UAT-10608: Inside a large-scale automated credential harvesting operation targeting web applications
Cisco Talos is disclosing a large-scale automated credential harvesting campaign carried out by a threat cluster we are tracking as “UAT-10608.” Post-compromise, UAT-10608 leverages automated scripts for extracting and exfiltrating credentials from a variety of applications, that are then posted to its command and control (C2). The C2 hosts a web-based graphical user interface (GUI) titled “NEXUS Listener” that can be used to view stolen information and gain analytical insights using precompiled … Continue reading UAT-10608: Inside a large-scale automated credential harvesting operation targeting web applications
Copy and paste this URL into your WordPress site to embed
Copy and paste this code into your site to embed