Get the latest tech news

An attacker’s blunder gave us a look into their operations


An attacker installed Huntress onto their operating machine, giving us a detailed look at how they’re using AI to build workflows, searching for tools like Evilginx, and researching targets like software development companies.

The threat actor didn’t just search for individual companies—they also looked at all parts of the ecosystem surrounding organizations of interest, from their customer bases to associated third-party companies across the supply chain. On July 8, browser entries show the attacker conducting an extensive level of research on a prominent ecommerce vendor for managing payments and subscriptions, including a list of its customers, contacts, and market share. We also saw the threat actor express interest in STYX Market, a dark web forum that’s been around since 2023, and was recently called a “rising star for stealer logs, stolen creds, and laundering services” by researchers.

Get the Android app

Or read this on Hacker News

Read more on:

Photo of Day

Day

Photo of operations

operations

Photo of rare look

rare look

Related news:

News photo

Forget iPhone 17 Air - this ridiculously thin Android lasts all day and is only $200

News photo

Gen Z is laughing in the face of the AI jobs apocalypse. I see it in my classroom every day

News photo

Amazon Echo is reportedly an internet vampire that uses gigabytes of data per day despite being unused, says owner