tag = "Threat Analysis"

Threat Announcement: Phishing Sites Detected on Emoji Domains

Since September 21, PhishLabs analysts have detected a number of phishing sites hosted on emoji domains. Here's what we've learned so far.

Using Reported Phish to Hunt Threats

Everybody knows that reported phishing emails are a valuable resource. But are you making maximum use of yours? This is how you can use reported phish to aid your threat hunting capability.

6 Steps to Quickly Defang Reported Phishing Emails

User-reported phishing emails are a huge asset in the fight against phishing. Here are six steps you can take to maximize the value of every reported phish.

Nigerian 419 Scams: How to Spot a Phish

Nigerian 419 scams are as old as the internet, and they're still going. Here's our #CyberAware take on this phishing classic.

BEC Scams: How to Spot a Phish

In aid of national #CyberAware month, we take a close look at BEC phishing lures, how they work, and why they're so effective

Dissecting the Qadars Banking Trojan

A deep-dive malware analysis of the Qadars Banking Trojan and how it works.

Olympic Vision Keylogger and BEC Scams

The ease of buying low cost, pre-built tools broadens the range of potential targets in BEC attacks. This blog discusses one of these tools - Olympic Keylogger.

Vulnerabilities found in Dendroid mobile Trojan

The full source code of the Dendroid Android RAT was leaked late last week. Analyzing the code has revealed multiple vulnerabilities due to lack of user input including XSS, SQLi, and PHP Code Execution.

New Man-in-the-Middle attacks leveraging rogue DNS

PhishLabs has observed new Man-in-the-Middle attacks using rogue DNS to takeover accounts and evade fraud detection. Customers of 70+ financial institutions are being targeted.