Threat actors no longer operate in silos. Today, they use multiple channels such as SMS, email, fake web pages, and compromised cloud accounts.
They use these various channels to establish persistence and compromise identities so that they can elevate privileges and move laterally. Proofpoint Threat Research recently observed campaigns in which threat actors used multichannel attacks to target the retail industry. The attack chain and timeline show how the threat actors (TA) move from one targeted organization to the next. Each time their unauthorized access is revoked or exhausted, the attackers move on to the next target.
Read more…
Source: Proofpoint