<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>Recon Main Blog</title>
    <link>https://blog.reconinfosec.com</link>
    <description />
    <language>en</language>
    <pubDate>Tue, 03 Mar 2026 18:51:19 GMT</pubDate>
    <dc:date>2026-03-03T18:51:19Z</dc:date>
    <dc:language>en</dc:language>
    <item>
      <title>Iranian Government Affiliated Intrusions: Documented Tradecraft</title>
      <link>https://blog.reconinfosec.com/iranian-government-affiliated-intrusions-documented-tradecraft</link>
      <description>&lt;p&gt;When geopolitical tensions rise, defenders tend to ask the same question: What does Iranian cyber activity actually look like on the wire?&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;When geopolitical tensions rise, defenders tend to ask the same question: What does Iranian cyber activity actually look like on the wire?&lt;/p&gt;   
&lt;img src="https://track.hubspot.com/__ptq.gif?a=7101814&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.reconinfosec.com%2Firanian-government-affiliated-intrusions-documented-tradecraft&amp;amp;bu=https%253A%252F%252Fblog.reconinfosec.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Tue, 03 Mar 2026 18:48:12 GMT</pubDate>
      <author>luke@reconinfosec.com (Luke Rusten)</author>
      <guid>https://blog.reconinfosec.com/iranian-government-affiliated-intrusions-documented-tradecraft</guid>
      <dc:date>2026-03-03T18:48:12Z</dc:date>
    </item>
    <item>
      <title>ClawHype: Making Sense of Recent AI Cybersecurity News</title>
      <link>https://blog.reconinfosec.com/clawdhype-making-sense-of-recent-ai-cybersecurity-news</link>
      <description>&lt;div&gt;  
 &lt;p&gt;&lt;strong&gt;Editor note:&lt;/strong&gt; &lt;em&gt;The sudden rise and crash of OpenClaw and Moltbook have been wild. The media will move on, but the story isn’t over for IT teams dealing with the risks posed by unauthorized AI. In this Q&amp;amp;A, Nick Lupien (Head of Recon Labs) will help make sense of the recent news and offer broader AI governance advice.&lt;/em&gt;&lt;/p&gt; 
 &lt;p&gt;&lt;em&gt;&lt;img src="https://blog.reconinfosec.com/hs-fs/hubfs/clawdhype-banner.jpg?width=1920&amp;amp;height=1080&amp;amp;name=clawdhype-banner.jpg" width="1920" height="1080" alt="clawdhype-banner" style="height: auto; max-width: 100%; width: 1920px; margin-left: auto; margin-right: auto; display: block;"&gt;&lt;/em&gt;&lt;/p&gt;   
 &lt;h2 style="font-size: 24px; font-weight: normal;"&gt;What would an IT manager need to know about the OpenClaw and Moltbook security issues? What makes these security issues different from others?&lt;/h2&gt; 
 &lt;div&gt; 
  &lt;div&gt; 
   &lt;p&gt;At this stage, it’s probably best to treat OpenClaw (formerly Moltbot, formerly Clawdbot) like malware. In order for OpenClaw to perform its stated function (a local personal assistant), it requires &lt;strong&gt;significant access to private data, arbitrary code execution privileges,&lt;/strong&gt; and &lt;strong&gt;absolute autonomy without human approval.&lt;/strong&gt; This combination is dangerous even without AI, but it’s particularly concerning when you consider that AI is vulnerable to &lt;strong&gt;prompt injection&lt;/strong&gt; (other people trying to trick your agent into acting against your best interests) and &lt;strong&gt;misalignment&lt;/strong&gt; (the model underneath providing inaccurate data and suggestions).&lt;/p&gt; 
   &lt;p&gt;These are both “forever problems” with large language models, and they’re the reason we put “humans in the loop” for critical functions like sending emails or texts or executing code in privileged contexts. When you hand the keys over to an agent that will automatically act on your behalf, you’re taking immeasurable risk with not only your data, but that of everyone you interact with. It’s like turning on full car automation on untested infrastructure and then going to sleep. It raises serious concerns.&lt;/p&gt; 
   &lt;p&gt;Moltbook is a public “Reddit-like” social media site that OpenClaw agents interact with autonomously. There have already been &lt;a href="https://www.wiz.io/blog/exposed-moltbook-database-reveals-millions-of-api-keys"&gt;reports of massive data loss&lt;/a&gt; due to an improperly configured database. Though this and other vulnerabilities have been addressed, it’s the clearest example yet of the threats posed by OpenClaw, and it’s likely not the last.&lt;/p&gt; 
  &lt;/div&gt; 
 &lt;/div&gt;   
 &lt;h2 style="font-size: 24px; font-weight: normal;"&gt;Employees have always used unauthorized apps at work. How is that problem different now with AI tools?&lt;/h2&gt; 
 &lt;div&gt; 
  &lt;div&gt; 
   &lt;p&gt;Unauthorized/unvetted apps are still a big problem and contribute to significant losses for companies every year. The type of risk is the same: loss of confidentiality and integrity when the application misbehaves, whether through malicious activity or accidental misuse. The addition of AI significantly increases the &lt;strong&gt;magnitude&lt;/strong&gt; of the threat: they are &lt;strong&gt;more likely to be exploited&lt;/strong&gt;, and the effects of misuse are &lt;strong&gt;significantly more damaging&lt;/strong&gt; to you, your organization, and everyone you interact with.&lt;/p&gt; 
  &lt;/div&gt; 
 &lt;/div&gt;   
 &lt;h2 style="font-size: 24px; font-weight: normal;"&gt;How do I decide whether to allow AI tools at our company? What safety measures must I put in place to protect our data and systems?&lt;/h2&gt; 
 &lt;div&gt; 
  &lt;div&gt; 
   &lt;p&gt;Stepping back, I wouldn’t conflate OpenClaw with most “AI tools.” There are many AI tools like Claude, Gemini, and ChatGPT that have mechanisms to control human-in-the-loop and that encourage good security practices. The best safety measures we’ve seen are proactive ones: provide people with vetted tools, and train them on best practices for interacting with confidential data. All of the large providers have a “no training on customer data” option for paid subscribers, and some have zero data retention policies available. Research and understand these features before deciding on a platform. Search for “Trust Center” with the products you’re considering to fully understand their compliance environments. For enterprise deployments, look for features like audit logs, admin controls, and SSO integration.&lt;/p&gt; 
   &lt;p&gt;Deciding whether to allow AI tools at your company is a risk/benefit discussion. The risks of a trained workforce using vetted tools can be controlled but are never completely mitigated. Apps change quickly, and new features may introduce new risks that require significant, ongoing attention. If you decide to embrace AI, commit to one or two products at first, and create a plan to keep up with changes to those products. Even vetted tools require good policy around integrations and human approvals.&lt;/p&gt; 
  &lt;/div&gt; 
 &lt;/div&gt;   
 &lt;h2 style="font-size: 24px; font-weight: normal;"&gt;If employees are already using unauthorized AI tools, how do I find out and what should I do about it?&lt;/h2&gt; 
 &lt;div&gt; 
  &lt;div&gt; 
   &lt;p&gt;Prevention is really the first step. Decide on a path that satisfies employee and company needs, create a policy, communicate it, and enforce it.&lt;/p&gt; 
