Threat actor Common Raven have been active and methods used to perform reconnaissance activities related to financial messages are influenced by the messaging solution. This is done via SQL statements, observing files on disk, browsing the messaging interface's GUI or even as complex as hooking into legitimate software to intercept function calls. Common Raven methodology to harvest information from the client that uses AutoClient.
Login to the community
No account yet? Create an account
LoginCUSTOMER / CYMULATE EMPLOYEE LOGIN
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.