by PIXM Threat Research Team | Mar 30, 2023 | blog, phish
Introduction For many years, Customer Relationship Management (CRM) software has allowed businesses to automate sales outreach and prospecting data collection at scale. A core feature of CRM suites is the ability to automate customer interactions. This is done...
by PIXM Threat Research Team | Nov 21, 2022 | blog, phish
Introduction PIXM is continuing to track an active criminal group operating four campaigns targeting the users of cryptocurrency exchanges and wallets. The scammers will use an in-browser chat window to initiate a remote desktop session on the victims device, approve...
by Jim Mitchell | Aug 4, 2022 | blog, phish
Introduction Cryptocurrency exchanges have been the target of sophisticated adversaries since their inception. At PIXM, we’ve been tracking these attacks since 2021, and initially came across them during the daily analysis of detections we perform for our...
by PIXM Threat Research Team | Jun 6, 2022 | blog, Hacking
Intro It is rare that the identities of participants and ringleaders in criminal phishing schemes are uncovered. But in many cases, when untangling the web of a cyber criminal group (particularly with financially motivated e-crime actors), there are enough OSINT...
by Chris Cleveland | Feb 16, 2019 | blog
TL;DR Stealth Phishing Attacks – highly sophisticated attacks where attackers block any cloud-based service from seeing their phishing page, and show it only to targeted victims on their devices in real-time when they click on the phishing link Stealth phishing...
Recent Comments