   &lt;p&gt;Surveying / Enforcing: if you have a managed security provider or security operations center, have a conversation with them about detecting unauthorized software installations or visits to unauthorized sites. They will have a number of tools at their disposal to detect and surface unauthorized use.&lt;/p&gt; 
  &lt;/div&gt; 
 &lt;/div&gt;   
 &lt;h2 style="font-size: 24px; font-weight: normal;"&gt;What are the most important security rules IT leaders should follow when dealing with AI? What security basics stay the same even as technology changes?&lt;/h2&gt; 
 &lt;div&gt; 
  &lt;div&gt; 
   &lt;p&gt;Never grant an AI agent “modify” or “execute” permissions against a system that processes confidential data without a human approver.&lt;/p&gt; 
   &lt;p&gt;The concept of &lt;strong&gt;“least privilege”&lt;/strong&gt; underscores this entire conversation. Would you allow an intern to commit code to your production codebase without a senior engineer’s review and approval? Would you allow them to send emails to the CEOs of your customers without reviewing or approving them? Least privilege isn’t new, but people placing total trust in LLM agents is. Generally, you can’t have both.&lt;/p&gt; 
  &lt;/div&gt; 
 &lt;/div&gt;   
 &lt;h2 style="font-size: 24px; font-weight: normal;"&gt;Where can IT managers go to keep learning about AI security threats and how to handle them?&lt;/h2&gt; 
 &lt;div&gt; 
  &lt;div&gt; 
   &lt;p&gt;The Center for AI Safety (&lt;a href="https://safe.ai/"&gt;https://safe.ai/&lt;/a&gt;) is a non-profit dedicated to reducing societal-scale risk from AI. Their newsletter addresses current events pertaining to AI risk, including cyber risks.&lt;/p&gt; 
   &lt;p&gt;Anthropic Academy has several great courses around AI fluency and technical expertise: &lt;a href="https://anthropic.skilljar.com/"&gt;https://anthropic.skilljar.com/&lt;/a&gt;&lt;/p&gt; 
   &lt;p&gt;As always, monitor vendor security advisories and CVE databases for AI-related vulnerabilities.&lt;/p&gt; 
  &lt;/div&gt; 
 &lt;/div&gt;   
 &lt;h2 style="font-size: 24px; font-weight: normal;"&gt;What's one thing an IT manager can do this week to immediately improve AI security?&lt;/h2&gt; 
 &lt;div&gt; 
  &lt;div&gt; 
   &lt;p&gt;Create a policy that provides a governable path to individuals using AI safely and responsibly, and commit to supporting and enforcing it.&lt;/p&gt; 
  &lt;/div&gt; 
 &lt;/div&gt;  
&lt;/div&gt;</description>
      <content:encoded>&lt;div&gt;  
 &lt;p&gt;&lt;strong&gt;Editor note:&lt;/strong&gt; &lt;em&gt;The sudden rise and crash of OpenClaw and Moltbook have been wild. The media will move on, but the story isn’t over for IT teams dealing with the risks posed by unauthorized AI. In this Q&amp;amp;A, Nick Lupien (Head of Recon Labs) will help make sense of the recent news and offer broader AI governance advice.&lt;/em&gt;&lt;/p&gt; 
 &lt;p&gt;&lt;em&gt;&lt;img src="https://blog.reconinfosec.com/hs-fs/hubfs/clawdhype-banner.jpg?width=1920&amp;amp;height=1080&amp;amp;name=clawdhype-banner.jpg" width="1920" height="1080" alt="clawdhype-banner" style="height: auto; max-width: 100%; width: 1920px; margin-left: auto; margin-right: auto; display: block;"&gt;&lt;/em&gt;&lt;/p&gt;   
 &lt;h2 style="font-size: 24px; font-weight: normal;"&gt;What would an IT manager need to know about the OpenClaw and Moltbook security issues? What makes these security issues different from others?&lt;/h2&gt; 
 &lt;div&gt; 
  &lt;div&gt; 
   &lt;p&gt;At this stage, it’s probably best to treat OpenClaw (formerly Moltbot, formerly Clawdbot) like malware. In order for OpenClaw to perform its stated function (a local personal assistant), it requires &lt;strong&gt;significant access to private data, arbitrary code execution privileges,&lt;/strong&gt; and &lt;strong&gt;absolute autonomy without human approval.&lt;/strong&gt; This combination is dangerous even without AI, but it’s particularly concerning when you consider that AI is vulnerable to &lt;strong&gt;prompt injection&lt;/strong&gt; (other people trying to trick your agent into acting against your best interests) and &lt;strong&gt;misalignment&lt;/strong&gt; (the model underneath providing inaccurate data and suggestions).&lt;/p&gt; 
   &lt;p&gt;These are both “forever problems” with large language models, and they’re the reason we put “humans in the loop” for critical functions like sending emails or texts or executing code in privileged contexts. When you hand the keys over to an agent that will automatically act on your behalf, you’re taking immeasurable risk with not only your data, but that of everyone you interact with. It’s like turning on full car automation on untested infrastructure and then going to sleep. It raises serious concerns.&lt;/p&gt; 
   &lt;p&gt;Moltbook is a public “Reddit-like” social media site that OpenClaw agents interact with autonomously. There have already been &lt;a href="https://www.wiz.io/blog/exposed-moltbook-database-reveals-millions-of-api-keys"&gt;reports of massive data loss&lt;/a&gt; due to an improperly configured database. Though this and other vulnerabilities have been addressed, it’s the clearest example yet of the threats posed by OpenClaw, and it’s likely not the last.&lt;/p&gt; 
  &lt;/div&gt; 
 &lt;/div&gt;   
 &lt;h2 style="font-size: 24px; font-weight: normal;"&gt;Employees have always used unauthorized apps at work. How is that problem different now with AI tools?&lt;/h2&gt; 
 &lt;div&gt; 
  &lt;div&gt; 
   &lt;p&gt;Unauthorized/unvetted apps are still a big problem and contribute to significant losses for companies every year. The type of risk is the same: loss of confidentiality and integrity when the application misbehaves, whether through malicious activity or accidental misuse. The addition of AI significantly increases the &lt;strong&gt;magnitude&lt;/strong&gt; of the threat: they are &lt;strong&gt;more likely to be exploited&lt;/strong&gt;, and the effects of misuse are &lt;strong&gt;significantly more damaging&lt;/strong&gt; to you, your organization, and everyone you interact with.&lt;/p&gt; 
  &lt;/div&gt; 
 &lt;/div&gt;   
 &lt;h2 style="font-size: 24px; font-weight: normal;"&gt;How do I decide whether to allow AI tools at our company? What safety measures must I put in place to protect our data and systems?&lt;/h2&gt; 
 &lt;div&gt; 
  &lt;div&gt; 
   &lt;p&gt;Stepping back, I wouldn’t conflate OpenClaw with most “AI tools.” There are many AI tools like Claude, Gemini, and ChatGPT that have mechanisms to control human-in-the-loop and that encourage good security practices. The best safety measures we’ve seen are proactive ones: provide people with vetted tools, and train them on best practices for interacting with confidential data. All of the large providers have a “no training on customer data” option for paid subscribers, and some have zero data retention policies available. Research and understand these features before deciding on a platform. Search for “Trust Center” with the products you’re considering to fully understand their compliance environments. For enterprise deployments, look for features like audit logs, admin controls, and SSO integration.&lt;/p&gt; 
