General
-
Target
akamai-entering-through-the-gift-shop-soti-report.pdf
-
Size
1.8MB
-
MD5
f3c1bbbf131a956eb61b5f9aa3aa5dcf
-
SHA1
e97f923820280fa2b55553af4e49d7770e0c5336
-
SHA256
87572c41dac5b67740caf1e142e404e7c698542437d36f92ed3c06be578cbb37
-
SHA512
7afaab463295945d88bfe44021bb5cb4680084bfbdd104656ce7bfc203fb2931f16c9d2414a95d5c90f791d5e3d217aa748753915cc1d178ef57da7ce06b5a4f
-
SSDEEP
49152:YD9f9hkz7YApHwCMO1oAEf65gLIedhQiF2Y:CHkzkA9wCPePn1AiFh
Malware Config
Signatures
Files
-
akamai-entering-through-the-gift-shop-soti-report.pdf.pdf
-
https://www.feroot.com/blog/https-www-feroot-com-blog-why-javascript-security-is-important-with-third-party-code/
-
https://www.akamai.com/resources/research-paper/akamai-ransomware-threat-report
-
https://news.sophos.com/en-us/2022/09/07/the-state-of-ransomware-in-retail-2022/
-
https://venturebeat.com/security/benchmarking-your-cybersecurity-budget-in-2023/
-
https://www.akamai.com/resources/state-of-the-internet/slipping-through-the-security-gaps-the-rise-of-application-and-api-attacks
-
https://www.akamai.com/site/en/documents/state-of-the-internet/soti-security-loyalty-for-sale-retail-and-hospitality-fraud-report-2020.pdf
-
https://owasp.org/www-project-top-ten/
-
https://spanning.com/blog/file-inclusion-vulnerabilities-lfi-rfi-web-based-application-security-part-9/#:~:text=LFI%20occurs%20when%20an%20application,files%20by%20manipulating%20the%20input.&text=In%20this%20example%2C%20a%20hacker,..%2Fetc%2Ftest.
-
https://www.akamai.com/lp/soti/slipping-through-the-security-gaps-the-rise-of-application-and-api-attacks
-
https://medium.com/@jonathanbouman/local-file-inclusion-at-ikea-com-e695ed64d82f
-
https://www.digitalcommerce360.com/article/us-ecommerce-sales/
-
https://www.geeksforgeeks.org/local-file-inclusion-lfi/
-
https://securityintelligence.com/articles/rise-cyberattacks-changing-consumer-behavior/
-
https://www.akamai.com/blog/security/threat-intelligence-on-log4j-cve-key-findings-and-their-implications
-
https://www.cnbc.com/2021/03/09/microsoft-exchange-hack-explained.html
-
https://www.cybereason.com/blog/dearcry-ransomeware-and-the-hafnium-attacks
-
https://capec.mitre.org/data/definitions/664.html
-
https://portswigger.net/web-security/ssrf
-
https://www.akamai.com/blog/security/how-page-integrity-manager-detects-real-world-magecart-attacks
-
https://www.theregister.com/2018/09/11/british_airways_website_scripts/
-
https://www.forbes.com/sites/carlypage/2020/10/16/ico-hits-british-airways-with-record-breaking-fine-for-2018-data-breach/?sh=5087ad1c481a
-
https://www.akamai.com/blog/security/magecart-attack-disguised-as-google-tag-manager
-
https://www.akamai.com/products/page-integrity-manager
-
https://www.privacyaffairs.com/dark-web-price-index-2022/
-
https://rhisac.org/special-interest-resilience/good-bots-go-bad/
-
https://informationsecuritybuzz.com/credential-stuffing-accounts-for-one-third-of-global-login-attempts-okta-finds/
-
https://www.securityweek.com/over-71k-impacted-by-credential-stuffing-attacks-on-chick-fil-a-accounts/
-
https://mostadvancedbot.com/
-
https://www.aiobot.com/
-
https://rhisac.org/wp-content/uploads/Holiday-Trends-Report-2022_White.pdf
-
https://www.akamai.com/blog/security-research/sophisticated-phishing-scam-abusing-holiday-sentiment
-
https://www.reuters.com/world/asia-pacific/australia-sees-spike-cyber-attacks-criminals-states-2022-11-03/
-
https://www.grandviewresearch.com/industry-analysis/online-travel-booking-service-market-report
-
https://blog.commissionfactory.com/ecommerce-marketing/key-dates-in-southeast-asia
-
https://www.lemonde.fr/en/europe/article/2023/04/03/the-rise-of-cyberattacks-in-europe-amidst-the-war-in-ukraine_6021493_143.html
-
https://myfeed.thalesgroup.com/cyber-conflict-ukraine-extensive-report
-
https://therecord.media/german-cyber-agency-warns-threat-situation-is-higher-than-ever
-
https://www.mckinsey.com/industries/retail/our-insights/state-of-grocery-europe-2023-living-with-and-responding-to-uncertainty
-
https://www.akamai.com/security-research
-
https://www.akamai.com/
-
https://www.akamai.com/blog
-
https://twitter.com/akamai
-
https://www.linkedin.com/company/akamai-technologies
-
https://www.akamai.com/soti
-
http://akamai.com/security-research
-
https://www.akamai.com/site/en/documents/state-of-the-internet/entering-through-the-gift-shop.zip
-
https://www.akamai.com/solutions/industries/retail-consumer-solutions
-
http://experience.security
-
http://AIOBot.com
-
http://campaigns.target
-
http://akamai.com
-
http://akamai.com/blog,
-
http://23.akamai.com
-
http://akamai.com/sotiMore
-
http://akamai.com/security-researchAccess
-
http://akamai.com/sotidataMore
- Show all
-