An Investigation Into Years of Undetected Operations Targeting High-Value Sectors
In-depth analysis of threat activity we call CL-UNK-1068. We discuss their toolset, including tunneling, reconnaissance and credential theft.
Articles mapped to MITRE ATT&CK techniques. Select a technique to view matching articles.
26 articles found
In-depth analysis of threat activity we call CL-UNK-1068. We discuss their toolset, including tunneling, reconnaissance and credential theft.
New phishing campaign dubbed Operation DoppelBrand targeted major financial firms like Wells Fargo
VoidLink, a Linux-based C2 framework, facilitates credential theft, data exfiltration across clouds
An eSentire report showed credential theft accounted for 74% of all observed cyber threats in 2025
Written by: Nic Losby Introduction Mandiant is publicly releasing a comprehensive dataset of Net-NTLMv1 rainbow tables to underscore the urgency of migrating...
Reusing passwords may feel like a harmless shortcut – until a single breach opens the door to multiple accounts