www.verimatrix.com Open in urlscan Pro
162.159.137.54  Public Scan

Submitted URL: https://c24p-04.na1.hubspotlinks.com/Ctc/ZN+113/c24p-04/VVLW9Q2wBXflW4pN4qb2B4Nv1W5GRJ1L57CjQNMcSJRv5nXHsW6N1X8z6lZ3lqW928jQY5hCV26W2...
Effective URL: https://www.verimatrix.com/cybersecurity/cybersecurity-insights/cybersecurity-threat-roundup-7-enchant-fjordphantom-imuta-a...
Submission: On January 02 via api from ES — Scanned from ES

Form analysis 2 forms found in the DOM

POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/327778/3b0cf0ec-8ec4-472a-aced-94d2db503aaa

<form id="hsForm_3b0cf0ec-8ec4-472a-aced-94d2db503aaa" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
  action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/327778/3b0cf0ec-8ec4-472a-aced-94d2db503aaa"
  class="hs-form-private hsForm_3b0cf0ec-8ec4-472a-aced-94d2db503aaa hs-form-3b0cf0ec-8ec4-472a-aced-94d2db503aaa hs-form-3b0cf0ec-8ec4-472a-aced-94d2db503aaa_db3e2457-5ee5-4341-afad-e9af1c9749a7 hs-form stacked"
  target="target_iframe_3b0cf0ec-8ec4-472a-aced-94d2db503aaa" data-instance-id="db3e2457-5ee5-4341-afad-e9af1c9749a7" data-form-id="3b0cf0ec-8ec4-472a-aced-94d2db503aaa" data-portal-id="327778" data-hs-cf-bound="true">
  <div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-3b0cf0ec-8ec4-472a-aced-94d2db503aaa" class="" placeholder="Enter your Email" for="email-3b0cf0ec-8ec4-472a-aced-94d2db503aaa"><span>Email</span><span
        class="hs-form-required">*</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input id="email-3b0cf0ec-8ec4-472a-aced-94d2db503aaa" name="email" required="" placeholder="name@company.com " type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
  </div>
  <div class="hs_gclid hs-gclid hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-gclid-3b0cf0ec-8ec4-472a-aced-94d2db503aaa" class="" placeholder="Enter your gclid"
      for="gclid-3b0cf0ec-8ec4-472a-aced-94d2db503aaa"><span>gclid</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input name="gclid" class="hs-input" type="hidden" value=""></div>
  </div>
  <div class="legal-consent-container">
    <div class="hs-richtext">
      <p>By submitting this form, I agree to the processing of my personal data for the purpose of receiving the Verimatrix newsletter, in compliance with Verimatrix’s
        <a href="https://www.verimatrix.com/privacy/" target="_blank" rel="noopener">Privacy Notice</a>.</p>
    </div>
  </div>
  <div class="hs_submit hs-submit">
    <div class="hs-field-desc" style="display: none;"></div>
    <div class="actions"><input type="submit" class="hs-button primary large" value="SIGN UP"></div>
  </div><input name="hs_context" type="hidden"
