Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?

Posts tagged with: Phishing

Meddler-in-the-Middle Phishing Attacks ExplainedA pictorial representation of a meddler-in-the-middle phishing attack
38,687
people reacted

Meddler-in-the-Middle Phishing Attacks Explained

  • By Lucas Hu, Howard Tong, Suiqiang Deng and Alex Starov
  • December 21, 2022 at 6:00 AM

11

10 min. read

Russia’s Trident Ursa (aka Gamaredon APT) Cyber Conflict Operations Unwavering Since Invasion of UkraineA pictorial representation of Trident Ursa showing a purple bear and trident
55,049
people reacted

Russia’s Trident Ursa (aka Gamaredon APT) Cyber Conflict Operations Unwavering Since Invasion of Ukraine

  • By Unit 42
  • December 20, 2022 at 3:00 AM

32

15 min. read

Trending

  • Machine Learning Versus Memory Resident Evil by Esmid Idrizovic
Threat Assessment: Luna Moth Callback Phishing CampaignCybercrime conceptual image, covering activity such as the Luna Moth callback phishing campaign
65,507
people reacted

Threat Assessment: Luna Moth Callback Phishing Campaign

  • By Kristopher Russo
  • November 21, 2022 at 3:00 AM

16

8 min. read

Detecting Emerging Network Threats From Newly Observed DomainsDNS security conceptual image, covering topics including malicious newly observed domains
49,533
people reacted

Detecting Emerging Network Threats From Newly Observed Domains

  • By Zhanhao Chen, Daiping Liu, Wanjin Li and Fan Fei
  • October 17, 2022 at 6:00 AM

7

8 min. read

Domain Shadowing: A Stealthy Use of DNS Compromise for CybercrimeDNS security and issues such as domain shadowing are represented by the caution sign within a folder structure. Image includes Palo Alto Networks and Unit 42 logos.
63,154
people reacted

Domain Shadowing: A Stealthy Use of DNS Compromise for Cybercrime

  • By Janos Szurdi, Rebekah Houser and Daiping Liu
  • September 21, 2022 at 6:00 AM

80

7 min. read

Legitimate SaaS Platforms Being Used to Host Phishing AttacksConceptual image representing threat actor activity, including the platform-abuse phishing attacks discussed here
63,642
people reacted

Legitimate SaaS Platforms Being Used to Host Phishing Attacks

  • By Lucas Hu
  • August 23, 2022 at 6:00 AM

39

7 min. read

Flight of the Bumblebee: Email Lures and File Sharing Services Lead to MalwareConceptual image representing phishing, including the way Bumblebee malware is distributed, as discussed here
76,428
people reacted

Flight of the Bumblebee: Email Lures and File Sharing Services Lead to Malware

  • By Brad Duncan
  • August 3, 2022 at 12:00 PM

56

8 min. read

Emotet Summary: November 2021 Through January 2022A conceptual image representing phishing - one of the primary delivery methods for Emotet malware, covered here.
45,247
people reacted

Emotet Summary: November 2021 Through January 2022

  • By Brad Duncan
  • May 17, 2022 at 6:00 AM

22

13 min. read

Spear Phishing Attacks Target Organizations in Ukraine, Payloads Include the Document Stealer OutSteel and the Downloader SaintBotA conceptual image representing malware, such as the OutSteel and SaintBot payloads that were observed as part of an attack targeting Ukrainian organizations.
48,821
people reacted

Spear Phishing Attacks Target Organizations in Ukraine, Payloads Include the Document Stealer OutSteel and the Downloader SaintBot

  • By Unit 42
  • February 25, 2022 at 5:30 PM

32

21 min. read

New Emotet Infection MethodA conceptual image representing phishing, such as the research on a new Emotet infection method covered here.
56,810
people reacted

New Emotet Infection Method

  • By Saqib Khanzada, Tyler Halfpop, Micah Yates and Brad Duncan
  • February 15, 2022 at 6:00 AM

23

5 min. read

Strategically Aged Domain Detection: Capture APT Attacks With DNS Traffic TrendsA conceptual image representing DNS security, such as the strategically aged domain detection system discussed here.
48,099
people reacted

Strategically Aged Domain Detection: Capture APT Attacks With DNS Traffic Trends

  • By Zhanhao Chen, Daiping Liu, Wanjin Li and Jielong Xu
  • December 29, 2021 at 6:00 AM

42

9 min. read

Detecting Patient Zero Web Threats in Real Time With Advanced URL FilteringA conceptual image representing problems on the web, such as the patient zero web threats discussed here.
40,690
people reacted

Detecting Patient Zero Web Threats in Real Time With Advanced URL Filtering

  • By Peng Peng, Fang Liu, Ben Zhang, Stefan Springer and Oleksii Starov
  • December 9, 2021 at 6:00 AM

50

13 min. read

Play Your Cards Right: Detecting Wildcard DNS AbuseA conceptual image representing attacks on DNS, including the Wildcard DNS abuse discussed here.
38,325
people reacted

Play Your Cards Right: Detecting Wildcard DNS Abuse

  • By Rebekah Houser and Daiping Liu
  • December 1, 2021 at 6:00 AM

20

10 min. read

A Peek into Top-Level Domains and CybercrimeA conceptual image related to the domain name system, in this case applied to an analysis of top-level domains and malicious content.
57,864
people reacted

A Peek into Top-Level Domains and Cybercrime

  • By Janos Szurdi
  • November 11, 2021 at 6:00 AM

32

11 min. read

Dangling Domains: Security Threats, Detection and PrevalenceA conceptual image representing exploitation of DNS, such as an often overlooked issue discussed in this blog, dangling domains, which can be exploited for DNS hijacking.
46,398
people reacted

Dangling Domains: Security Threats, Detection and Prevalence

  • By Daiping Liu and Ruian Duan
  • September 16, 2021 at 6:00 AM

23

12 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2023 Palo Alto Networks, Inc. All rights reserved.