Threat Connect researchers have published information on an ongoing credential harvesting campaign targeting companies in the entertainment industry. The campaign has been active since 2017, with the most recently identified indicators were found in mid-July 2019. This campaign consists of threat actor(s) registering domains that impersonate legitimate entertainment websites; the domains’ host credential phishing pages. The threat actor’(s) long term goals are not known at this time.
All known indicators from this campaign have been checked against the eSentire client base; no positive results were identified.
What we’re doing about it
- IP addresses related to this campaign have been added to the eSentire Global Blacklist
- Known indicators from this campaign have been checked against the eSentire client base
- esNETWORK rules are being produced to detect communication with known campaign IOCs
What you should do about it
- Employ Multi-Factor Authentication to minimize the risk of credential phishing
- Increased user awareness around phishing and typo-squatted domains
- Block or Purchase domains similar to your organization’s to prevent abuse
The delivery method used by threat actors in this campaign has not been observed. It is highly likely that the threat actors are employing phishing emails to trick end users into visiting the malicious domains.
For more information on this ongoing campaign see the original research by Threat Connect . Note, that indicators in this paper are not up to date.