Common Information
Type Value
Value
Phishing - T1660
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may send malicious content to users in order to gain access to their mobile devices. All forms of phishing are electronically delivered social engineering. Adversaries can conduct both non-targeted phishing, such as in mass malware spam campaigns, as well as more targeted phishing tailored for a specific individual, company, or industry, known as “spearphishing”. Phishing often involves social engineering techniques, such as posing as a trusted source, as well as evasion techniques, such as removing or manipulating emails or metadata/headers from compromised accounts being abused to send messages. Mobile phishing may take various forms. For example, adversaries may send emails containing malicious attachments or links, typically to deliver and then execute malicious code on victim devices. Phishing may also be conducted via third-party services, like social media platforms. Mobile devices are a particularly attractive target for adversaries executing phishing campaigns. Due to their smaller form factor than traditional desktop endpoints, users may not be able to notice minor differences between genuine and phishing websites. Further, mobile devices have additional sensors and radios that allow adversaries to execute phishing attempts over several different vectors, such as: - SMS messages: Adversaries may send SMS messages (known as “smishing”) from compromised devices to potential targets to convince the target to, for example, install malware, navigate to a specific website, or enable certain insecure configurations on their device. - Quick Response (QR) Codes: Adversaries may use QR codes (known as “quishing”) to redirect users to a phishing website. For example, an adversary could replace a legitimate public QR Code with one that leads to a different destination, such as a phishing website. A malicious QR code could also be delivered via other means, such as SMS or email. In the latter case, an adversary could utilize a malicious QR code in an email to pivot from the user’s desktop computer to their mobile device. - Phone Calls: Adversaries may call victims (known as “vishing”) to persuade them to perform an action, such as providing login credentials or navigating to a malicious website. This could also be used as a technique to perform the initial access on a mobile device, but then pivot to a computer/other network by having the victim perform an action on a desktop computer.
Details Published Attributes CTI Title
Details Website 2024-11-15 0 How Hackers Turn Your Information into a Weapon
Details Website 2024-11-15 0 Expert warns construction industry on costly ransomware attacks | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
Details Website 2024-11-15 1 Geofencing: A Technical Cybersecurity Deep Dive — Code, Concepts, and Privacy Safeguards
Details Website 2024-11-15 2 Data Tracking on the Dark Web: Leveraging Threat Intelligence for Insights
Details Website 2024-11-15 0 Ransomware Attacks On Healthcare Sector Surge In 2024 | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-11-15 7 Shapeshifters: The Nature of Leaked Data
Details Website 2024-11-15 1 Buy Secure VPN Now
Details Website 2024-11-15 0 Cybersecurity Services for Healthcare: Safeguarding Patient Data
Details Website 2024-11-15 4 New Remcos RAT Activity Detection: Phishing Campaign Spreading a Novel Fileless Malware Variant - SOC Prime
Details Website 2024-11-15 2 Insider Threats: The Security Risk That’s Already Inside Your Business
Details Website 2024-11-15 0 Ransomware attacks surge in India: 24% increase in first half of 2024, Kaspersky reports - Technology News | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-11-15 0 Chinese SilkSpecter Hackers Attacking Black Friday Shoppers
Details Website 2024-11-15 1 Chinese SilkSpecter Hackers Attacking Black Friday Shoppers
Details Website 2024-11-15 2 The True Cost of Ignoring Cybersecurity: Why Small Businesses Are Prime Targets
Details Website 2024-11-15 1 Cybercriminals Exploit SEO Tricks to Lure Shoppers to Fake Online Stores
Details Website 2024-11-15 38 Dark Web Profile: Cadet Blizzard
Details Website 2024-11-15 0 Secure by Design: AWS enhances centralized security controls as MFA requirements expand | Amazon Web Services
Details Website 2024-11-15 4 Black Basta Ransomware Leveraging Social Engineering For Malware Deployment
Details Website 2024-11-15 0 60 Hours of Cyber Defense: Hong Kong’s Innovative Cybersecurity Drill Begins
Details Website 2024-11-15 0 AI in Business Innovation vs AI in Evolving Cybersecurity
Details Website 2024-11-15 20 Hive0145 ataca a España, Alemania y Ucrania
Details Website 2024-11-15 2 Critical Laravel Vulnerability CVE-2024-52301 Allows Unauthorized Access
Details Website 2024-11-15 0 Scams, Smishing, and Safety Nets: How Emerging Threats Catches Phish
Details Website 2024-11-15 0 O2’s AI Granny Outsmarts Scam Callers with Knitting Tales
Details Website 2024-11-15 1 Threat Intelligence Snapshot: Week 46, 2024