Microsoft seizes threat actor domains

The Microsoft Digital Crimes Unit has gone to court to seize 41 domains alleged to have been used by an Iranian cybercrime group called Bohrium.

The Bohrium group ran a targeted email spear-phishing operation against organizations in the US, Middle East, and India. As part of the operation they would pose as job recruiters to attempt to steal sensitive information and install malware on the victim’s PCs.

Microsoft takes down 41 domains tied to ‘Iranian phishing’ • The Register

These types of attacks are very common – does your team have the training to recognise the latest subtle social engineering tactics used by threat actors?

If not get some training.