Another adversary picks up the email bombing / vishing Storm-1811 playbook, doing thorough reconnaissance to target specific employees with fake help desk callβthis time, over the phone.
In the last of our five-part series, Sophos X-Ops explores the implications and opportunities arising from threat actorsβ involvement in real-world industries and crimes
In the third of our five-part series, Sophos X-Ops explores the more legally and ethically dubious business interests of financially motivated threat actors
Another adversary picks up the email bombing / vishing Storm-1811 playbook, doing thorough reconnaissance to target specific employees with fake help desk callβthis time, over the phone.