #phishers know we're all thinking it's about time for #vacation, and they are taking advantage. Don't fall for #summer vacation #phish! Example below. Make sure your employees are aware of phish like this. However, we don't recommend running simulations with this theme.

The #phishers know we're all thinking it's about time for #vacation, and they are taking advantage. Don't fall for #summer vacation #phish! Example below. Make sure your employees are aware of phish like this. However, we don't recommend running simulations with this theme.
Cofense Intelligence (@cofenseintel) 's Twitter Profile Photo

New insights from the team on a unique attack using customer feedback systems that were utilized to launch #phishing attacks. These emails were found by our Phishing Defense Center in environments protected by Microsoft.

Cofense Intelligence (@cofenseintel) 's Twitter Profile Photo

#Lampion malware is back, this time targeting WeTransfer. We found this #phishing attack in environments using #Microsoft as their standard email security. Bill Toulas BleepingComputer #malware #cybersecurity

Cofense (@cofense) 's Twitter Profile Photo

Uber hack updates from Ronnie Tokazowski ๐Ÿ‘‡ VPN credentials compromised via social engineering and hard-coded credentials in scripts led to the compromise of Uber's infrastructure. Also, make sure you use MFA on your VPN and train your users not to leak VPN credentials. #cybersec

Cofense Intelligence (@cofenseintel) 's Twitter Profile Photo

Ever wonder how a threat actor might selectively target government contractors without even knowing whether the recipient of a #phishing #email is one? We've got details on a long-standing activity set with convincing lures and #spoofed gov websites โžก๏ธ bit.ly/3qQebui

Ever wonder how a threat actor might selectively target government contractors without even knowing whether the recipient of a #phishing #email is one? 

We've got details on a long-standing activity set with convincing lures and #spoofed gov websites โžก๏ธ bit.ly/3qQebui
Cofense (@cofense) 's Twitter Profile Photo

Reply-Chain #phishing email found by our Phishing Defense Center (PDC) after it was missed by #Proofpoint. Reply-chain tactic โ€“ using an existing email threat to tack on the #phishing email โ€“ gaining trust from the recipient to increase the likelihood of them interacting. (1/4)

Reply-Chain #phishing email found by our Phishing Defense Center (PDC) after it was missed by #Proofpoint. 
Reply-chain tactic โ€“ using an existing email threat to tack on the #phishing email โ€“ gaining trust from the recipient to increase the likelihood of them interacting. (1/4)
Cofense (@cofense) 's Twitter Profile Photo

๐ŸšจNEW: Scammers Are Targeting Hurricane Relief Funds From FEMA๐Ÿšจ Ronnie Tokazowski has evidence that shows scammers are actively sharing tutorials and documents with criminal networks on how to steal relief funds from FEMA. Here's what we know โฌ‡๏ธ bit.ly/3MpizdE

Cofense Intelligence (@cofenseintel) 's Twitter Profile Photo

Need to know what's up in the phishing threat landscape? Check out our Q3 Phishing Intelligence Trends Review, out now! cofense.com/blog/q3-2022-cโ€ฆ

Cofense (@cofense) 's Twitter Profile Photo

โ—NEW #BEC REPORTโ— ๐—ช๐—ต๐—ฎ๐˜ ๐—ต๐—ฎ๐—ฝ๐—ฝ๐—ฒ๐—ป๐˜€ ๐˜„๐—ต๐—ฒ๐—ป ๐˜†๐—ผ๐˜‚ ๐—ด๐—ถ๐˜ƒ๐—ฒ #๐—•๐—˜๐—– ๐˜€๐—ฐ๐—ฎ๐—บ๐—บ๐—ฒ๐—ฟ๐˜€ $๐Ÿฑ๐Ÿฌ๐Ÿฌ ๐˜„๐—ผ๐—ฟ๐˜๐—ต ๐—ผ๐—ณ ๐—ด๐—ถ๐—ณ๐˜ ๐—ฐ๐—ฎ๐—ฟ๐—ฑ๐˜€? That's what Ronnie Tokazowski wanted to find out. Shocker, they move extremely fast. Read the full report ๐Ÿ“ bit.ly/3DOURUD

Cofense Intelligence (@cofenseintel) 's Twitter Profile Photo

#Emotet is back, and reaching inboxes! #Malicious XLS files are attached to emails, sometimes zipped. #Email subjects appear to be taken from email reply-chains. Cofense #Phishing Defense Center has seen multiple instances of Emotet in corporate inboxes this morning. Example:

#Emotet is back, and reaching inboxes! #Malicious XLS files are attached to emails, sometimes zipped. #Email subjects appear to be taken from email reply-chains. Cofense #Phishing Defense Center has seen multiple instances of Emotet in corporate inboxes this morning. Example:
Cofense Intelligence (@cofenseintel) 's Twitter Profile Photo

Emotet Update: Loader DLLs for #Emotet botnet- (Epochs 4 and 5) have recently been updated, and #malicious #email dissemination may not be far behind! We're anticipating email activity will resume in the next couple of weeks, if not days. Stay vigilant.

Cofense (@cofense) 's Twitter Profile Photo

โ—๐—•๐—ฅ๐—˜๐—”๐—ž๐—œ๐—ก๐—š ๐—ก๐—˜๐—ช๐—ฆโ—#Emotet has resumed activity this morning, sending emails with attached .zip files that are not password protected. Learn more below โฌ‡๏ธ bit.ly/3SSOgj1

Cofense (@cofense) 's Twitter Profile Photo

"Human intuition is often much better at recognizing these differences, so training employees to be vigilant against phishing threats is a critical element of good cyber defense." Another great discovery from Cofense Intelligence. Written by Tara Seals. bit.ly/45oflAh

Cofense (@cofense) 's Twitter Profile Photo

๐Ÿšจ New โ€œComplaint Stealerโ€ Malware Escalates, Targeting Cryptocurrency Wallets & Hospitality Sector๐Ÿšจ Cofense Intelligence has seen an increase in the last few days in the newly christened #ComplaintStealer malware. Here's what we know so far ๐Ÿ‘‡ cofense.com/blog/new-complโ€ฆ