by PIXM Threat Research Team | Mar 30, 2023 | blog, phish
Introduction For many years, Customer Relationship Management (CRM) software has allowed businesses to automate sales outreach and prospecting data collection at scale. A core feature of CRM suites is the ability to automate customer interactions. This is done...
by PIXM Threat Research Team | Nov 21, 2022 | blog, phish
Introduction PIXM is continuing to track an active criminal group operating four campaigns targeting the users of cryptocurrency exchanges and wallets. The scammers will use an in-browser chat window to initiate a remote desktop session on the victims device, approve...
by PIXM Threat Research Team | Jun 6, 2022 | blog, Hacking
Intro It is rare that the identities of participants and ringleaders in criminal phishing schemes are uncovered. But in many cases, when untangling the web of a cyber criminal group (particularly with financially motivated e-crime actors), there are enough OSINT...
Recent Comments