    value="{&quot;embedAtTimestamp&quot;:&quot;1704188776252&quot;,&quot;formDefinitionUpdatedAt&quot;:&quot;1700711767119&quot;,&quot;lang&quot;:&quot;en&quot;,&quot;legalConsentOptions&quot;:&quot;{\&quot;legitimateInterestSubscriptionTypes\&quot;:[195799,11540568,1285403,28271797],\&quot;communicationConsentCheckboxes\&quot;:[{\&quot;communicationTypeId\&quot;:28271797,\&quot;label\&quot;:\&quot;I agree to receive other communications from Verimatrix.\&quot;,\&quot;required\&quot;:false}],\&quot;legitimateInterestLegalBasis\&quot;:\&quot;LEGITIMATE_INTEREST_PQL\&quot;,\&quot;communicationConsentText\&quot;:\&quot;Inside Secure  is committed to protecting and respecting your privacy, and we’ll only use your personal information to administer your account and to provide the products and services you requested from us. From time to time, we would like to contact you about our products and services, as well as other content that may be of interest to you. If you consent to us contacting you for this purpose, please tick below to say how you would like us to contact you:\&quot;,\&quot;processingConsentType\&quot;:\&quot;IMPLICIT\&quot;,\&quot;processingConsentText\&quot;:\&quot;In order to provide you the content requested, we need to store and process your personal data. If you consent to us storing your personal data for this purpose, please tick the checkbox below.\&quot;,\&quot;processingConsentCheckboxLabel\&quot;:\&quot;I agree to allow Inside Secure  to store and process my personal data.\&quot;,\&quot;privacyPolicyText\&quot;:\&quot;<p>By submitting this form, I agree to the processing of my personal data for the purpose of receiving the Verimatrix newsletter, in compliance with Verimatrix’s <a href=\\\&quot;https://www.verimatrix.com/privacy/\\\&quot; target=\\\&quot;_blank\\\&quot; rel=\\\&quot;noopener\\\&quot;>Privacy Notice</a>.</p>\&quot;,\&quot;isLegitimateInterest\&quot;:true}&quot;,&quot;clonedFromForm&quot;:&quot;a530710b-9b67-4140-babe-053ecdef00ef&quot;,&quot;renderRawHtml&quot;:&quot;true&quot;,&quot;userAgent&quot;:&quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.129 Safari/537.36&quot;,&quot;pageTitle&quot;:&quot;Cybersecurity Threat Roundup: Issue #7 – VERIMATRIX&quot;,&quot;pageUrl&quot;:&quot;https://www.verimatrix.com/cybersecurity/cybersecurity-insights/cybersecurity-threat-roundup-7-enchant-fjordphantom-imuta-and-more/?utm_campaign=2023%20Cybersecurity%20One-Off%20Email&amp;utm_medium=email&amp;_hsmi=288066349&amp;_hsenc=p2ANqtz--OzYXj-CrdEVrfRAbeklWOrWo-D4lYCwGiZOcKZCQinTfne1ne-GM7bKM7yHHqmh6LC7kedI-URd8oDkIOWKEd1xl5-giUh5cWXfueriB8xPGW_yA&amp;utm_content=288066398&amp;utm_source=hs_email&quot;,&quot;urlParams&quot;:{&quot;utm_campaign&quot;:&quot;2023 Cybersecurity One-Off Email&quot;,&quot;utm_medium&quot;:&quot;email&quot;,&quot;_hsmi&quot;:&quot;288066349&quot;,&quot;_hsenc&quot;:&quot;p2ANqtz--OzYXj-CrdEVrfRAbeklWOrWo-D4lYCwGiZOcKZCQinTfne1ne-GM7bKM7yHHqmh6LC7kedI-URd8oDkIOWKEd1xl5-giUh5cWXfueriB8xPGW_yA&quot;,&quot;utm_content&quot;:&quot;288066398&quot;,&quot;utm_source&quot;:&quot;hs_email&quot;},&quot;isHubSpotCmsGeneratedPage&quot;:false,&quot;hutk&quot;:&quot;ab9c3f199b76d6c7b618c0e31d97534d&quot;,&quot;__hsfp&quot;:2942230154,&quot;__hssc&quot;:&quot;35684543.1.1704188778409&quot;,&quot;__hstc&quot;:&quot;35684543.ab9c3f199b76d6c7b618c0e31d97534d.1704188778409.1704188778409.1704188778409.1&quot;,&quot;formTarget&quot;:&quot;#hbspt-form-db3e2457-5ee5-4341-afad-e9af1c9749a7&quot;,&quot;rumScriptExecuteTime&quot;:2356.9000000953674