Follow on X RSS Feed
Cybersec Sentinel
  • Home
  • News
  • Malware
  • Ransomware
  • Vulnerabilities
  • Articles
  • About
  • FAQ

O365

A collection of 3 posts
Infostealer FormBook Exploits Phishing to Steal Credentials and Deploy Malware
Malware

Infostealer FormBook Exploits Phishing to Steal Credentials and Deploy Malware

Threat Group: Multiple Threat Actors (Malware as a Service) Threat Type: Infostealer / Downloader / Trojan Exploited Vulnerabilities: Primarily relies on social engineering and malicious attachments. Occasionally used to deliver secondary payloads that exploit known CVEs. Malware Used: FormBook (rebranded as XLoader) Threat Score: 🔴 High (8.0/10) due to extensive use
Apr 23, 2025 6 min read
The Growing Risk of Sneaky 2FA for Microsoft and Gmail Accounts
Phishing

The Growing Risk of Sneaky 2FA for Microsoft and Gmail Accounts

Threat Group: Sneaky Log Threat Type: Phishing-as-a-Service (PhaaS) Platform Exploited Vulnerabilities: Two-Factor Authentication (2FA) Mechanisms, User Trust Malware Used: Sneaky 2FA Phishing Kit Threat Score: High (8.5/10) – Due to its sophisticated methods to bypass 2FA and widespread targeting of essential communication platforms. Last Threat Observation: January 18, 2025
Jan 17, 2025 4 min read
Rockstar 2FA Phishing Kit Empowers Hackers to Bypass MFA Defenses
Malware

Rockstar 2FA Phishing Kit Empowers Hackers to Bypass MFA Defenses

Threat Group: Storm-1575 Threat Type: Phishing-as-a-Service (PhaaS) Exploited Vulnerabilities: User credentials and session cookies Malware Used: Rockstar 2FA phishing kit Threat Score: High (8.5/10) — Due to its capability to bypass multi-factor authentication (MFA) and widespread targeting of Microsoft 365 users. Last Threat Observation: November 30, 2024 Overview The
Nov 29, 2024 8 min read
Page 1 of 1
Cybersec Sentinel © 2025
  • Privacy Policy
Powered by Ghost