Evasion Techniques: User-Agent Blocking

Evasion Techniques: User-Agent Blocking

Recently we highlighted one of the most common evasion techniques employed by threat actors in order to keep a phishing site online: geoblocking, or blocking by location. However, many other techniques exist, some that are more subtle and make it more difficult for unwanted visitors to view a site. One ... Read More
Phishing Threat Actor Blocking Techniques: Geoblocking by IP

Phishing Threat Actor Blocking Techniques: Geoblocking by IP

| | blocking, geoblocking, Phish
In order to increase the lifespan of phishing attacks most threat actors implement evasion techniques to keep their phishing sites from being detected by security professionals ... Read More
Threat Actor Abuses Mobile Sensor to Evade Detection

Threat Actor Abuses Mobile Sensor to Evade Detection

Every day our teams analyze millions of phish across the web, emails, social media, mobile, and most other common digital vectors. Many phishing sites are easy to review and analyze. However, some threat actors that we track take steps to hide their attacks from people other than their intended victims ... Read More