“navigate socgholish with huntress | huntress in an era where cyber threats like socgholish are becoming increasingly sophisticated, understanding and combating these attacks is crucial for digital safety. this post delves into leveraging huntress for effectively handling socgholi…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1204.002Malicious File
49%
“navigate socgholish with huntress | huntress in an era where cyber threats like socgholish are becoming increasingly sophisticated, understanding and combating these attacks is crucial for digital safety. this post delves into leveraging huntress for effectively handling socgholi…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1594Search Victim-Owned Websites
44%
“wordpress site of someone ' s personal blog that had been hacked to redirect users without their knowledge to the site that hosts the malicious javascript. assay [. ] porchlightcommunity [. ] org / 03j7jahamos3wsg / 5udxr6arn6 / pt8m / to download the malicious socgholish file. t…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1217Browser Information Discovery
37%
“navigate socgholish with huntress | huntress in an era where cyber threats like socgholish are becoming increasingly sophisticated, understanding and combating these attacks is crucial for digital safety. this post delves into leveraging huntress for effectively handling socgholi…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1070Indicator Removal
35%
“from kahu security. this tool, alongside running the suspicious update. js file, can unveil the domains the file communicates with, offering a quick win in our investigative process.”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1189Drive-by Compromise
34%
“wordpress site of someone ' s personal blog that had been hacked to redirect users without their knowledge to the site that hosts the malicious javascript. assay [. ] porchlightcommunity [. ] org / 03j7jahamos3wsg / 5udxr6arn6 / pt8m / to download the malicious socgholish file. t…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
In an era where cyber threats like SocGholish are becoming increasingly sophisticated, understanding and combating these attacks is crucial for digital safety. This post delves into leveraging Huntress for effectively handling SocGholish threats, outlining a step-by-step approach for IT professionals.