
Hackers Using Device Registration Trick to Attack Enterprises with Lateral Phishing.
Microsoft has
Microsoft has disclosed details of a large-scale, multi-phase phishing campaign that uses stolen credentials to register devices on a victims network to further propagate spam emails and widen the in
Stolen credentials were then leveraged in the second phase, in which attackers used compromised accounts to expand their foothold within the organization via lateral phishing as well as beyond the network via outbound spam. The campaign started wi
To launch the second wave, the attackers leveraged the targeted users compromised mailbox to send malicious messages to over 8,500 users, both in and outside of the victim organization, Microsoft said. The emails used a SharePoint sharing invitat
