by Nick Ascoli | Nov 21, 2022 | blog, phish
Introduction PIXM is continuing to track an active criminal group operating four campaigns targeting the users of cryptocurrency exchanges and wallets. The scammers will use an in-browser chat window to initiate a remote desktop session on the victims device, approve...
by Jim Mitchell | Aug 4, 2022 | blog, phish
Introduction Cryptocurrency exchanges have been the target of sophisticated adversaries since their inception. At PIXM, we’ve been tracking these attacks since 2021, and initially came across them during the daily analysis of detections we perform for our clients. In...
by Nick Ascoli | Jun 6, 2022 | blog, Hacking
Intro It is rare that the identities of participants and ringleaders in criminal phishing schemes are uncovered. But in many cases, when untangling the web of a cyber criminal group (particularly with financially motivated e-crime actors), there are enough OSINT...
by Chris Cleveland | Feb 16, 2019 | blog
TL;DR Stealth Phishing Attacks – highly sophisticated attacks where attackers block any cloud-based service from seeing their phishing page, and show it only to targeted victims on their devices in real-time when they click on the phishing link Stealth phishing...
by Chris Cleveland | Feb 15, 2019 | blog, Hacking, Social Engineering
TL;DR Someone tried accessing my work account (enabled with Authenticator) Within an hour, I received a Microsoft Outlook phishing attack in my work email Upon clicking on the link, Pixm shut down the attack within one second in my browser All major cybersecurity...
Recent Comments