   &lt;p&gt;Deciding whether to allow AI tools at your company is a risk/benefit discussion. The risks of a trained workforce using vetted tools can be controlled but are never completely mitigated. Apps change quickly, and new features may introduce new risks that require significant, ongoing attention. If you decide to embrace AI, commit to one or two products at first, and create a plan to keep up with changes to those products. Even vetted tools require good policy around integrations and human approvals.&lt;/p&gt; 
  &lt;/div&gt; 
 &lt;/div&gt;   
 &lt;h2 style="font-size: 24px; font-weight: normal;"&gt;If employees are already using unauthorized AI tools, how do I find out and what should I do about it?&lt;/h2&gt; 
 &lt;div&gt; 
  &lt;div&gt; 
   &lt;p&gt;Prevention is really the first step. Decide on a path that satisfies employee and company needs, create a policy, communicate it, and enforce it.&lt;/p&gt; 
   &lt;p&gt;Surveying / Enforcing: if you have a managed security provider or security operations center, have a conversation with them about detecting unauthorized software installations or visits to unauthorized sites. They will have a number of tools at their disposal to detect and surface unauthorized use.&lt;/p&gt; 
  &lt;/div&gt; 
 &lt;/div&gt;   
 &lt;h2 style="font-size: 24px; font-weight: normal;"&gt;What are the most important security rules IT leaders should follow when dealing with AI? What security basics stay the same even as technology changes?&lt;/h2&gt; 
 &lt;div&gt; 
  &lt;div&gt; 
   &lt;p&gt;Never grant an AI agent “modify” or “execute” permissions against a system that processes confidential data without a human approver.&lt;/p&gt; 
   &lt;p&gt;The concept of &lt;strong&gt;“least privilege”&lt;/strong&gt; underscores this entire conversation. Would you allow an intern to commit code to your production codebase without a senior engineer’s review and approval? Would you allow them to send emails to the CEOs of your customers without reviewing or approving them? Least privilege isn’t new, but people placing total trust in LLM agents is. Generally, you can’t have both.&lt;/p&gt; 
  &lt;/div&gt; 
 &lt;/div&gt;   
 &lt;h2 style="font-size: 24px; font-weight: normal;"&gt;Where can IT managers go to keep learning about AI security threats and how to handle them?&lt;/h2&gt; 
 &lt;div&gt; 
  &lt;div&gt; 
   &lt;p&gt;The Center for AI Safety (&lt;a href="https://safe.ai/"&gt;https://safe.ai/&lt;/a&gt;) is a non-profit dedicated to reducing societal-scale risk from AI. Their newsletter addresses current events pertaining to AI risk, including cyber risks.&lt;/p&gt; 
   &lt;p&gt;Anthropic Academy has several great courses around AI fluency and technical expertise: &lt;a href="https://anthropic.skilljar.com/"&gt;https://anthropic.skilljar.com/&lt;/a&gt;&lt;/p&gt; 
   &lt;p&gt;As always, monitor vendor security advisories and CVE databases for AI-related vulnerabilities.&lt;/p&gt; 
  &lt;/div&gt; 
 &lt;/div&gt;   
 &lt;h2 style="font-size: 24px; font-weight: normal;"&gt;What's one thing an IT manager can do this week to immediately improve AI security?&lt;/h2&gt; 
 &lt;div&gt; 
  &lt;div&gt; 
   &lt;p&gt;Create a policy that provides a governable path to individuals using AI safely and responsibly, and commit to supporting and enforcing it.&lt;/p&gt; 
  &lt;/div&gt; 
 &lt;/div&gt;  
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=7101814&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.reconinfosec.com%2Fclawdhype-making-sense-of-recent-ai-cybersecurity-news&amp;amp;bu=https%253A%252F%252Fblog.reconinfosec.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>AI Security</category>
      <pubDate>Fri, 06 Feb 2026 00:09:37 GMT</pubDate>
      <guid>https://blog.reconinfosec.com/clawdhype-making-sense-of-recent-ai-cybersecurity-news</guid>
      <dc:date>2026-02-06T00:09:37Z</dc:date>
      <dc:creator>Nicholas Lupien</dc:creator>
    </item>
    <item>
      <title>Planning for the Worst: Making IR, BC, and DR Plans Work</title>
      <link>https://blog.reconinfosec.com/planning-for-the-worst-making-ir-bc-and-dr-plans-work</link>
      <description>&lt;p&gt;Organizations know they should have plans for cyber incidents, but too often those plans are outdated, incomplete, or untested. Incident Response (IR), Business Continuity Plans (BCP), and Disaster Recovery (DR) plans are frequently treated as check-the-box documents instead of living, operational playbooks. The real cost of that mindset becomes painfully clear during a major cyber incident.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;Organizations know they should have plans for cyber incidents, but too often those plans are outdated, incomplete, or untested. Incident Response (IR), Business Continuity Plans (BCP), and Disaster Recovery (DR) plans are frequently treated as check-the-box documents instead of living, operational playbooks. The real cost of that mindset becomes painfully clear during a major cyber incident.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=7101814&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.reconinfosec.com%2Fplanning-for-the-worst-making-ir-bc-and-dr-plans-work&amp;amp;bu=https%253A%252F%252Fblog.reconinfosec.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Incident Response</category>
      <category>Operations</category>
      <pubDate>Fri, 09 Jan 2026 17:32:15 GMT</pubDate>
      <author>mthompson@reconinfosec.com (Macie Thompson)</author>
      <guid>https://blog.reconinfosec.com/planning-for-the-worst-making-ir-bc-and-dr-plans-work</guid>
      <dc:date>2026-01-09T17:32:15Z</dc:date>
    </item>
    <item>
      <title>Case Study: From Running Blind to Active Defense</title>
      <link>https://blog.reconinfosec.com/case-study-from-running-blind-to-active-defense</link>
      <description>&lt;p style="font-weight: bold;"&gt;&lt;em&gt;How a Mid-Size Energy Infrastructure Company Achieved 95%+ Security Score and Peace of Mind&lt;/em&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;p style="font-weight: bold;"&gt;&lt;em&gt;How a Mid-Size Energy Infrastructure Company Achieved 95%+ Security Score and Peace of Mind&lt;/em&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=7101814&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.reconinfosec.com%2Fcase-study-from-running-blind-to-active-defense&amp;amp;bu=https%253A%252F%252Fblog.reconinfosec.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Thu, 04 Dec 2025 19:44:26 GMT</pubDate>
      <guid>https://blog.reconinfosec.com/case-study-from-running-blind-to-active-defense</guid>
      <dc:date>2025-12-04T19:44:26Z</dc:date>
      <dc:creator>Recon Team</dc:creator>
    </item>
    <item>
      <title>A Pragmatic Approach to Vulnerability Management</title>
      <link>https://blog.reconinfosec.com/a-pragmatic-approach-to-vulnerability-management</link>
      <description />
      <content:encoded>&lt;img src="https://track.hubspot.com/__ptq.gif?a=7101814&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.reconinfosec.com%2Fa-pragmatic-approach-to-vulnerability-management&amp;amp;bu=https%253A%252F%252Fblog.reconinfosec.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Operations</category>
      <category>InfoSec</category>
      <category>Monitoring</category>
      <category>Infrastructure</category>
      <category>Vulnerability</category>
      <category>Risk Management</category>
