Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations

Threat hunters have called attention to a new campaign as part of which bad actors masqueraded as fake IT support to deliver the Havoc command-and-control (C2) framework as a precursor to data exfiltration or ransomware attack.
The intrusions, identified by Huntress last month across five partner organizations, involved the threat actors using email spam as lures, followed by a phone call from

Total
0
Shares
Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post

Building a High-Impact Tier 1: The 3 Steps CISOs Must Follow

Next Post

CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog

Related Posts
Total
0
Share