What started as a real-world mobile phone theft turned into a complex and worryingly compelling phishing attack. Download this in-depth threat report case study in which Cyren threat researchers investigate this attack (from the real to the digital world) and offer insight into:
-
Tactics, techniques and procedures used
-
Evasion tactics used by cyber-attackers
-
A market analysis of kits and tools used