      <pubDate>Mon, 10 Nov 2025 13:23:04 GMT</pubDate>
      <guid>https://blog.reconinfosec.com/a-pragmatic-approach-to-vulnerability-management</guid>
      <dc:date>2025-11-10T13:23:04Z</dc:date>
      <dc:creator>Ben Webb</dc:creator>
    </item>
    <item>
      <title>Every Pentest Makes us Better</title>
      <link>https://blog.reconinfosec.com/closing-the-loop-how-recon-infosec-uses-pentests</link>
      <description>&lt;p&gt;Penetration tests reveal the true strength of your organization’s security posture. Approached correctly, they also serve an important role in continuously improving your ability to find and stop real threats quickly. At Recon InfoSec, we view our customers’ penetration tests as invaluable opportunities to test and improve our detection capabilities against skilled attackers in a controlled environment.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;Penetration tests reveal the true strength of your organization’s security posture. Approached correctly, they also serve an important role in continuously improving your ability to find and stop real threats quickly. At Recon InfoSec, we view our customers’ penetration tests as invaluable opportunities to test and improve our detection capabilities against skilled attackers in a controlled environment.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=7101814&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.reconinfosec.com%2Fclosing-the-loop-how-recon-infosec-uses-pentests&amp;amp;bu=https%253A%252F%252Fblog.reconinfosec.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>SecOps</category>
      <category>SOC</category>
      <category>MSO</category>
      <pubDate>Wed, 08 Oct 2025 18:06:26 GMT</pubDate>
      <author>acook@reconinfosec.com (Andrew Cook)</author>
      <guid>https://blog.reconinfosec.com/closing-the-loop-how-recon-infosec-uses-pentests</guid>
      <dc:date>2025-10-08T18:06:26Z</dc:date>
    </item>
    <item>
      <title>Delivering AI Superpowers to Security Teams: Introducing Recon Labs</title>
      <link>https://blog.reconinfosec.com/introducing-recon-labs</link>
      <description>&lt;p&gt;Recon InfoSec, a leader in managed security operations, is proud to announce the creation of &lt;span style="font-weight: bold;"&gt;Recon Labs&lt;/span&gt;, our internal R&amp;amp;D organization that delivers superpowers to your security teams.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;Recon InfoSec, a leader in managed security operations, is proud to announce the creation of &lt;span style="font-weight: bold;"&gt;Recon Labs&lt;/span&gt;, our internal R&amp;amp;D organization that delivers superpowers to your security teams.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=7101814&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.reconinfosec.com%2Fintroducing-recon-labs&amp;amp;bu=https%253A%252F%252Fblog.reconinfosec.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Mon, 22 Sep 2025 21:39:15 GMT</pubDate>
      <guid>https://blog.reconinfosec.com/introducing-recon-labs</guid>
      <dc:date>2025-09-22T21:39:15Z</dc:date>
      <dc:creator>Nicholas Lupien</dc:creator>
    </item>
    <item>
      <title>Microsoft Teams Social Engineering: A Ransomware Attack Vector</title>
      <link>https://blog.reconinfosec.com/microsoft-teams-social-engineering-a-ransomware-attack-vector</link>
      <description>&lt;p&gt;The Recon SOC is&amp;nbsp;seeing an uptick in ransomware groups successfully gaining initial access to environment's by impersonating IT support staff and calling users directly over Microsoft Teams. This sophisticated social engineering attack leverages the trust users place in familiar communication platforms to bypass traditional security controls.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;The Recon SOC is&amp;nbsp;seeing an uptick in ransomware groups successfully gaining initial access to environment's by impersonating IT support staff and calling users directly over Microsoft Teams. This sophisticated social engineering attack leverages the trust users place in familiar communication platforms to bypass traditional security controls.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=7101814&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.reconinfosec.com%2Fmicrosoft-teams-social-engineering-a-ransomware-attack-vector&amp;amp;bu=https%253A%252F%252Fblog.reconinfosec.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security</category>
      <category>InfoSec</category>
      <category>ransomware</category>
      <pubDate>Thu, 18 Sep 2025 22:09:24 GMT</pubDate>
      <author>acook@reconinfosec.com (Andrew Cook)</author>
      <guid>https://blog.reconinfosec.com/microsoft-teams-social-engineering-a-ransomware-attack-vector</guid>
      <dc:date>2025-09-18T22:09:24Z</dc:date>
    </item>
    <item>
      <title>Mastering Threat Hunting Operations: A Deep Dive into Recon InfoSec’s Approach</title>
      <link>https://blog.reconinfosec.com/mastering-threat-hunting-operations</link>
      <description>&lt;p&gt;In today’s rapidly evolving cyber threat landscape, proactive defense is no longer optional—it’s essential. At Recon InfoSec, our Managed Security Operations (MSO) team makes threat hunting a cornerstone of continuous cybersecurity improvement. This blog post explores the comprehensive approach Recon takes to threat hunting operations, highlighting methodologies, tools, and best practices that empower security teams to detect and mitigate threats.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;In today’s rapidly evolving cyber threat landscape, proactive defense is no longer optional—it’s essential. At Recon InfoSec, our Managed Security Operations (MSO) team makes threat hunting a cornerstone of continuous cybersecurity improvement. This blog post explores the comprehensive approach Recon takes to threat hunting operations, highlighting methodologies, tools, and best practices that empower security teams to detect and mitigate threats.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=7101814&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.reconinfosec.com%2Fmastering-threat-hunting-operations&amp;amp;bu=https%253A%252F%252Fblog.reconinfosec.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Operations</category>
      <category>Security</category>
      <category>Open Source</category>
      <category>InfoSec</category>
      <category>Threat Hunting</category>
      <category>Defense</category>
      <category>DetectionEngineering</category>
      <category>Detections</category>
      <pubDate>Tue, 12 Aug 2025 15:52:08 GMT</pubDate>
      <guid>https://blog.reconinfosec.com/mastering-threat-hunting-operations</guid>
      <dc:date>2025-08-12T15:52:08Z</dc:date>
      <dc:creator>Watson Brown</dc:creator>
    </item>
    <item>
      <title>Prolific Phishing Campaign Leveraging Zoom's Infrastructure</title>
      <link>https://blog.reconinfosec.com/zoom-events-phishing</link>
      <description>&lt;div&gt; 
 &lt;div&gt; 
  &lt;div&gt; 
   &lt;p&gt;The Recon SOC recently identified a significant uptick in phishing campaigns that exploit the legitimate infrastructure of Zoom Events.&lt;/p&gt; 