,&quot;rumTotalRequestTime&quot;:2607.9000000953674,&quot;rumTotalRenderTime&quot;:2702,&quot;rumServiceResponseTime&quot;:251,&quot;rumFormRenderTime&quot;:94.09999990463257,&quot;locale&quot;:&quot;en&quot;,&quot;timestamp&quot;:1704188778419,&quot;originalEmbedContext&quot;:{&quot;portalId&quot;:&quot;327778&quot;,&quot;formId&quot;:&quot;3b0cf0ec-8ec4-472a-aced-94d2db503aaa&quot;,&quot;region&quot;:&quot;na1&quot;,&quot;target&quot;:&quot;#hbspt-form-db3e2457-5ee5-4341-afad-e9af1c9749a7&quot;,&quot;isBuilder&quot;:false,&quot;isTestPage&quot;:false,&quot;isPreview&quot;:false,&quot;isMobileResponsive&quot;:true},&quot;correlationId&quot;:&quot;db3e2457-5ee5-4341-afad-e9af1c9749a7&quot;,&quot;renderedFieldsIds&quot;:[&quot;email&quot;,&quot;gclid&quot;],&quot;captchaStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;emailResubscribeStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;isInsideCrossOriginFrame&quot;:false,&quot;source&quot;:&quot;forms-embed-1.4371&quot;,&quot;sourceName&quot;:&quot;forms-embed&quot;,&quot;sourceVersion&quot;:&quot;1.4371&quot;,&quot;sourceVersionMajor&quot;:&quot;1&quot;,&quot;sourceVersionMinor&quot;:&quot;4371&quot;,&quot;allPageIds&quot;:{},&quot;_debug_embedLogLines&quot;:[{&quot;clientTimestamp&quot;:1704188776345,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved pageContext values which may be overriden by the embed context: {\&quot;pageTitle\&quot;:\&quot;Cybersecurity Threat Roundup: Issue #7 – VERIMATRIX\&quot;,\&quot;pageUrl\&quot;:\&quot;https://www.verimatrix.com/cybersecurity/cybersecurity-insights/cybersecurity-threat-roundup-7-enchant-fjordphantom-imuta-and-more/?utm_campaign=2023%20Cybersecurity%20One-Off%20Email&amp;utm_medium=email&amp;_hsmi=288066349&amp;_hsenc=p2ANqtz--OzYXj-CrdEVrfRAbeklWOrWo-D4lYCwGiZOcKZCQinTfne1ne-GM7bKM7yHHqmh6LC7kedI-URd8oDkIOWKEd1xl5-giUh5cWXfueriB8xPGW_yA&amp;utm_content=288066398&amp;utm_source=hs_email\&quot;,\&quot;userAgent\&quot;:\&quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.129 Safari/537.36\&quot;,\&quot;urlParams\&quot;:{\&quot;utm_campaign\&quot;:\&quot;2023 Cybersecurity One-Off Email\&quot;,\&quot;utm_medium\&quot;:\&quot;email\&quot;,\&quot;_hsmi\&quot;:\&quot;288066349\&quot;,\&quot;_hsenc\&quot;:\&quot;p2ANqtz--OzYXj-CrdEVrfRAbeklWOrWo-D4lYCwGiZOcKZCQinTfne1ne-GM7bKM7yHHqmh6LC7kedI-URd8oDkIOWKEd1xl5-giUh5cWXfueriB8xPGW_yA\&quot;,\&quot;utm_content\&quot;:\&quot;288066398\&quot;,\&quot;utm_source\&quot;:\&quot;hs_email\&quot;},\&quot;isHubSpotCmsGeneratedPage\&quot;:false}&quot;},{&quot;clientTimestamp&quot;:1704188776346,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved countryCode property from normalized embed definition response: \&quot;ES\&quot;&quot;},{&quot;clientTimestamp&quot;:1704188778415,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved analytics values from API response which may be overriden by the embed context: {\&quot;hutk\&quot;:\&quot;ab9c3f199b76d6c7b618c0e31d97534d\&quot;}&quot;}]}"><iframe
    name="target_iframe_3b0cf0ec-8ec4-472a-aced-94d2db503aaa" style="display: none;"></iframe>
</form>

POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/327778/a530710b-9b67-4140-babe-053ecdef00ef

<form id="hsForm_a530710b-9b67-4140-babe-053ecdef00ef" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
  action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/327778/a530710b-9b67-4140-babe-053ecdef00ef"
  class="hs-form-private hsForm_a530710b-9b67-4140-babe-053ecdef00ef hs-form-a530710b-9b67-4140-babe-053ecdef00ef hs-form-a530710b-9b67-4140-babe-053ecdef00ef_e725548c-14df-4bb4-8e1f-cf7003491acd hs-form stacked"
  target="target_iframe_a530710b-9b67-4140-babe-053ecdef00ef" data-instance-id="e725548c-14df-4bb4-8e1f-cf7003491acd" data-form-id="a530710b-9b67-4140-babe-053ecdef00ef" data-portal-id="327778" data-hs-cf-bound="true">
  <div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-a530710b-9b67-4140-babe-053ecdef00ef" class="" placeholder="Enter your Email" for="email-a530710b-9b67-4140-babe-053ecdef00ef"><span>Email</span><span
        class="hs-form-required">*</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input id="email-a530710b-9b67-4140-babe-053ecdef00ef" name="email" required="" placeholder="name@company.com " type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
  </div>
  <div class="hs_gclid hs-gclid hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-gclid-a530710b-9b67-4140-babe-053ecdef00ef" class="" placeholder="Enter your gclid"
      for="gclid-a530710b-9b67-4140-babe-053ecdef00ef"><span>gclid</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input name="gclid" class="hs-input" type="hidden" value=""></div>
  </div>
  <div class="legal-consent-container">
    <div class="hs-richtext">
      <p>By submitting this form, I agree to the processing of my personal data for the purpose of receiving the Verimatrix newsletter, in compliance with Verimatrix’s
        <a href="https://www.verimatrix.com/privacy/" target="_blank" rel="noopener">Privacy Notice</a>.</p>
    </div>
  </div>
  <div class="hs_submit hs-submit">
    <div class="hs-field-desc" style="display: none;"></div>
    <div class="actions"><input type="submit" class="hs-button primary large" value="SIGN UP"></div>
  </div><input name="hs_context" type="hidden"
    value="{&quot;embedAtTimestamp&quot;:&quot;1704188776293&quot;,&quot;formDefinitionUpdatedAt&quot;:&quot;1701247339036&quot;,&quot;lang&quot;:&quot;en&quot;,&quot;legalConsentOptions&quot;:&quot;{\&quot;legitimateInterestSubscriptionTypes\&quot;:[28271797],\&quot;communicationConsentCheckboxes\&quot;:[{\&quot;communicationTypeId\&quot;:28271797,\&quot;label\&quot;:\&quot;I agree to receive other communications from Verimatrix.\&quot;,\&quot;required\&quot;:false}],\&quot;legitimateInterestLegalBasis\&quot;:\&quot;LEGITIMATE_INTEREST_PQL\&quot;,\&quot;communicationConsentText\&quot;:\&quot;Inside Secure  is committed to protecting and respecting your privacy, and we’ll only use your personal information to administer your account and to provide the products and services you requested from us. From time to time, we would like to contact you about our products and services, as well as other content that may be of interest to you. If you consent to us contacting you for this purpose, please tick below to say how you would like us to contact you:\&quot;,\&quot;processingConsentType\&quot;:\&quot;IMPLICIT\&quot;,\&quot;processingConsentText\&quot;:\&quot;In order to provide you the content requested, we need to store and process your personal data. If you consent to us storing your personal data for this purpose, please tick the checkbox below.\&quot;,\&quot;processingConsentCheckboxLabel\&quot;:\&quot;I agree to allow Inside Secure  to store and process my personal data.\&quot;,\&quot;privacyPolicyText\&quot;:\&quot;<p>By submitting this form, I agree to the processing of my personal data for the purpose of receiving the Verimatrix newsletter, in compliance with Verimatrix’s <a href=\\\&quot;https://www.verimatrix.com/privacy/\\\&quot; target=\\\&quot;_blank\\\&quot; rel=\\\&quot;noopener\\\&quot;>Privacy Notice</a>.