image credit: pexels

From phish to network compromise in two hours: How Carbanak operates

June 6, 2019

Via: CSO

The past few years have seen an increase in the number of attacks against financial organizations by sophisticated cybercriminal groups that use manual hacking and stealthy techniques to remain hidden. Now, researchers from Bitdefender have released a report on an intrusion they investigated at an unnamed bank that documents in detail how these attackers operate and shows how fast they can gain control over a network.

Read More on CSO