Blogue GoSecure
Threat Hunt of the Month: Remote Access Software Exploited for Corporate Network Infiltration
In December 2024, GoSecure Threat Hunters have identified a concerning use of remote access software by cybercriminals to gain initial access within corporate environments. The attackers start by flooding a victim’s email with spam and then pose as IT support via Microsoft Teams. This social engineering tactic lures victims into installing remote access software, which is then exploited to deploy a custom implant that exfiltrates sensitive information and sets the stage for ransomware attacks.
Security Advisory: Enhancing Cybersecurity Vigilance During Natural Disasters
Following a recent advisory from the Cybersecurity and Infrastructure Security Agency (CISA) regarding the increased cyber threats during Hurricane Helene, it’s crucial for organizations to reassess their disaster preparedness from a cybersecurity perspective. Effective disaster preparedness is about anticipating potential challenges and equipping your organization with the tools and plans to manage them effectively. Natural disasters not only disrupt physical infrastructures but also create ripe conditions for cybercriminals to exploit heightened vulnerabilities.
Threat Hunt of the Month: Quad7 Botnet and Password Spraying Tactics Threaten Microsoft 365 Accounts
In November 2024, GoSecure Threat Hunters have identified an alarming rise in the activity of the Quad7 botnet, a sophisticated network of compromised nodes employed by cybercriminals to perform password spraying attacks on Microsoft 365 accounts. This method strategically avoids common detection methods such as account lockouts by using widely used passwords against a long list of valid users over an extended period.
Large-Scale Spear-Phishing Campaign with Malicious RDP Attachments
In response to a recent report from the Cybersecurity and Infrastructure Security Agency (CISA) on a large-scale spear-phishing campaign, GoSecure is alerting organizations to emerging threats involving malicious Remote Desktop Protocol (RDP) files. The campaign, reportedly orchestrated by a foreign threat actor targeting critical sectors like government and IT, seeks to exploit unsuspecting users through RDP attachments in emails that mimic trusted entities.
From Mainstream to Malicious: How Popular Smartphone Brands Are Used in Cyber Attacks on RDP
As Xiaomi smartphones show an increase in popularity, a surprising pattern emerges: cybercriminals are following the same trends as everyday users. Our research uncovers a striking overlap between popular consumer devices and those favored in illicit online activities. Are attackers simply adopting what’s widely available, or does brand loyalty extend into the cyber underworld?
CAS D'UTILISATION
Cyberrisques
Mesures de sécurité basées sur les risques
Sociétés de financement par capitaux propres
Prendre des décisions éclairées
Sécurité des données sensibles
Protéger les informations sensibles
Conformité en matière de cybersécurité
Respecter les obligations réglementaires
Cyberassurance
Une stratégie précieuse de gestion des risques
Rançongiciels
Combattre les rançongiciels grâce à une sécurité innovante
Attaques de type « zero-day »
Arrêter les exploits de type « zero-day » grâce à une protection avancée
Consolider, évoluer et prospérer
Prenez de l'avance et gagnez la course avec la Plateforme GoSecure TitanMC.
24/7 MXDR
Détection et réponse sur les terminaux GoSecure TitanMC (EDR)
Antivirus de nouvelle génération GoSecure TitanMC (NGAV)
Surveillance des événements liés aux informations de sécurité GoSecure TitanMC (SIEM)
Détection et réponse des boîtes de messagerie GoSecure TitanMC (IDR)
Intelligence GoSecure TitanMC
Notre SOC
Défense proactive, 24h/24, 7j/7