Diamond Member ThaHaka 0 Posted March 3 Diamond Member Share Posted March 3 This is the hidden content, please Sign In or Sign Up Threat hunters have called attention to a new campaign as part of which bad actors masqueraded as fake IT support to deliver the Havoc command-and-control (C2) framework as a precursor to data exfiltration or ransomware attack. The intrusions, identified by Huntress last month across five partner organizations, involved the threat actors using email spam as lures, followed by a phone call from This is the hidden content, please Sign In or Sign Up 0 Quote Link to comment https://hopzone.eu/forums/topic/303171-h4ckn3wsfake-tech-support-spam-deploys-customized-havoc-c2-across-organizations/ Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.