Tuesday, 02 January 2024 12:17 GMT

ANY.RUN Reveals New Insights Into Enterprise Phishing Campaigns Abusing Trusted Cloud Platforms


(MENAFN- EIN Presswire) EINPresswire/ -- A new study shared by ANY highlights a sharp rise in sophisticated phishing campaigns targeting enterprises. Threat actors increasingly abuse trusted cloud infrastructures to bypass security controls and deceive corporate users.

The findings underscore a pressing need for leaders to reassess and strengthen their company's defenses and upgrading threat detection methods to keep pace with evolving enterprise phishing risks.

Key Takeaways

. Trusted platforms like Microsoft, Google, AWS, and Cloudflare are being abused to mask malicious activity and evade traditional security filters.

. Threat actors often choose to leverage legitimate domains over using disposable ones.

. Cloud-based phishing has become a mainstream technique, often targeting large companies in particular.

. Traditional IOCs like IPs, TLS fingerprints, and certificates are becoming unreliable for detection of advanced phishing attacks, including popular Adversary-in-the-Middle (AiTM) kits.

Insights for Decision Makers

. Traditional security controls and static indicators of compromise are no longer sufficient to stop modern phishing attacks.

. Continuous threat intelligence and real-time behavioral analysis are now essential for early detection and risk reduction.

. Proactive monitoring significantly improves visibility, shortens response times, and strengthens enterprise security posture.

For a comprehensive view of cloud abuse threats with examples and executive insights, read the original article on ANY's Blog.

About ANY

ANY provides interactive malware analysis and threat hunting solutions to over 15,000 SOC teams and 600,000 cybersecurity professionals worldwide. Sandboxing and threat intelligence solutions by ANY empower security teams with real-time visibility into malicious activity, enriched threat intelligence, and hands-on investigation tools for enterprise-grade phishing protection achieved through early detection and dynamic analysis.

MENAFN04022026003118003196ID1110694372



EIN Presswire

Legal Disclaimer:
MENAFN provides the information “as is” without warranty of any kind. We do not accept any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information contained in this article. If you have any complaints or copyright issues related to this article, kindly contact the provider above.

Search