   &lt;p&gt;These phishing attempts originate from &lt;span style="font-weight: bold;"&gt;noreply-zoomevents@zoom.us&lt;/span&gt;, bypassing numerous email security filters. These messages are cryptographically signed (SPF/DKIM/DMARC) and originate from Zoom Events, making it exceedingly difficult for users to identify them as phishing.&lt;/p&gt; 
   &lt;p&gt;Headers from an example email we’ve observed show the following authentication information:&lt;/p&gt; 
   &lt;p&gt;“&lt;a href="https://www.abuseipdb.com/check/159.183.192.104"&gt;&lt;span&gt;Pass (protection.outlook.com: domain of bounce-sg.zoom.us designates 159.183.192.104 as permitted sender)&lt;/span&gt;&lt;/a&gt;; &lt;span style="font-weight: bold;"&gt;helo=o26.sg.zoom.us;&lt;/span&gt; pr=C”&lt;/p&gt; 
   &lt;p&gt;“&lt;a href="https://www.abuseipdb.com/check/159.183.192.104"&gt;&lt;span&gt;spf=pass (sender IP is 159.183.192.104)&lt;/span&gt;&lt;/a&gt; &lt;a href="https://www.spf-record.com/spf-lookup/bounce-sg.zoom.us"&gt;&lt;span&gt;smtp.mailfrom=bounce-sg.zoom.us&lt;/span&gt;&lt;/a&gt;; dkim=pass (&lt;span style="font-weight: bold;"&gt;signature was verified&lt;/span&gt;) header&lt;span style="font-weight: bold;"&gt;.d=zoom.us;dmarc=pass&lt;/span&gt; action=none &lt;span style="font-weight: bold;"&gt;header.from=zoom.us&lt;/span&gt;;compauth=pass reason=100”&lt;/p&gt; 
   &lt;p&gt;&lt;a href="https://www.google.com/url?q=https://www.abuseipdb.com/check/159.183.192.104&amp;amp;sa=D&amp;amp;source=docs&amp;amp;ust=1750458579471377&amp;amp;usg=AOvVaw1jFn_Nk7ysbI8LvrXWRWOw"&gt;&lt;img src="https://blog.reconinfosec.com/hs-fs/hubfs/abuseipdb.png?width=320&amp;amp;height=275&amp;amp;name=abuseipdb.png" width="320" height="275" alt="abuseipdb" style="height: auto; max-width: 100%; width: 320px;"&gt;&lt;/a&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;a href="https://www.spf-record.com/spf-lookup/bounce-sg.zoom.us"&gt;&lt;img src="https://blog.reconinfosec.com/hs-fs/hubfs/spf_record.png?width=563&amp;amp;height=196&amp;amp;name=spf_record.png" width="563" height="196" alt="spf_record" style="height: auto; max-width: 100%; width: 563px;"&gt;&lt;/a&gt;&lt;/p&gt; 
   &lt;br&gt; 
   &lt;p&gt;We have observed both credential phishing and malicious desktop applications, urging users to “View file” and “Download Desktop App Now”. In all cases, there was an initial link to &lt;span style="font-weight: bold;"&gt;&lt;code&gt;hxxps://docs.zoom.us/doc/&lt;/code&gt;.&lt;/span&gt; From there, users were either redirected to an AitM credential phishing site, or a malicious ScreenConnect[.]exe download.&amp;nbsp;&lt;/p&gt; 
   &lt;p&gt;This is &lt;a href="https://cofense.com/blog/from-collaboration-to-deception-the-zoom-phishing-threat"&gt;not an entirely new technique for AitM phishing &lt;/a&gt;using &lt;code&gt;hxxps://docs.zoom.us/doc/.&lt;/code&gt; However, unlike previously reported campaigns, this latest threat includes the abuse of Zoom Events.&lt;/p&gt; 
   &lt;h1 style="font-size: 38px;"&gt;&lt;span style="color: #000000;"&gt;Credential Phishing Using Zoom Events&lt;/span&gt;&lt;/h1&gt; 
   &lt;p style="font-size: 16px;"&gt;&lt;span style="color: #000000;"&gt;The credential phishing emails utilize ChainLink Phishing, calling users to open a link to a document/file, leading to &lt;code&gt;hxxps://docs.zoom.us/doc/&lt;/code&gt;, directing them to click to another link that displays a fake verification request (CAPTCHA), then to an AitM Microsoft login page where they are prompted to enter their credentials.&lt;/span&gt;&lt;/p&gt; 
   &lt;p style="font-size: 14px; font-weight: bold;"&gt;Example Malicious Email:&lt;/p&gt; 
   &lt;p style="font-size: 14px;"&gt;&lt;img src="https://blog.reconinfosec.com/hs-fs/hubfs/phish_email_excel.png?width=520&amp;amp;height=295&amp;amp;name=phish_email_excel.png" width="520" height="295" alt="phish_email_excel" style="height: auto; max-width: 100%; width: 520px;"&gt;&lt;/p&gt; 
   &lt;p style="font-size: 14px;"&gt;&lt;span style="font-weight: bold;"&gt;Sample hxxps[://]docs[.]zoom[.]us/doc/ page:&lt;/span&gt;&lt;/p&gt; 
   &lt;p style="font-size: 14px;"&gt;&lt;span style="font-weight: bold;"&gt;&lt;/span&gt; &lt;img src="https://blog.reconinfosec.com/hs-fs/hubfs/phish_email_office_icons.png?width=427&amp;amp;height=392&amp;amp;name=phish_email_office_icons.png" width="427" height="392" alt="phish_page_office_icons" style="height: auto; max-width: 100%; width: 427px;"&gt;&lt;/p&gt; 
   &lt;p style="font-size: 14px;"&gt;&lt;span style="font-weight: bold;"&gt;Fake verification page:&lt;/span&gt;&lt;/p&gt; 
   &lt;p style="font-size: 14px;"&gt;&lt;span style="font-weight: bold;"&gt;&lt;/span&gt;&lt;img src="https://blog.reconinfosec.com/hs-fs/hubfs/Screenshot%202025-06-20%20at%205.32.57%20PM.png?width=305&amp;amp;height=110&amp;amp;name=Screenshot%202025-06-20%20at%205.32.57%20PM.png" width="305" height="110" alt="Screenshot 2025-06-20 at 5.32.57 PM" style="height: auto; max-width: 100%; width: 305px;"&gt;&lt;img src="https://blog.reconinfosec.com/hs-fs/hubfs/Screenshot%202025-06-20%20at%205.33.56%20PM.png?width=362&amp;amp;height=119&amp;amp;name=Screenshot%202025-06-20%20at%205.33.56%20PM.png" width="362" height="119" alt="Screenshot 2025-06-20 at 5.33.56 PM" style="height: auto; max-width: 100%; width: 362px;"&gt;&lt;/p&gt; 
   &lt;p style="font-size: 14px;"&gt;&lt;span style="font-weight: bold;"&gt;Phishing landing page:&lt;/span&gt;&lt;/p&gt; 
   &lt;p style="font-size: 14px;"&gt;&lt;span style="font-weight: bold;"&gt;&lt;/span&gt; &lt;img src="https://blog.reconinfosec.com/hs-fs/hubfs/Screenshot%202025-06-20%20at%205.54.57%20PM.png?width=542&amp;amp;height=398&amp;amp;name=Screenshot%202025-06-20%20at%205.54.57%20PM.png" width="542" height="398" alt="Screenshot 2025-06-20 at 5.54.57 PM" style="height: auto; max-width: 100%; width: 542px;"&gt;&lt;/p&gt; 
   &lt;h2 style="font-size: 38px;"&gt;&lt;span style="color: #000000;"&gt;Delivering Malicious Downloads Using Zoom Events&lt;/span&gt;&lt;/h2&gt; 
   &lt;p&gt;The malicious download phishing emails utilize ChainLink Phishing, calling users to open a link to a document/file, leading to &lt;code&gt;hxxps://docs.zoom.us/doc/&lt;/code&gt;, then to a malicious download. It appears that the same email is sent to multiple users across different organizations, all with the same &lt;code&gt;docs.zoom.us&lt;/code&gt; link.&lt;/p&gt; 
   &lt;p&gt;At one point during our investigation, for a new email, we found that several users were accessing the shared Zoom doc at the same time.&lt;/p&gt; 
   &lt;br&gt; 
   &lt;p style="font-size: 14px;"&gt;&lt;span style="font-weight: bold;"&gt;Example Malicious Email:&lt;/span&gt;&lt;/p&gt; 
   &lt;p style="font-size: 14px;"&gt;&lt;span style="font-weight: bold;"&gt;&lt;/span&gt; &lt;img src="https://blog.reconinfosec.com/hs-fs/hubfs/SSA_phish_email.png?width=503&amp;amp;height=619&amp;amp;name=SSA_phish_email.png" width="503" height="619" alt="SSA_phish_email" style="height: auto; max-width: 100%; width: 503px;"&gt;&lt;span style="font-weight: bold;"&gt;&lt;/span&gt;&lt;/p&gt; 
   &lt;p style="font-size: 14px;"&gt;&lt;span style="font-weight: bold;"&gt;hxxps://docs.zoom.us/doc/ page:&lt;/span&gt;&lt;/p&gt; 
   &lt;p style="font-size: 14px;"&gt;&lt;span style="font-weight: bold;"&gt;&lt;/span&gt;&lt;img src="https://blog.reconinfosec.com/hs-fs/hubfs/SSA_phish_page.png?width=624&amp;amp;height=643&amp;amp;name=SSA_phish_page.png" width="624" height="643" alt="SSA_phish_page" style="height: auto; max-width: 100%; width: 624px;"&gt;&lt;/p&gt; 
