Acting upon phishing alerts involves multiple activities, from verifying false positives to site take-downs, sometimes involving authorities. These efforts are costly and labor-intensive. Prioritizing phishing threats based on the risk they present to your business is based on the threat actors’ motivation and capabilities.
Argos™ detected a Phishing campaign targeting a specific organization. Further analysis showed that the infrastructure was set up by a threat actor named “x0r1a” which had been seen conducting other malicious activities in the wild previously including phishing attacks to gather and dispatch credentials.
Argos™ detected multiple active phishing sites that were set up using this phishing kit on compromised servers.
In another case a threat actor had initiated a campaign against a digital media client by copying their site’s code and creating a fake site for their own nefarious purposes.
Leveraging our proprietary technology, Argos™ alerted the client to the existence of the cloned sites allowing swift remediation.