
Weird & Wacky Researcher Summer: The Artifacts & Detections Edition
DISCARDED: Tales From the Threat Research Trenches
00:00
How to Spot Suspicious Activity in Social Engineering Campaigns
A lot of the actors using kind of the same pictures of driver's license or passports or like personalized social engineering. One of the activity clusters that we track uses kind of some similar lures like that in sort of widespread social engineering campaigns. They always have this like super juvenile like code in their malware and I just hate looking at it because it makes me so uncomfortable to read them.
Transcript
Play full episode