paint-brush
How a Team of Hackers left Stolen Phishing Credentials up for Grabsby@checkpoint
137 reads

How a Team of Hackers left Stolen Phishing Credentials up for Grabs

by Check Point Software6mSeptember 18th, 2021
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

In August, attackers initiated a phishing campaign with emails that masqueraded as Xerox scan notifications, prompting users to open a malicious HTML attachment. While this infection chain may sound simple, it successfully bypassed Microsoft Office 365 Advanced Threat Protection (ATP) filtering and stole over a thousand corporate employees’ credentials. The attackers behind the campaign exposed the credentials they had stolen to the public Internet, across dozens of drop-zone servers used by the attackers. With a simple Google search, anyone could have found the password to one of the compromised email addresses: a gift to every opportunistic attacker.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail

Coin Mentioned

Mention Thumbnail
featured image - How a Team of Hackers left Stolen Phishing Credentials up for Grabs
Check Point Software HackerNoon profile picture
Check Point Software

Check Point Software

@checkpoint

Welcome to the Future of Cyber Security. Providing solutions across all vectors to prevent 5th generation cyber attacks.

L O A D I N G
. . . comments & more!

About Author

Check Point Software HackerNoon profile picture
Check Point Software@checkpoint
Welcome to the Future of Cyber Security. Providing solutions across all vectors to prevent 5th generation cyber attacks.

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
Also published here
Newsbreak
Zephyrnet