Unmasking GrassCall Campaign: The APT Behind Job Recruitment Cyber Scams

Table of content: Introduction Overview of Threat actor. Infection Chain. Attack tactics & Approach: Impersonating a Fake Company: Phishing Communication: Malicious Software Deployment: Infection Chain Technical Analysis of GrassCall.exe: Analysis of Rhadamanthys malware TTPs: Preventive measures: IoCs & Detections in Seqrite: Introduction: The “GrassCall” malware campaign represents an advanced social engineering attack carried out by […]

The post Unmasking GrassCall Campaign: The APT Behind Job Recruitment Cyber Scams appeared first on Blogs on Information Technology, Network & Cybersecurity | Seqrite.

March 6, 2025
Read More >>

Phishing 2.0: New Techniques Cybercriminals Use to Trick Victims

Phishing has drastically transformed from its early days as a simple scam targeting unwary email users. Modern phishing techniques—dubbed “Phishing 2.0″—are more complex, highly tailored, and designed to bypass even the most robust security systems. In this blog, we’ll uncover the sophisticated strategies employed in phishing 2.0 and discuss effective ways to protect yourself and […]

The post Phishing 2.0: New Techniques Cybercriminals Use to Trick Victims appeared first on Blogs on Information Technology, Network & Cybersecurity | Seqrite.

February 28, 2025
Read More >>