Remove e-Discovery Remove Healthcare Remove Mining Remove Phishing
article thumbnail

Russia-linked APT28 and crooks are still using the Moobot botnet

Security Affairs

The threat actors used the botnet harvest credentials, collect NTLMv2 digests, proxy network traffic, and host spear-phishing landing pages and custom tools. The discovery underscores significant interest among different threat actors in compromising internet-facing routers. ” reported Trend Micro. ” reported Trend Micro.