</p>\&quot;,\&quot;isLegitimateInterest\&quot;:true}&quot;,&quot;clonedFromForm&quot;:&quot;98b07e3a-eca9-414b-9f41-2f4161f72a9d&quot;,&quot;renderRawHtml&quot;:&quot;true&quot;,&quot;userAgent&quot;:&quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.129 Safari/537.36&quot;,&quot;pageTitle&quot;:&quot;Cybersecurity Threat Roundup: Issue #7 – VERIMATRIX&quot;,&quot;pageUrl&quot;:&quot;https://www.verimatrix.com/cybersecurity/cybersecurity-insights/cybersecurity-threat-roundup-7-enchant-fjordphantom-imuta-and-more/?utm_campaign=2023%20Cybersecurity%20One-Off%20Email&amp;utm_medium=email&amp;_hsmi=288066349&amp;_hsenc=p2ANqtz--OzYXj-CrdEVrfRAbeklWOrWo-D4lYCwGiZOcKZCQinTfne1ne-GM7bKM7yHHqmh6LC7kedI-URd8oDkIOWKEd1xl5-giUh5cWXfueriB8xPGW_yA&amp;utm_content=288066398&amp;utm_source=hs_email&quot;,&quot;urlParams&quot;:{&quot;utm_campaign&quot;:&quot;2023 Cybersecurity One-Off Email&quot;,&quot;utm_medium&quot;:&quot;email&quot;,&quot;_hsmi&quot;:&quot;288066349&quot;,&quot;_hsenc&quot;:&quot;p2ANqtz--OzYXj-CrdEVrfRAbeklWOrWo-D4lYCwGiZOcKZCQinTfne1ne-GM7bKM7yHHqmh6LC7kedI-URd8oDkIOWKEd1xl5-giUh5cWXfueriB8xPGW_yA&quot;,&quot;utm_content&quot;:&quot;288066398&quot;,&quot;utm_source&quot;:&quot;hs_email&quot;},&quot;isHubSpotCmsGeneratedPage&quot;:false,&quot;hutk&quot;:&quot;ab9c3f199b76d6c7b618c0e31d97534d&quot;,&quot;__hsfp&quot;:2942230154,&quot;__hssc&quot;:&quot;35684543.1.1704188778409&quot;,&quot;__hstc&quot;:&quot;35684543.ab9c3f199b76d6c7b618c0e31d97534d.1704188778409.1704188778409.1704188778409.1&quot;,&quot;formTarget&quot;:&quot;#hbspt-form-e725548c-14df-4bb4-8e1f-cf7003491acd&quot;,&quot;rumScriptExecuteTime&quot;:2384.5,&quot;rumTotalRequestTime&quot;:2687.699999809265,&quot;rumTotalRenderTime&quot;:2749.5999999046326,&quot;rumServiceResponseTime&quot;:303.19999980926514,&quot;rumFormRenderTime&quot;:61.90000009536743,&quot;locale&quot;:&quot;en&quot;,&quot;timestamp&quot;:1704188778422,&quot;originalEmbedContext&quot;:{&quot;portalId&quot;:&quot;327778&quot;,&quot;formId&quot;:&quot;a530710b-9b67-4140-babe-053ecdef00ef&quot;,&quot;region&quot;:&quot;na1&quot;,&quot;target&quot;:&quot;#hbspt-form-e725548c-14df-4bb4-8e1f-cf7003491acd&quot;,&quot;isBuilder&quot;:false,&quot;isTestPage&quot;:false,&quot;isPreview&quot;:false,&quot;isMobileResponsive&quot;:true},&quot;correlationId&quot;:&quot;e725548c-14df-4bb4-8e1f-cf7003491acd&quot;,&quot;renderedFieldsIds&quot;:[&quot;email&quot;,&quot;gclid&quot;],&quot;captchaStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;emailResubscribeStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;isInsideCrossOriginFrame&quot;:false,&quot;source&quot;:&quot;forms-embed-1.4371&quot;,&quot;sourceName&quot;:&quot;forms-embed&quot;,&quot;sourceVersion&quot;:&quot;1.4371&quot;,&quot;sourceVersionMajor&quot;:&quot;1&quot;,&quot;sourceVersionMinor&quot;:&quot;4371&quot;,&quot;allPageIds&quot;:{},&quot;_debug_embedLogLines&quot;:[{&quot;clientTimestamp&quot;:1704188776426,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved pageContext values which may be overriden by the embed context: {\&quot;pageTitle\&quot;:\&quot;Cybersecurity Threat Roundup: Issue #7 – VERIMATRIX\&quot;,\&quot;pageUrl\&quot;:\&quot;https://www.verimatrix.com/cybersecurity/cybersecurity-insights/cybersecurity-threat-roundup-7-enchant-fjordphantom-imuta-and-more/?utm_campaign=2023%20Cybersecurity%20One-Off%20Email&amp;utm_medium=email&amp;_hsmi=288066349&amp;_hsenc=p2ANqtz--OzYXj-CrdEVrfRAbeklWOrWo-D4lYCwGiZOcKZCQinTfne1ne-GM7bKM7yHHqmh6LC7kedI-URd8oDkIOWKEd1xl5-giUh5cWXfueriB8xPGW_yA&amp;utm_content=288066398&amp;utm_source=hs_email\&quot;,\&quot;userAgent\&quot;:\&quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.129 Safari/537.36\&quot;,\&quot;urlParams\&quot;:{\&quot;utm_campaign\&quot;:\&quot;2023 Cybersecurity One-Off Email\&quot;,\&quot;utm_medium\&quot;:\&quot;email\&quot;,\&quot;_hsmi\&quot;:\&quot;288066349\&quot;,\&quot;_hsenc\&quot;:\&quot;p2ANqtz--OzYXj-CrdEVrfRAbeklWOrWo-D4lYCwGiZOcKZCQinTfne1ne-GM7bKM7yHHqmh6LC7kedI-URd8oDkIOWKEd1xl5-giUh5cWXfueriB8xPGW_yA\&quot;,\&quot;utm_content\&quot;:\&quot;288066398\&quot;,\&quot;utm_source\&quot;:\&quot;hs_email\&quot;},\&quot;isHubSpotCmsGeneratedPage\&quot;:false}&quot;},{&quot;clientTimestamp&quot;:1704188776426,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved countryCode property from normalized embed definition response: \&quot;ES\&quot;&quot;},{&quot;clientTimestamp&quot;:1704188778419,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved analytics values from API response which may be overriden by the embed context: {\&quot;hutk\&quot;:\&quot;ab9c3f199b76d6c7b618c0e31d97534d\&quot;}&quot;}]}"><iframe
    name="target_iframe_a530710b-9b67-4140-babe-053ecdef00ef" style="display: none;"></iframe>
</form>