   &lt;br&gt; 
   &lt;p style="font-size: 16px;"&gt;This sample is now even more concerning, as it’s downloading a malware payload - which we’ve identified as &lt;span style="font-size: 16px;"&gt;&lt;a href="https://www.joesandbox.com/analysis/1719604"&gt;a renamed ScreenConnect binary&lt;/a&gt;&lt;/span&gt;.&lt;/p&gt; 
   &lt;p style="font-size: 16px;"&gt;&lt;span style="font-weight: bold; font-size: 14px;"&gt;App Protection Warning on Fake&amp;nbsp;ScreenConnect Binary:&lt;/span&gt;&lt;/p&gt; 
   &lt;p style="font-size: 16px;"&gt;&lt;strong&gt;&lt;img src="https://blog.reconinfosec.com/hs-fs/hubfs/renamed_binary.png?width=480&amp;amp;height=433&amp;amp;name=renamed_binary.png" width="480" height="433" alt="renamed_binary" style="height: auto; max-width: 100%; width: 480px;"&gt;&lt;/strong&gt;&lt;/p&gt; 
   &lt;p&gt;There are other recently uploaded examples with similar file names and similar &lt;code&gt;docs.zoom.us &lt;/code&gt;links, most likely attributed to this same campaign, &lt;a href="https://any.run/report/e5b225b87906e355a42a6fec46601586257840fc0c35a8fcc2b4d8e7cec23fa8/4375f143-b9cc-42c0-a4a3-6cd8a69e694e"&gt;that we found on ANY.RUN&lt;/a&gt;.&lt;/p&gt; 
   &lt;p&gt;Customers protected by &lt;a href="https://sublime.security/"&gt;Sublime&lt;/a&gt; and Recon's Advanced Email Protection (AEP) offering will find these messages automatically quarantined. Recon's engineers started crafting the necessary detection rules to identify these threats within hours of their initial discovery.&lt;/p&gt; 
   &lt;p style="font-size: 14px;"&gt;&lt;span style="font-weight: bold;"&gt;&lt;a href="https://sublime.security/"&gt;Sublime&lt;/a&gt; MQL Detection Logic:&lt;/span&gt;&lt;/p&gt; 
   &lt;p&gt;&lt;img src="https://blog.reconinfosec.com/hs-fs/hubfs/detections.png?width=624&amp;amp;height=344&amp;amp;name=detections.png" width="624" height="344" alt="detections" style="height: auto; max-width: 100%; width: 624px;"&gt;&lt;/p&gt; 
   &lt;p style="font-size: 16px;"&gt;We submitted a case to Zoom on Thursday evening, alerting them of the fraudulent activity sent from their platform, and offering samples. Our case was closed, saying that enforcing DMARC prevents this, despite our observation of DMARC passing. Friday afternoon, we opened another case and submitted samples. It appears that these attackers are leveraging compromised user accounts with access to “&lt;a href="https://support.zoom.com/hc/en/article?id=zm_kb&amp;amp;sysparm_article=KB0057915" style="font-size: 11px;"&gt;&lt;span&gt;&lt;span style="font-size: 16px;"&gt;Zoom Events Email Builder&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;”.&lt;/p&gt; 
   &lt;h2&gt;&lt;span style="color: #000000;"&gt;Key Indicators of this phishing campaign:&lt;/span&gt;&lt;/h2&gt; 
   &lt;ul&gt; 
    &lt;li&gt;&lt;strong&gt;Deceptive Subject Lines &amp;amp; Content:&lt;/strong&gt; These have been seen mimicking urgent financial, file sharing, or government notices.&lt;/li&gt; 
    &lt;li&gt;&lt;strong&gt;Impersonation:&lt;/strong&gt; This campaign impersonates legitimate organizations such as the Social Security Administration and investment firms.&lt;/li&gt; 
    &lt;li&gt;&lt;strong&gt;Call to Action:&lt;/strong&gt; Recipients are pressured to download desktop applications or click "View File" buttons within the email.&lt;/li&gt; 
    &lt;li&gt;&lt;strong&gt;Misleading Branding:&lt;/strong&gt; Emails feature Microsoft Office icons or Zoom Events footers with deceptive instructions to act on a "secure" document.&lt;/li&gt; 
    &lt;li&gt;&lt;strong&gt;Malicious Links:&lt;/strong&gt; Links typically redirect to credential harvesting sites or attempt to download malicious renamed ScreenConnect executables.&lt;/li&gt; 
   &lt;/ul&gt; 
   &lt;h2&gt;&lt;span style="color: #000000;"&gt;Protect your organization:&lt;/span&gt;&lt;/h2&gt; 
   &lt;ul&gt; 
    &lt;li&gt;Users should be &lt;strong&gt;warned not to click on links or download files&lt;/strong&gt; from unexpected "Zoom Events" emails.&lt;/li&gt; 
    &lt;li&gt;If a message appears suspicious, &lt;strong&gt;verify its legitimacy with the sender through an independent channel&lt;/strong&gt; rather than by directly replying.&lt;/li&gt; 
    &lt;li&gt;&lt;strong&gt;Report any suspicious emails&lt;/strong&gt; using your organization's established user-reported email systems.&lt;/li&gt; 
   &lt;/ul&gt; 
   &lt;br&gt; 
   &lt;h2&gt;&lt;span style="color: #000000;"&gt;IOCs:&lt;/span&gt;&lt;/h2&gt; 
   &lt;p&gt;&lt;span style="font-weight: bold;"&gt;AitM Phishing URLs:&lt;/span&gt;&lt;br&gt;&lt;code&gt;hxxps[://]office[.]regencyoutdor[.]com/JUinaeSo&lt;/code&gt;&lt;br&gt;&lt;code&gt;hxxps[://]od9[.]qkipikpp[.]es/PFsfkU!WQgMbZ/&lt;/code&gt;&lt;br&gt;&lt;code&gt;hxxps[://]ffdsjf9[.]qkipikpp[.]es/PFsfkU!WQgMbZ/&lt;/code&gt;&lt;br&gt;&lt;code&gt;hxxps[://]call[.]qkipikpp[.]es/PFsfkU!WQgMbZ/&lt;/code&gt;&lt;br&gt;&lt;code&gt;hxxps[://]0ffgyedfrvl[.]qkipikpp[.]es/H7mozVCPB@35vHfGN&lt;/code&gt;&lt;br&gt;&lt;code&gt;hxxps[://]foiufl[.]qkipikpp[.]es/H7mozVCPB@35vHfGN&lt;/code&gt;&lt;br&gt;&lt;code&gt;hxxps[://]dnffeerof9[.]qkipikpp[.]es/PFsfkU!WQgMbZ/&lt;/code&gt;&lt;br&gt;&lt;code&gt;hxxps[://]rrof9[.]qkipikpp[.]es/PFsfkU!WQgMbZ/&lt;/code&gt;&lt;br&gt;&lt;code&gt;hxxps[://]scjool[.]qkipikpp[.]es/H7mozVCPB@35vHfGN&lt;/code&gt;&lt;br&gt;&lt;code&gt;hxxps[://]trtiro[.]qkipikpp[.]es/PFsfkU!WQgMbZ/&lt;/code&gt;&lt;br&gt;&lt;code&gt;hxxps[://]79ml2xl73[.]gwzimifoi[.]es/mxci!oD9ymNViz1JTv/&lt;/code&gt;&lt;br&gt;&lt;code&gt;hxxps[://]looil[.]qkipikpp[.]es/H7mozVCPB@35vHfGN&lt;/code&gt;&lt;br&gt;&lt;code&gt;hxxps[://]swiftde[.]qkipikpp[.]es/PFsfkU!WQgMbZ/&lt;/code&gt;&lt;br&gt;&lt;code&gt;hxxps[://]truiro[.]qkipikpp[.]es/PFsfkU!WQgMbZ/&lt;/code&gt;&lt;br&gt;&lt;code&gt;hxxps[://]sso[.]qkipikpp[.]es/PFsfkU!WQgMbZ/&lt;/code&gt;&lt;br&gt;&lt;code&gt;hxxps[://]tuiriro[.]qkipikpp[.]es/PFsfkU!WQgMbZ/&lt;/code&gt;&lt;br&gt;&lt;code&gt;hxxps[://]invest[.]qkipikpp[.]es/PFsfkU!WQgMbZ/&lt;/code&gt;&lt;br&gt;&lt;code&gt;hxxps[://]pgjonesadr[.]com/js&lt;/code&gt;&lt;br&gt;&lt;code&gt;hxxps[://]yuide[.]qkipikpp[.]es/PFsfkU!WQgMbZ/&lt;/code&gt;&lt;br&gt;&lt;code&gt;hxxps[://]spsol[.]qkipikpp[.]es/H7mozVCPB@35vHfGN&lt;/code&gt;&lt;/p&gt; 
   &lt;br&gt; 
   &lt;p&gt;&lt;span style="font-weight: bold;"&gt;Renamed Screenconnect Malicious payload URL:&lt;/span&gt;&lt;br&gt;&lt;code&gt;hxxps[://]okekeimmigrationlawyer[.]com/js/&lt;/code&gt;&lt;br&gt;&lt;code&gt;&lt;a href="https://www.joesandbox.com/analysis/1719604"&gt;https://www.joesandbox.com/analysis/1719604&lt;/a&gt;&lt;/code&gt;&lt;/p&gt; 
   &lt;br&gt;
   &lt;br&gt;
  &lt;/div&gt; 
 &lt;/div&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div&gt; 
 &lt;div&gt; 
  &lt;div&gt; 
   &lt;p&gt;The Recon SOC recently identified a significant uptick in phishing campaigns that exploit the legitimate infrastructure of Zoom Events.&lt;/p&gt; 
   &lt;p&gt;These phishing attempts originate from &lt;span style="font-weight: bold;"&gt;noreply-zoomevents@zoom.us&lt;/span&gt;, bypassing numerous email security filters. These messages are cryptographically signed (SPF/DKIM/DMARC) and originate from Zoom Events, making it exceedingly difficult for users to identify them as phishing.&lt;/p&gt; 
