Abnormal SecurityDiscover how Dropbox was exploited in a sophisticated phishing attack that leveraged AiTM tactics to steal credentials during the open enrollment period.#abnormalsecurity#EN#2024#exploited#sophisticated#phishing#attack#leveraged#aitm#tactics#steal#credentials#open#dropbox#enrollment#discover#period·abnormalsecurity.com·Nov 20, 2024Abnormal Security
Mamba 2FA: A new contender in the AiTM phishing ecosystem - Sekoia.io BlogDiscover Mamba 2FA, a previously unknown adversary-in-the-middle (AiTM) phishing kit and sold as phishing-as-a-service (PhaaS).#sekoia#EN#2024#Mamba#2FA#AiTM#phishing#phishing-as-a-service#PhaaS·blog.sekoia.io·Oct 7, 2024Mamba 2FA: A new contender in the AiTM phishing ecosystem - Sekoia.io Blog
Tycoon 2FA: an in-depth analysis of the latest version of the AiTM phishing kitTycoon 2FA has become one of the most widespread adversary-in-The-Middle (AiTM) phishing kits over the last few months.#sekoia#EN#2024#Tycoon2FA#phishing#PhaaS#AiTM#phishing-kit#analysis·blog.sekoia.io·Mar 26, 2024Tycoon 2FA: an in-depth analysis of the latest version of the AiTM phishing kit