Text Content

Skip to content
 * VMX Labs
 * Partners
 * Partners Portal
 * About
 * Verimatrix.com

 * VMX Labs
 * Partners
 * Partners Portal
 * About
 * Verimatrix.com


 * Learn
   
   Learn
   
   A closer look
   
   
   THE XTD DIFFERENCE
   
   Going beyond MTD and EDR.
   
   
   AGENTLESS TELEMETRY
   
   Cybersecurity without inconvenience to consumers.
   
   
   SHIFT LEFT – CI/CD INTEGRATION
   
   Injecting security early in the development process.
   
   
   SIEM INTEGRATION
   
   Providing a comprehensive view of your security environment.
   
   
   HUMAN & MACHINE
   
   Combining AI/ML with human expertise to respond effectively.
   
   
   ZERO TRUST
   
   Eliminating implicit trust in favor of continuous validation.
   
   VMX
   labs
   
   Our cybersecurity resource hub with the latest threat advisories and
   commentaries from experts.
   
   Visit VMX Labs
   Browse resources
    * Cybersecurity Insights
    * White Papers
    * Ebooks
    * Knowledge Base
    * Cybersecurity Manifesto
   
    * Cybersecurity Insights
    * White Papers
    * Ebooks
    * Knowledge Base
    * Cybersecurity Manifesto
   
   Get the latest cybersecurity insights
   Email*
   
   gclid
   
   
   By submitting this form, I agree to the processing of my personal data for
   the purpose of receiving the Verimatrix newsletter, in compliance with
   Verimatrix’s Privacy Notice.
   
   
 * Product
   
   Verimatrix XTD™– Mobile App Protection
   
   Extended Threat Defense
   
   XTD was engineered to monitor new entry vectors from the fastest growing
   attack surface: connected apps, APIs, and unmanaged devices.
   
   View product
   XTD's powerful SaaS features
   Prevent
   
   Formerly App Shield. Start with RASP and shielding to create bulletproof
   apps.
   
   Detect & Respond
   
   Monitor and detect attacks. Receive guidance to apply countermeasures.
   
   Predict
   
   Actionable threat intelligence to prepare for future attacks.
   
   Security Center
   
   Cybersecurity Products
   
    * Web Protect
    * App Shield
    * Code Shield
    * Key Shield
   
    * Web Protect
    * App Shield
    * Code Shield
    * Key Shield
   
   Techniques
   
    * Code Obfuscation
    * Anti-tamper Technology
    * Jailbreak Detection
    * Root Detection
    * Environmental Checks
    * Anti Reverse Engineering
   
    * Code Obfuscation
    * Anti-tamper Technology
    * Jailbreak Detection
    * Root Detection
    * Environmental Checks
    * Anti Reverse Engineering

 * Customers
   Customers
   By industry
   
   
   FINANCIAL SERVICES
   
   
   BANKING
   
   
   E-COMMERCE
   
   
   HEALTHCARE
   
   
   GAMING
   
   By persona
   
   
   CISO
   
   Gain complete visibility of security risks to protect revenue streams.
   
   
   SECURITY OPERATIONS CENTER
   
   Effectively manage incident response and reporting.
   
   
   RESEARCH & DEVELOPMENT AND ENGINEERING
   
   Secure apps early in the development process for faster speed-to-market.
   
   
   FRAUD PREVENTION DEPARTMENT
   
   Strengthens anti-fraud measures by illuminating blindspots where fraudsters
   can attack.
   
   More
    * VMX Labs
    * Partners
    * Partners Portal
    * About
    * Verimatrix.com
   
    * VMX Labs
    * Partners
    * Partners Portal
    * About
    * Verimatrix.com

 * Pricing

Talk to us

Back to VMX Labs
Cybersecurity Threat Roundup #7: Enchant, FjordPhantom, IMUTA, and more


SHARE






THREAT ROUNDUP


CYBERSECURITY THREAT ROUNDUP #7: ENCHANT, FJORDPHANTOM, IMUTA, AND MORE

December 26, 2023

TABLE OF CONTENTS



 1. Threat info
 2. Vulnerabilities & patches
 3. Intelligence reports

With a special focus on mobile apps and connected, unmanaged devices, this VMX
Labs Cybersecurity Threat Roundup is compiled by Verimatrix cybersecurity
researchers and data scientists. It includes links to notable threat advisories
over the last month, information on vulnerabilities and patches, and links to
recent intelligence reports.


