Ivan Lebedev
Cybercriminals’ phishing infrastructure. Source: Group-IB Network Graph Analysis Tool
Key characteristics of the phishing campaign:
The legitimate companies’ logos have been blurred to minimize further reputational damage for the organizations affected with the campaign
Recommendations