"they know you trust a calendar invite from hr, a routine notification, or a link embedded in a familiar workflow. these attacks slip through because they follow the rules of your environment. they don ' t trigger obvious controls. they don ' t look out of place. they look like wo…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1528Steal Application Access Token
73%
"weaponized railway, a legitimate cloud deployment platform, to stand up credential - harvesting infrastructure on demand. more than 340 organizations across the us, canada, australia, new zealand, and germany were hit. the attack chain ran through legitimate railway - hosted infr…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1111Multi-Factor Authentication Interception
68%
"weaponized railway, a legitimate cloud deployment platform, to stand up credential - harvesting infrastructure on demand. more than 340 organizations across the us, canada, australia, new zealand, and germany were hit. the attack chain ran through legitimate railway - hosted infr…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1566.002Spearphishing Link
64%
"weaponized railway, a legitimate cloud deployment platform, to stand up credential - harvesting infrastructure on demand. more than 340 organizations across the us, canada, australia, new zealand, and germany were hit. the attack chain ran through legitimate railway - hosted infr…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
Social engineering has evolved. Device code phishing and AI lures bypass MFA and blend in. Build a cyber resilience strategy before the next attack lands.