   &lt;p&gt;Headers from an example email we’ve observed show the following authentication information:&lt;/p&gt; 
   &lt;p&gt;“&lt;a href="https://www.abuseipdb.com/check/159.183.192.104"&gt;&lt;span&gt;Pass (protection.outlook.com: domain of bounce-sg.zoom.us designates 159.183.192.104 as permitted sender)&lt;/span&gt;&lt;/a&gt;; &lt;span style="font-weight: bold;"&gt;helo=o26.sg.zoom.us;&lt;/span&gt; pr=C”&lt;/p&gt; 
   &lt;p&gt;“&lt;a href="https://www.abuseipdb.com/check/159.183.192.104"&gt;&lt;span&gt;spf=pass (sender IP is 159.183.192.104)&lt;/span&gt;&lt;/a&gt; &lt;a href="https://www.spf-record.com/spf-lookup/bounce-sg.zoom.us"&gt;&lt;span&gt;smtp.mailfrom=bounce-sg.zoom.us&lt;/span&gt;&lt;/a&gt;; dkim=pass (&lt;span style="font-weight: bold;"&gt;signature was verified&lt;/span&gt;) header&lt;span style="font-weight: bold;"&gt;.d=zoom.us;dmarc=pass&lt;/span&gt; action=none &lt;span style="font-weight: bold;"&gt;header.from=zoom.us&lt;/span&gt;;compauth=pass reason=100”&lt;/p&gt; 
   &lt;p&gt;&lt;a href="https://www.google.com/url?q=https://www.abuseipdb.com/check/159.183.192.104&amp;amp;sa=D&amp;amp;source=docs&amp;amp;ust=1750458579471377&amp;amp;usg=AOvVaw1jFn_Nk7ysbI8LvrXWRWOw"&gt;&lt;img src="https://blog.reconinfosec.com/hs-fs/hubfs/abuseipdb.png?width=320&amp;amp;height=275&amp;amp;name=abuseipdb.png" width="320" height="275" alt="abuseipdb" style="height: auto; max-width: 100%; width: 320px;"&gt;&lt;/a&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;a href="https://www.spf-record.com/spf-lookup/bounce-sg.zoom.us"&gt;&lt;img src="https://blog.reconinfosec.com/hs-fs/hubfs/spf_record.png?width=563&amp;amp;height=196&amp;amp;name=spf_record.png" width="563" height="196" alt="spf_record" style="height: auto; max-width: 100%; width: 563px;"&gt;&lt;/a&gt;&lt;/p&gt; 
   &lt;br&gt; 
   &lt;p&gt;We have observed both credential phishing and malicious desktop applications, urging users to “View file” and “Download Desktop App Now”. In all cases, there was an initial link to &lt;span style="font-weight: bold;"&gt;&lt;code&gt;hxxps://docs.zoom.us/doc/&lt;/code&gt;.&lt;/span&gt; From there, users were either redirected to an AitM credential phishing site, or a malicious ScreenConnect[.]exe download.&amp;nbsp;&lt;/p&gt; 
   &lt;p&gt;This is &lt;a href="https://cofense.com/blog/from-collaboration-to-deception-the-zoom-phishing-threat"&gt;not an entirely new technique for AitM phishing &lt;/a&gt;using &lt;code&gt;hxxps://docs.zoom.us/doc/.&lt;/code&gt; However, unlike previously reported campaigns, this latest threat includes the abuse of Zoom Events.&lt;/p&gt; 
   &lt;h1 style="font-size: 38px;"&gt;&lt;span style="color: #000000;"&gt;Credential Phishing Using Zoom Events&lt;/span&gt;&lt;/h1&gt; 
   &lt;p style="font-size: 16px;"&gt;&lt;span style="color: #000000;"&gt;The credential phishing emails utilize ChainLink Phishing, calling users to open a link to a document/file, leading to &lt;code&gt;hxxps://docs.zoom.us/doc/&lt;/code&gt;, directing them to click to another link that displays a fake verification request (CAPTCHA), then to an AitM Microsoft login page where they are prompted to enter their credentials.&lt;/span&gt;&lt;/p&gt; 
   &lt;p style="font-size: 14px; font-weight: bold;"&gt;Example Malicious Email:&lt;/p&gt; 
   &lt;p style="font-size: 14px;"&gt;&lt;img src="https://blog.reconinfosec.com/hs-fs/hubfs/phish_email_excel.png?width=520&amp;amp;height=295&amp;amp;name=phish_email_excel.png" width="520" height="295" alt="phish_email_excel" style="height: auto; max-width: 100%; width: 520px;"&gt;&lt;/p&gt; 
   &lt;p style="font-size: 14px;"&gt;&lt;span style="font-weight: bold;"&gt;Sample hxxps[://]docs[.]zoom[.]us/doc/ page:&lt;/span&gt;&lt;/p&gt; 
   &lt;p style="font-size: 14px;"&gt;&lt;span style="font-weight: bold;"&gt;&lt;/span&gt; &lt;img src="https://blog.reconinfosec.com/hs-fs/hubfs/phish_email_office_icons.png?width=427&amp;amp;height=392&amp;amp;name=phish_email_office_icons.png" width="427" height="392" alt="phish_page_office_icons" style="height: auto; max-width: 100%; width: 427px;"&gt;&lt;/p&gt; 
   &lt;p style="font-size: 14px;"&gt;&lt;span style="font-weight: bold;"&gt;Fake verification page:&lt;/span&gt;&lt;/p&gt; 
   &lt;p style="font-size: 14px;"&gt;&lt;span style="font-weight: bold;"&gt;&lt;/span&gt;&lt;img src="https://blog.reconinfosec.com/hs-fs/hubfs/Screenshot%202025-06-20%20at%205.32.57%20PM.png?width=305&amp;amp;height=110&amp;amp;name=Screenshot%202025-06-20%20at%205.32.57%20PM.png" width="305" height="110" alt="Screenshot 2025-06-20 at 5.32.57 PM" style="height: auto; max-width: 100%; width: 305px;"&gt;&lt;img src="https://blog.reconinfosec.com/hs-fs/hubfs/Screenshot%202025-06-20%20at%205.33.56%20PM.png?width=362&amp;amp;height=119&amp;amp;name=Screenshot%202025-06-20%20at%205.33.56%20PM.png" width="362" height="119" alt="Screenshot 2025-06-20 at 5.33.56 PM" style="height: auto; max-width: 100%; width: 362px;"&gt;&lt;/p&gt; 
   &lt;p style="font-size: 14px;"&gt;&lt;span style="font-weight: bold;"&gt;Phishing landing page:&lt;/span&gt;&lt;/p&gt; 
   &lt;p style="font-size: 14px;"&gt;&lt;span style="font-weight: bold;"&gt;&lt;/span&gt; &lt;img src="https://blog.reconinfosec.com/hs-fs/hubfs/Screenshot%202025-06-20%20at%205.54.57%20PM.png?width=542&amp;amp;height=398&amp;amp;name=Screenshot%202025-06-20%20at%205.54.57%20PM.png" width="542" height="398" alt="Screenshot 2025-06-20 at 5.54.57 PM" style="height: auto; max-width: 100%; width: 542px;"&gt;&lt;/p&gt; 
   &lt;h2 style="font-size: 38px;"&gt;&lt;span style="color: #000000;"&gt;Delivering Malicious Downloads Using Zoom Events&lt;/span&gt;&lt;/h2&gt; 
   &lt;p&gt;The malicious download phishing emails utilize ChainLink Phishing, calling users to open a link to a document/file, leading to &lt;code&gt;hxxps://docs.zoom.us/doc/&lt;/code&gt;, then to a malicious download. It appears that the same email is sent to multiple users across different organizations, all with the same &lt;code&gt;docs.zoom.us&lt;/code&gt; link.&lt;/p&gt; 
   &lt;p&gt;At one point during our investigation, for a new email, we found that several users were accessing the shared Zoom doc at the same time.&lt;/p&gt; 
   &lt;br&gt; 
   &lt;p style="font-size: 14px;"&gt;&lt;span style="font-weight: bold;"&gt;Example Malicious Email:&lt;/span&gt;&lt;/p&gt; 
   &lt;p style="font-size: 14px;"&gt;&lt;span style="font-weight: bold;"&gt;&lt;/span&gt; &lt;img src="https://blog.reconinfosec.com/hs-fs/hubfs/SSA_phish_email.png?width=503&amp;amp;height=619&amp;amp;name=SSA_phish_email.png" width="503" height="619" alt="SSA_phish_email" style="height: auto; max-width: 100%; width: 503px;"&gt;&lt;span style="font-weight: bold;"&gt;&lt;/span&gt;&lt;/p&gt; 
   &lt;p style="font-size: 14px;"&gt;&lt;span style="font-weight: bold;"&gt;hxxps://docs.zoom.us/doc/ page:&lt;/span&gt;&lt;/p&gt; 
   &lt;p style="font-size: 14px;"&gt;&lt;span style="font-weight: bold;"&gt;&lt;/span&gt;&lt;img src="https://blog.reconinfosec.com/hs-fs/hubfs/SSA_phish_page.png?width=624&amp;amp;height=643&amp;amp;name=SSA_phish_page.png" width="624" height="643" alt="SSA_phish_page" style="height: auto; max-width: 100%; width: 624px;"&gt;&lt;/p&gt; 
   &lt;br&gt; 