THREAT INFO

 * Enchant, a new Android malware, targets Chinese-speaking people with a
   special focus on cryptocurrency wallet apps. It abuses the Accessibility
   service to steal private keys, wallet addresses, mnemonic phrases, asset
   details, and wallet passwords. It is distributed through fake adult websites.




 * FjordPhantom, a new Android banking trojan, targets mobile banking customers
   in Southeast Asia. It runs the original banking app in a virtual container
   and attaches a hooking framework to bypass security mechanisms in the app. It
   is worth mentioning that one victim lost a staggering 10 million Thai Baht
   (€262,000) to this malware.




 * Fraudulent apps impersonating legitimate organizations in the banking,
   government services, and utilities sectors steal banking credentials and
   payment information from Android users in India. These fake apps also access
   SMS messages to obtain one-time passwords (OTPs) and bypass multi-factor
   authentication (MFA).

 

 * The incremental malicious update attack (IMUTA) demonstrates a
   proof-of-concept to bypass the Play Store vetting process by incrementally
   updating a benign app with malicious features.

 

 * Kamran spyware is a recently-discovered Android spyware targeting
   Urdu-speaking people in the disputed Gilgit-Baltistan region, north of
   Kashmir.

 

 * Property accounts are heavily under attack on booking.com. Users should be
   careful of in-app messages coming from legitimate property accounts. In
   ongoing campaigns, adversaries target property accounts, and in the event of
   successful account access, they send well-crafted phishing messages to
   upcoming guests to steal their payment information. Since reading a message
   coming from a legitimate source in the official app can be very convincing,
   the likelihood of victims following the instructions in the message and
   inputting their payment information is high.

 

 * SecuriDropper is a Dropper-as-a-Service (DaaS) offer that helps mobile
   malware bypass the Restricted Settings security feature introduced in Android
   13. This feature prevents sideloaded apps from gaining Accessibility service
   permissions. Dropper services provide a session-based installation of the
   malware that deceives Android’s decision process about the source of an app’s
   installation (sideloaded versus official app stores). With the increasing
   adoption of Android 13, the usage of dropper services by threat actors has
   been rising.

 

 * SpyC23, an Android spyware developed by Arid Viper APT, abuses Android’s
   Accessibility service and is distributed through trojanized Telegram and
   Skipped Messenger apps in the most recent campaign.

 

 * The malware campaign discovered in the summer of 2023 still actively attacks
   Iranian mobile bank users. The threat actor has added new banks to the target
   list and developed overlay attack capability since then.

 

 * WhatsApp mods spying on people mostly in Azerbaijan and more than a hundred
   other countries have been discovered. Threat actors spread these malicious
   WhatsApp mods via Telegram channels and websites. They not only steal
   victims’ personal data, files, and device information, but also record
   private conversations stealthily.


VULNERABILITIES & PATCHES

 * Apple patched two zero-days (CVE-2023-42916 and CVE-2023-42917) in the iOS
   17.1.2 release.


INTELLIGENCE REPORTS

 * The Kaspersky’s Gaming-Related Cyberthreats in 2023 report shows that 436,786
   attempts to infect mobile devices of 84,539 users were detected in a year.
   Minecraft is by far the most misused game brand, making up 90% of the total
   attempts. Minecraft is followed by PUBG – Battlegrounds Battle Royale (5%)
   and Roblox (3%).

 

 * Anubis, AhMyth, and Hiddad were the top three mobile malwares in October
   2023, according to Check Point’s Most Wanted Malware Report.

 

 * The Kaspersky’s Crimeware and Financial Cyberthreats in 2024 report forecasts
   that mobile malware will increasingly target direct payment systems like PIX
   in Brazil, FedNow in the USA, and UPI in India and utilize the automated
   transfer system (ATS) technique in 2024. 

 

 * The National Cyber Security Centre’s report states that Android device
   infections in the public sector of the United Kingdom have increased.
   Sharkbot, Octo, Gigabud, and Joker malware families were detected.


PROTECT YOUR DIGITAL WORLD

Don’t miss out on the latest threats, vulnerabilities, and intelligence reports.
Join our newsletter to stay one step ahead in the ever-evolving world of
cybersecurity for mobile apps and connected devices.
Email*

gclid


By submitting this form, I agree to the processing of my personal data for the
purpose of receiving the Verimatrix newsletter, in compliance with Verimatrix’s
Privacy Notice.



