How BEC scammers use the cybercrime underground | Intel471
Tags
Common Information
Type | Value |
---|---|
UUID | c8f85731-6c12-47f6-993e-5f3eb066b9bc |
Fingerprint | 2d090cb78b81b70d |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | Jan. 28, 2023, midnight |
Added to db | Aug. 31, 2024, 5:02 a.m. |
Last updated | Aug. 31, 2024, 5:02 a.m. |
Headline | Outsourcing manipulation: How BEC scammers use the cybercrime underground |
Title | How BEC scammers use the cybercrime underground | Intel471 |
Detected Hints/Tags/Attributes | 30/2/0 |
Source URLs
Redirection | Url | |
---|---|---|
Details | Source | https://intel471.com/blog/bec-cybercrime-underground |
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 138 | ✔ | Intel471 | https://intel471.com/blog/feed | 2024-08-30 22:08 |