"codes redirect users to spoofed login pages or malware downloads, frequently shifting interaction to personal mobile devices where monitoring is limited. attackers also rotate domains and payloads to maintain campaign resilience. in some cases, shortened urls obscure the final de…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1566.002Spearphishing Link
81%
"surge in silent subject phishing attacks targets vip users a surge in phishing emails lacking subject lines has been identified as part of a widespread campaign targeting high - value users. according to findings detailed by cybersecurity company cyberproof on april 21, the activ…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1598.002Spearphishing Attachment
61%
"surge in silent subject phishing attacks targets vip users a surge in phishing emails lacking subject lines has been identified as part of a widespread campaign targeting high - value users. according to findings detailed by cybersecurity company cyberproof on april 21, the activ…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1598Phishing for Information
51%
"surge in silent subject phishing attacks targets vip users a surge in phishing emails lacking subject lines has been identified as part of a widespread campaign targeting high - value users. according to findings detailed by cybersecurity company cyberproof on april 21, the activ…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1566Phishing
44%
"codes redirect users to spoofed login pages or malware downloads, frequently shifting interaction to personal mobile devices where monitoring is limited. attackers also rotate domains and payloads to maintain campaign resilience. in some cases, shortened urls obscure the final de…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1566Phishing
39%
"surge in silent subject phishing attacks targets vip users a surge in phishing emails lacking subject lines has been identified as part of a widespread campaign targeting high - value users. according to findings detailed by cybersecurity company cyberproof on april 21, the activ…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1598.003Spearphishing Link
37%
"surge in silent subject phishing attacks targets vip users a surge in phishing emails lacking subject lines has been identified as part of a widespread campaign targeting high - value users. according to findings detailed by cybersecurity company cyberproof on april 21, the activ…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
Null subject phishing campaigns bypass filters and target VIPs with QR code and RMM abuse