by PIXM Threat Research Team | Mar 30, 2023 | blog, phish
Introduction For many years, Customer Relationship Management (CRM) software has allowed businesses to automate sales outreach and prospecting data collection at scale. A core feature of CRM suites is the ability to automate customer interactions. This is done...
by PIXM Threat Research Team | Nov 21, 2022 | blog, phish
Introduction PIXM is continuing to track an active criminal group operating four campaigns targeting the users of cryptocurrency exchanges and wallets. The scammers will use an in-browser chat window to initiate a remote desktop session on the victims device, approve...
by Jim Mitchell | Aug 4, 2022 | blog, phish
Introduction Cryptocurrency exchanges have been the target of sophisticated adversaries since their inception. At PIXM, we’ve been tracking these attacks since 2021, and initially came across them during the daily analysis of detections we perform for our...
by Jim Mitchell | Jun 16, 2022 | blog, phish
Update: The Phish Goes On - 5 Million Stolen Credentials and Counting June 16, 2022 When PIXM’s threat research team first broke the news of a large-scale phishing campaign that had successfully stolen millions of credentials from legitimate Facebook users, we...
Recent Comments