Catching MCAs at the Intersection of Infrastructure and Influence
The intersection of infrastructure and influence creates linkages which may become discoverable and aid cyber defenders in catching MCAs.
Compromised websites are a common attack vector for Malicious Cyber Actors, as there are often multiple vulnerabilities which are easily exploited. Compromised websites are a common attack vector used by threat actors to serve any number of threats – malware, viruses, phishing, ransomware, etc.
The intersection of infrastructure and influence creates linkages which may become discoverable and aid cyber defenders in catching MCAs.
We’ve put together this glossary of cyber threat definitions as a resource for you in your quest to help make the internet a safer place for all!
Instances of large-scale compromises of both private industry and public institutions in 2013 prompted a flurry of activity among security researchers to identify emerging and established threats. Commonly identified as Advance Persistent Threats (APTs), this phenomenon is expected to continue well into the foreseeable future. Fundamental to the spread of these threats is one of their foremost methods of propagation – a water hole attack.
zveloLABS™ has uncovered thousands of compromised web servers hosting fake YouTube pages. Attempting to play the video on these fake pages prompts the user to install a ‘media codec’ which then infects the machine with malware.