WRITTEN BY


DENIZ KABAKCI

Deniz Kabakci is a senior security engineer at Verimatrix and writes for VMX
Labs.



SHARE THIS CYBERSECURITY INSIGHT




OTHER CYBERSECURITY INSIGHTS

Commentary


ENHANCING APPLICATION SECURITY PROTECTIONS: A LOOK AT THE ZERO-CODE INJECTION
APPROACH TO PREVENT REVERSE-ENGINEERING

Zero-code injection technology serves as a high-value yet low-effort security
measure that significantly enhances an application’s protection against
reverse-engineering.
 * 9 months ago
 * 3 Mins

Commentary


THE DARK SIDE OF DISCOUNTS: VOUCHER FRAUD IN MOBILE APPS

Beware of fake vouchers in your mobile apps! Discover the tactics fraudsters
employ to exploit discounts and compromise user experiences.
 * 3 weeks ago
 * 2 Mins

Commentary


WHAT YOU DON’T KNOW CAN HACK YOU: SOFTWARE SUPPLY CHAIN ATTACKS IN MOBILE APPS

Mobile app developers, stay vigilant! Defend against software supply chain
attacks with secure code reviews, regular updates, and monitoring.
 * 5 months ago
 * 3 Mins

Commentary


A LOOK BEYOND TRADITIONAL RASP, MTD AND WAF TECHNOLOGIES

The need for proven measures to protect them against malicious attacks remains
more important than ever for any organization dependent on the success of
critical applications.
 * 9 months ago
 * 5 Mins

Follow us
Linkedin Facebook
Products
 * Extended Threat Defense (XTD)
 * XTD Prevent (formerly App Shield)
 * XTD Detect & Respond
 * XTD Predict

 * Extended Threat Defense (XTD)
 * XTD Prevent (formerly App Shield)
 * XTD Detect & Respond
 * XTD Predict

Industries
 * Financial Services
 * E-commerce
 * Healthcare
 * Gaming
 * Banking

 * Financial Services
 * E-commerce
 * Healthcare
 * Gaming
 * Banking

Personas
 * CISO
 * Security Operations Center
 * R&D and Engineering
 * Fraud Prevention Department

 * CISO
 * Security Operations Center
 * R&D and Engineering
 * Fraud Prevention Department

Learn
 * The XTD Difference
 * Agentless Telemetry
 * Shift left – CI/CD integration
 * Human & Machine
 * Zero Trust
 * SIEM Integration

 * The XTD Difference
 * Agentless Telemetry
 * Shift left – CI/CD integration
 * Human & Machine
 * Zero Trust
 * SIEM Integration

Resources
 * VMX Labs
 * Cybersecurity Manifesto
 * Cybersecurity Insights
 * White Papers
 * Knowledge Base
 * Ebooks

 * VMX Labs
 * Cybersecurity Manifesto
 * Cybersecurity Insights
 * White Papers
 * Knowledge Base
 * Ebooks

Verimatrix
 * Pricing
 * Partners
 * Partners Portal
 * About
 * Verimatrix.com
 * Contact
 * Talk to a specialist

 * Pricing
 * Partners
 * Partners Portal
 * About
 * Verimatrix.com
 * Contact
 * Talk to a specialist

Our Offices
United States

6059 Cornerstone Ct W,
San Diego, CA 92121

united.states@verimatrix.com

France

Impasse des carrés de l’Arc
Rond-point du Canet, 13590
Meyreuil

france@verimatrix.com

Cookies preferences | Terms of Use | Privacy Notice

© 2024 Verimatrix. All Rights Reserved
Clicking “Accept All Cookies”, you agree to the storing of cookies on your
device to enhance site navigation, analyze site usage, and assist in our
marketing efforts
Reject all cookies Accept all cookies
Cookies preferences



COOKIES PREFERENCES

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer. 
Accept all cookies


COOKIES PREFERENCES

STRICTLY NECESSARY COOKIES

Always Active


These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms. You can set your browser to block
or alert you about these cookies, but some parts of the site will not then work.
These cookies do not store any personally identifiable information.

View Vendor Details‎

FUNCTIONAL COOKIES

Functional Cookies


These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly.

View Vendor Details‎

PERFORMANCE COOKIES

Performance Cookies


These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site. All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

View Vendor Details‎

TARGETING COOKIES

Targeting Cookies


These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites. They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

View Vendor Details‎
Back Button


VENDORS LIST



Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Reject All Confirm my choices

×
×