   &lt;p style="font-size: 16px;"&gt;This sample is now even more concerning, as it’s downloading a malware payload - which we’ve identified as &lt;span style="font-size: 16px;"&gt;&lt;a href="https://www.joesandbox.com/analysis/1719604"&gt;a renamed ScreenConnect binary&lt;/a&gt;&lt;/span&gt;.&lt;/p&gt; 
   &lt;p style="font-size: 16px;"&gt;&lt;span style="font-weight: bold; font-size: 14px;"&gt;App Protection Warning on Fake&amp;nbsp;ScreenConnect Binary:&lt;/span&gt;&lt;/p&gt; 
   &lt;p style="font-size: 16px;"&gt;&lt;strong&gt;&lt;img src="https://blog.reconinfosec.com/hs-fs/hubfs/renamed_binary.png?width=480&amp;amp;height=433&amp;amp;name=renamed_binary.png" width="480" height="433" alt="renamed_binary" style="height: auto; max-width: 100%; width: 480px;"&gt;&lt;/strong&gt;&lt;/p&gt; 
   &lt;p&gt;There are other recently uploaded examples with similar file names and similar &lt;code&gt;docs.zoom.us &lt;/code&gt;links, most likely attributed to this same campaign, &lt;a href="https://any.run/report/e5b225b87906e355a42a6fec46601586257840fc0c35a8fcc2b4d8e7cec23fa8/4375f143-b9cc-42c0-a4a3-6cd8a69e694e"&gt;that we found on ANY.RUN&lt;/a&gt;.&lt;/p&gt; 
   &lt;p&gt;Customers protected by &lt;a href="https://sublime.security/"&gt;Sublime&lt;/a&gt; and Recon's Advanced Email Protection (AEP) offering will find these messages automatically quarantined. Recon's engineers started crafting the necessary detection rules to identify these threats within hours of their initial discovery.&lt;/p&gt; 
   &lt;p style="font-size: 14px;"&gt;&lt;span style="font-weight: bold;"&gt;&lt;a href="https://sublime.security/"&gt;Sublime&lt;/a&gt; MQL Detection Logic:&lt;/span&gt;&lt;/p&gt; 
   &lt;p&gt;&lt;img src="https://blog.reconinfosec.com/hs-fs/hubfs/detections.png?width=624&amp;amp;height=344&amp;amp;name=detections.png" width="624" height="344" alt="detections" style="height: auto; max-width: 100%; width: 624px;"&gt;&lt;/p&gt; 
   &lt;p style="font-size: 16px;"&gt;We submitted a case to Zoom on Thursday evening, alerting them of the fraudulent activity sent from their platform, and offering samples. Our case was closed, saying that enforcing DMARC prevents this, despite our observation of DMARC passing. Friday afternoon, we opened another case and submitted samples. It appears that these attackers are leveraging compromised user accounts with access to “&lt;a href="https://support.zoom.com/hc/en/article?id=zm_kb&amp;amp;sysparm_article=KB0057915" style="font-size: 11px;"&gt;&lt;span&gt;&lt;span style="font-size: 16px;"&gt;Zoom Events Email Builder&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;”.&lt;/p&gt; 
   &lt;h2&gt;&lt;span style="color: #000000;"&gt;Key Indicators of this phishing campaign:&lt;/span&gt;&lt;/h2&gt; 
   &lt;ul&gt; 
    &lt;li&gt;&lt;strong&gt;Deceptive Subject Lines &amp;amp; Content:&lt;/strong&gt; These have been seen mimicking urgent financial, file sharing, or government notices.&lt;/li&gt; 
    &lt;li&gt;&lt;strong&gt;Impersonation:&lt;/strong&gt; This campaign impersonates legitimate organizations such as the Social Security Administration and investment firms.&lt;/li&gt; 
    &lt;li&gt;&lt;strong&gt;Call to Action:&lt;/strong&gt; Recipients are pressured to download desktop applications or click "View File" buttons within the email.&lt;/li&gt; 
    &lt;li&gt;&lt;strong&gt;Misleading Branding:&lt;/strong&gt; Emails feature Microsoft Office icons or Zoom Events footers with deceptive instructions to act on a "secure" document.&lt;/li&gt; 
    &lt;li&gt;&lt;strong&gt;Malicious Links:&lt;/strong&gt; Links typically redirect to credential harvesting sites or attempt to download malicious renamed ScreenConnect executables.&lt;/li&gt; 
   &lt;/ul&gt; 
   &lt;h2&gt;&lt;span style="color: #000000;"&gt;Protect your organization:&lt;/span&gt;&lt;/h2&gt; 
   &lt;ul&gt; 
    &lt;li&gt;Users should be &lt;strong&gt;warned not to click on links or download files&lt;/strong&gt; from unexpected "Zoom Events" emails.&lt;/li&gt; 
    &lt;li&gt;If a message appears suspicious, &lt;strong&gt;verify its legitimacy with the sender through an independent channel&lt;/strong&gt; rather than by directly replying.&lt;/li&gt; 
    &lt;li&gt;&lt;strong&gt;Report any suspicious emails&lt;/strong&gt; using your organization's established user-reported email systems.&lt;/li&gt; 
   &lt;/ul&gt; 
   &lt;br&gt; 
   &lt;h2&gt;&lt;span style="color: #000000;"&gt;IOCs:&lt;/span&gt;&lt;/h2&gt; 
   &lt;p&gt;&lt;span style="font-weight: bold;"&gt;AitM Phishing URLs:&lt;/span&gt;&lt;br&gt;&lt;code&gt;hxxps[://]office[.]regencyoutdor[.]com/JUinaeSo&lt;/code&gt;&lt;br&gt;&lt;code&gt;hxxps[://]od9[.]qkipikpp[.]es/PFsfkU!WQgMbZ/&lt;/code&gt;&lt;br&gt;&lt;code&gt;hxxps[://]ffdsjf9[.]qkipikpp[.]es/PFsfkU!WQgMbZ/&lt;/code&gt;&lt;br&gt;&lt;code&gt;hxxps[://]call[.]qkipikpp[.]es/PFsfkU!WQgMbZ/&lt;/code&gt;&lt;br&gt;&lt;code&gt;hxxps[://]0ffgyedfrvl[.]qkipikpp[.]es/H7mozVCPB@35vHfGN&lt;/code&gt;&lt;br&gt;&lt;code&gt;hxxps[://]foiufl[.]qkipikpp[.]es/H7mozVCPB@35vHfGN&lt;/code&gt;&lt;br&gt;&lt;code&gt;hxxps[://]dnffeerof9[.]qkipikpp[.]es/PFsfkU!WQgMbZ/&lt;/code&gt;&lt;br&gt;&lt;code&gt;hxxps[://]rrof9[.]qkipikpp[.]es/PFsfkU!WQgMbZ/&lt;/code&gt;&lt;br&gt;&lt;code&gt;hxxps[://]scjool[.]qkipikpp[.]es/H7mozVCPB@35vHfGN&lt;/code&gt;&lt;br&gt;&lt;code&gt;hxxps[://]trtiro[.]qkipikpp[.]es/PFsfkU!WQgMbZ/&lt;/code&gt;&lt;br&gt;&lt;code&gt;hxxps[://]79ml2xl73[.]gwzimifoi[.]es/mxci!oD9ymNViz1JTv/&lt;/code&gt;&lt;br&gt;&lt;code&gt;hxxps[://]looil[.]qkipikpp[.]es/H7mozVCPB@35vHfGN&lt;/code&gt;&lt;br&gt;&lt;code&gt;hxxps[://]swiftde[.]qkipikpp[.]es/PFsfkU!WQgMbZ/&lt;/code&gt;&lt;br&gt;&lt;code&gt;hxxps[://]truiro[.]qkipikpp[.]es/PFsfkU!WQgMbZ/&lt;/code&gt;&lt;br&gt;&lt;code&gt;hxxps[://]sso[.]qkipikpp[.]es/PFsfkU!WQgMbZ/&lt;/code&gt;&lt;br&gt;&lt;code&gt;hxxps[://]tuiriro[.]qkipikpp[.]es/PFsfkU!WQgMbZ/&lt;/code&gt;&lt;br&gt;&lt;code&gt;hxxps[://]invest[.]qkipikpp[.]es/PFsfkU!WQgMbZ/&lt;/code&gt;&lt;br&gt;&lt;code&gt;hxxps[://]pgjonesadr[.]com/js&lt;/code&gt;&lt;br&gt;&lt;code&gt;hxxps[://]yuide[.]qkipikpp[.]es/PFsfkU!WQgMbZ/&lt;/code&gt;&lt;br&gt;&lt;code&gt;hxxps[://]spsol[.]qkipikpp[.]es/H7mozVCPB@35vHfGN&lt;/code&gt;&lt;/p&gt; 
   &lt;br&gt; 
   &lt;p&gt;&lt;span style="font-weight: bold;"&gt;Renamed Screenconnect Malicious payload URL:&lt;/span&gt;&lt;br&gt;&lt;code&gt;hxxps[://]okekeimmigrationlawyer[.]com/js/&lt;/code&gt;&lt;br&gt;&lt;code&gt;&lt;a href="https://www.joesandbox.com/analysis/1719604"&gt;https://www.joesandbox.com/analysis/1719604&lt;/a&gt;&lt;/code&gt;&lt;/p&gt; 
   &lt;br&gt;
   &lt;br&gt;
  &lt;/div&gt; 
 &lt;/div&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=7101814&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.reconinfosec.com%2Fzoom-events-phishing&amp;amp;bu=https%253A%252F%252Fblog.reconinfosec.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>SecOps</category>
      <category>Intel</category>
      <category>phishing</category>
      <category>fraud</category>
      <category>Email Security</category>
      <pubDate>Fri, 20 Jun 2025 23:18:57 GMT</pubDate>
      <author>mrobertson@reconinfosec.com (Michael Robertson)</author>
      <guid>https://blog.reconinfosec.com/zoom-events-phishing</guid>
      <dc:date>2025-06-20T23:18:57Z</dc:date>
    </item>
  </channel>
</rss>
